نتایج جستجو برای: cyber crimes
تعداد نتایج: 23947 فیلتر نتایج به سال:
Situational Crime Prevention (SCP) is a versatile approach that seeks to prevent criminal behavior by either implementing strategies to manipulate specific situations to make it impossible for the crime to be committed, or by reducing cues that increase a person’s motivation to commit a crime during specific types of events. SCP’s reach has expanded tremendously in recent years and the number o...
Abstract In the contemporary digital age, mass atrocity crimes are increasingly promoted and organized online. Social media, encrypted chatrooms messaging apps have been employed (by regimes non-state actors alike) to stoke racial political division, recruit sympathizers facilitate atrocities. At same time, there is increasing evidence of power promise offensive cyberspace operations in conflic...
Disability hate crime is under-reported in the UK with perceived limited support given to victims. The use of online communication resulted cyber-disability cases, recognised by Police addition an ‘online-flag’ documentation. However, cases remain under-reported, potential individual, societal and organisational barriers reporting especially during a pandemic. This paper aims contextualise iden...
Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...
Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic psychosocial proposed by Lazarus (2019) to investigate whether hold different perceptions of digital crimes across these two dimensions. Informed synergy feminist theory Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential (online fraud) (cyberbull...
Twitter is a social media application that can be used on desktop, web and smartphone systems. The large number of users makes inseparable from cyber crimes, such as pornography, online gambling, hate speech other crimes. purpose this study to conduct forensic investigation the Direct Message (DM) using NIJ method determine success rate tools in finding deleted data. This uses National Institut...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...
A study conducted by the Carnegie Mellon University Software Engineering Institute CERT Program analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage includ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید