نتایج جستجو برای: syber crimes
تعداد نتایج: 8018 فیلتر نتایج به سال:
For a complete list and the full text of the papers in the Trends and Issues in Crime and Criminal Justice series, visit the AIC web site at: Under-reporting of crime to police means not only that police crime records may underestimate the extent of particular crimes but that valuable resources and crime prevention strategies may be aimed at certain crimes because they are reported more frequen...
une approche comparée du crime dans l’étranger d’albert camus et les mains sales de jean-paul sartre
le thème du crime a attiré toujours l’attention des écrivains qui étaient depuis toujours à la recherche des intrigues compliquées et sophistiquées. cette attention est renforcée de plus en plus par le biais des crimes qui restent pour jamais irrésolus non seulement pour ceux ou celles qui les jugent, mais aussi pour ceux ou celles qui les commettent. les crimes commis dans l’étranger d’albert ...
generally, this article deals with the challenges and solutions facing the internet security. first, the article discusses the following subjects: the security of communication and information networks, the importance of the networks, the networks security precedence internet and computers crimes, the beginning of computer crimes, classifying computer crimes as well as the solutions proposed to...
This article examines the nature of petty crimes committed by sixteenth century Aberdonian women and the impact they had on burgh society. The evidence presented here challenges the notion that the burgh court charged women with a much more narrow range of criminal activities than men. Over a period of roughly 50 years (15411591), the Aberdeen Council Register and Baillie Court Books record nea...
Classical probability theory (CPT) has represented the rational standard for decision making in human cognition. Even though CPT has provided many descriptively excellent decision models, there have also been some empirical results persistently problematic for CPT accounts. The tension between the normative prescription of CPT and human behavior is particularly acute in cases where we have high...
Computer criminals regularly construct large distributed attack networks comprised of many thousands of compromised computers around the globe. Once constituted, these attack networks are used to perform computer crimes, creating yet other sets of victims of secondary computer crimes, such as denial of service attacks, spam delivery, theft of personal and financial information for performing fr...
Two cases of non-psychotic denied pregnancy are presented and discussed. Following obstetric expertise, the forensic-criminal evaluation should investigate the reported crimes of denied pregnancy associated infanticide or criminal abortion as well as the potential involvement of other persons in these crimes. All this would require close collaboration between obstetricians, psychiatrists and cr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید