Fighting Cybercrime in Africa
نویسندگان
چکیده
منابع مشابه
Fighting Cybercrime with Packet Attestation
IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. We describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a given IP packet was sent by a particular network subscriber. This capabi...
متن کاملFighting cybercrime: a review and the Taiwan experience
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries tha...
متن کاملFighting software piracy: which governance tools matter in Africa?
This article integrates previously missing components of government quality into the governancepiracy nexus in exploring governance mechanisms by which global obligations for the treatment of IPRs are effectively transmitted from international to the national level in the battle against piracy. It assesses the best governance tools in the fight against piracy and upholding of Intellectual Prope...
متن کاملFundamental Issues in Criminalization of Virtal Cybercrime
This paper tries to investigate the question of how virtual cybercrimes fall within the realm of criminal law and what their principles and conditions of criminalization are. Despite the large number of Internet users in virtual worlds, such as "Second Life", there has been limited literature and research especially on the extent and scope of the issue, the identity of the perpetrators and vict...
متن کاملText Mining and CyberCrime
This chapter describes the state of technology for studying Internet crimes against children, specifically sexual predation and cyberbullying. We begin by presenting a survey of relevant research articles that are related to the study of cybercrime. This survey includes a discussion of our work on the classification of chat logs that contain bullying or predatory behavior. Many commercial enter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Engineering
سال: 2012
ISSN: 2163-1484
DOI: 10.5923/j.computer.20120206.03