skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of InformationAssets. Preview this item
ClosePreview this item
Checking...

Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of InformationAssets.

Author: Ronald L Mendell
Publisher: Springfield : Charles C Thomas, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Livres numériques
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ronald L Mendell
ISBN: 0398088721 9780398088729
OCLC Number: 1129741223
Description: 1 ressource en ligne (227 pages)
Contents: Chapter 1 --
IDENTITY THEFT; Chapter 2 --
SOCIAL ENGINEERING; Chapter 3 --
DISINFORMATION; Chapter 4 --
DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 --
THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 --
MISUSE OF ONLINE INFORMATION; Chapter 7 --
MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 --
THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 --
PSYCHOLOGICAL DIMENSIONS; Chapter 10 --
THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A;Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY.

Abstract:

This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of"smartphones, " prepaid.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1129741223<\/a>> # Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of InformationAssets.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:MediaObject<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1129741223<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Place\/springfield<\/a>> ; # Springfield<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/secret_professionnel<\/a>> ; # Secret professionnel<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/data_protection<\/a>> ; # Data protection<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/confidential_communications<\/a>> ; # Confidential communications<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/enquetes_criminelles<\/a>> ; # Enqu\u00EAtes criminelles<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/363.2\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/protection_de_l_information_informatique<\/a>> ; # Protection de l\'information (Informatique)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/criminal_investigation<\/a>> ; # Criminal investigation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/criminalite_informatique_enquetes<\/a>> ; # Criminalit\u00E9 informatique--Enqu\u00EAtes<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/computer_crimes_investigation<\/a>> ; # Computer crimes--Investigation<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Person\/mendell_ronald_l<\/a>> ; # Ronald L. Mendell<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2013<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Chapter 1 -- IDENTITY THEFT; Chapter 2 -- SOCIAL ENGINEERING; Chapter 3 -- DISINFORMATION; Chapter 4 -- DIGITAL EVIDENCE ANDDIGITAL REPOSITORIES; Chapter 5 -- THE THEFT OF PERSONALINFORMATION REPOSITORIES; Chapter 6 -- MISUSE OF ONLINE INFORMATION; Chapter 7 -- MISUSE OF ELECTRONIC SURVEILLANCE; Chapter 8 -- THEFT OF PHYSICAL INFORMATION ASSETS; Chapter 9 -- PSYCHOLOGICAL DIMENSIONS; Chapter 10 -- THE FUTURE OFINFORMATION-BASED CRIMES; Appendix A;Appendix B; Appendix C; GLOSSARY; BIBLIOGRAPHY.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging \"shadow\" financial domain. This includes the new world of\"smartphones, \" prepaid.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/1898179411<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Livres num\u00E9riques<\/span>\" ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of InformationAssets.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1129741223<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1129741223#PublicationEvent\/springfield_charles_c_thomas_2013<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Agent\/charles_c_thomas<\/a>> ; # Charles C Thomas<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proxy.cm.umoncton.ca\/login?url=http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&AN=545566<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780398088729<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1129741223<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/363.2\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Agent\/charles_c_thomas<\/a>> # Charles C Thomas<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Charles C Thomas<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Person\/mendell_ronald_l<\/a>> # Ronald L. Mendell<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Mendell<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ronald L.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ronald L. Mendell<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Place\/springfield<\/a>> # Springfield<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springfield<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/computer_crimes_investigation<\/a>> # Computer crimes--Investigation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Investigation<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/confidential_communications<\/a>> # Confidential communications<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Confidential communications<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/criminal_investigation<\/a>> # Criminal investigation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Criminal investigation<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/criminalite_informatique_enquetes<\/a>> # Criminalit\u00E9 informatique--Enqu\u00EAtes<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Criminalit\u00E9 informatique--Enqu\u00EAtes<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/data_protection<\/a>> # Data protection<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data protection<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/enquetes_criminelles<\/a>> # Enqu\u00EAtes criminelles<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Enqu\u00EAtes criminelles<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/protection_de_l_information_informatique<\/a>> # Protection de l\'information (Informatique)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Protection de l\'information (Informatique)<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Topic\/secret_professionnel<\/a>> # Secret professionnel<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Secret professionnel<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/proxy.cm.umoncton.ca\/login?url=http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&AN=545566<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Acc\u00E8s via EBSCOhost (Acc\u00E8s r\u00E9serv\u00E9 aux usagers de l\'UdeM)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780398088729<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0398088721<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780398088729<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1129741223<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1129741223<\/a>> ; # Investigating Information-Based Crimes : a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of InformationAssets.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-01-14<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1129741223#PublicationEvent\/springfield_charles_c_thomas_2013<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Place\/springfield<\/a>> ; # Springfield<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/1898179411#Agent\/charles_c_thomas<\/a>> ; # Charles C Thomas<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2013<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n