Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Cyberterrorism --- Extortion --- Computer security --- Hackers --- National security --- Government policy
Choose an application
Computer crimes --- Computer security --- Extortion --- Government policy --- Law and legislation
Choose an application
Computer crimes --- Malware (Computer software) --- Extortion --- Computer security --- Prevention. --- Government policy
Choose an application
Pipelines --- Malware (Computer software) --- Extortion --- Computer security --- Protection --- Government policy --- Colonial Pipeline Company.
Choose an application
Criminal extortion is an understudied, but widespread and severe problem in Latin America. In states that cannot or choose not to uphold the rule of law, victims are often seen as helpless in the face of powerful criminals. However, even under such difficult circumstances, victims resist criminal extortion in surprisingly different ways. Drawing on extensive fieldwork in violent localities in Colombia, El Salvador and Mexico, Moncada weaves together interviews, focus groups, and participatory drawing exercises to explain why victims pursue distinct strategies to resist criminal extortion. The analysis traces and compares processes that lead to individual acts of everyday resistance; sporadic killings by ad hoc groups of victims and police; institutionalized and sustained collective vigilantism; and coordination between victims and states to co-produce order in ways that both strengthen and undermine the rule of law. This book offers valuable new insights into the broader politics of crime and the state.
Extortion --- Vigilantism --- Crime prevention --- Offenses against property --- Law and legislation --- Crimes against property --- Crime --- Prevention of crime --- Public safety --- Blackmail --- Chantage --- Undue influence --- Threats --- Prevention --- Government policy
Choose an application
Cyberterrorism. --- Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Extortion. --- Blackmail --- Chantage --- Offenses against property --- Undue influence --- Threats
Listing 1 - 6 of 6 |
Sort by
|