In the early 1990s, professionals began to question how to address offender computer use while on supervision, but in the past ten years, tools emerged that were specifically developed for triage and field forensics. As these were rapidly embraced, it was still unclear what professionals could look for, how to look for it, and how to interpret what they found. This unique book resolves those issues. The book provides a clear outline of what can and should be done regarding the management of offender computer use. Not only does the text help community corrections professionals understand how to monitor computer use, but it helps realize how information gained during monitoring can assist in overall case management. The book takes the reader through all the paces of managing offender cyber-risk and is meant specifically for pretrial, probation, parole, and community sanction officers. The chapters are organized by major areas, such as community corrections and cyberspace, understanding the options, condition legality, operational legality, accessing cyber-risk, computer education, principles of effective computer monitoring, search and seizure, deploying monitoring software, and online investigations. Additionally, numerous appendices provide a wealth of information regarding model forms, questionnaires, and worksheets. This book moves the reader toward a more informed use of the technology that is now readily available to effectively manage offenders' digital behavior.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
I wrote this book to cover all aspects of managing an offender's computer use in a community correction setting (pretrial, probation and parole). My intent was to empower officers to meet the supervision challenges of the twenty-first century. Those who help train or assist these officers, such as law enforcement and IT staff, will also benefit from its contents. Additionally, anyone involved in managing a community corrections agency (supervisors, chiefs, court administrators, judges, parole commissioners, corrections directors, etc.) will also find its contents beneficial. Both prosecutors and defense attorneys will be in a better position to advocate the various sentencing options, including the imposition of technological conditions, by reviewing this book's material. Finally, the Appendix includes forms needed to instruct and obtain information from offenders subject to computer monitoring and/or searches as well as to document computer investigations by officers.From the Inside Flap:
"Not only does this book help community corrections professionals understand how to monitor computer use, but it helps us realize how information gained during monitoring can assist us in overall case management. The technology is now readily available to effectively manage offenders' digital behavior." Bowker's book moves us all toward a more informed use of the technology." Jim Tanner, national cybercrime expert and Project Coordinator for NLECTC (and KBSolutions)
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.