منابع مشابه
Fighting Organized and Transnational Organized Crime in Canada
Organized and transnational organized crime has become a prominent political issue in Canada, as elsewhere. The topic is understudied in Canadian political science, in part because of the inherent difficulties of research. The paper begins a reflection on the politics of organized and transnational organized crime in Canada. How has the Canadian government responded to the threat of organized a...
متن کاملThe Use of Data Mining Techniques in Operational Crime Fighting
1. Abstract This paper looks at the application of data mining techniques, principally the Multi-Layer Perceptron and Self Organising Map, to the recognition of burglary offences committed by a network of offenders. The aim is to suggest a list of currently undetected crimes that may be attributed to one or more members of the network and improve on the time taken to complete the task manually ...
متن کاملFighting computer crime - a new framework for protecting information
Description: Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to. Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpe...
متن کاملFighting like a girl fighting like a guy: gender identity, ideology, and girls at early adolescence.
In this chapter we explore the phenomenon of "girls fighting like guys" by listening to adolescent girls' justification for physical fighting with other girls. We argue that physical girlfighting is a particular kind of gendered performance--a performance of identity that expresses, at least in part, an answer to the question, "Who am I?"--that both perpetuates and challenges the usual notions ...
متن کاملSeparable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Phishing emails are one of today’s most common and costly forms of digital identity theft. They are now very convincing that even experts cannot tell what is and is not genuine. In a phishing attack, victims are lured by an official looking email to a fraudulent website that appears to be that of a legitimate service provider. Such attacks can be mitigated with digitally-signed emails. Unfortun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bond Law Review
سال: 2011
ISSN: 2202-4824,1033-4505
DOI: 10.53300/001c.5577