نتایج جستجو برای: cyber crimes

تعداد نتایج: 23947  

2009
Joshua D. Freilich Graeme R. Newman

Situational Crime Prevention (SCP) is a versatile approach that seeks to prevent criminal behavior by either implementing strategies to manipulate specific situations to make it impossible for the crime to be committed, or by reducing cues that increase a person’s motivation to commit a crime during specific types of events. SCP’s reach has expanded tremendously in recent years and the number o...

Journal: :International Affairs 2023

Abstract In the contemporary digital age, mass atrocity crimes are increasingly promoted and organized online. Social media, encrypted chatrooms messaging apps have been employed (by regimes non-state actors alike) to stoke racial political division, recruit sympathizers facilitate atrocities. At same time, there is increasing evidence of power promise offensive cyberspace operations in conflic...

Journal: :Advanced sciences and technologies for security applications 2021

Disability hate crime is under-reported in the UK with perceived limited support given to victims. The use of online communication resulted cyber-disability cases, recognised by Police addition an ‘online-flag’ documentation. However, cases remain under-reported, potential individual, societal and organisational barriers reporting especially during a pandemic. This paper aims contextualise iden...

2013
Richard J. Enbody

Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...

Journal: :The Howard journal of crime and justice 2022

Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic psychosocial proposed by Lazarus (2019) to investigate whether hold different perceptions of digital crimes across these two dimensions. Informed synergy feminist theory Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential (online fraud) (cyberbull...

Journal: :Informal: informatics journal 2023

Twitter is a social media application that can be used on desktop, web and smartphone systems. The large number of users makes inseparable from cyber crimes, such as pornography, online gambling, hate speech other crimes. purpose this study to conduct forensic investigation the Direct Message (DM) using NIJ method determine success rate tools in finding deleted data. This uses National Institut...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1390

abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...

2016
Guanhua Yan Yunus Kucuk Max Slocum David C. Last

Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...

2009
David Chadwick Ilsun You Hang Bae Chang Shambhu Upadhyaya Andrew P. Moore Dawn M. Cappelli Thomas C. Caron Eric Shaw Randall F. Trzeciak Eugene H. Spafford Howard Chivers Philip Nobles Siraj A. Shaikh John A. Clark

A study conducted by the Carnegie Mellon University Software Engineering Institute CERT Program analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage includ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید