نتایج جستجو برای: cybercrime

تعداد نتایج: 1455  

2005
William Blair Gillam Marc Rogers

Since the National Institute of Justice (NIJ) released their Electronic Crime Needs Assessment for State and Local Law Enforcement study results in 2001, several critical strides have been made in improving the tools and training that state and local law enforcement organizations have access to. One area that has not received much attention is the computer crime first responder. This paper focu...

2011
Yong-Dal Shin

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

2011
Himanshu Maheshwari Harvey S. Hyman Manish Agrawal

While most individuals and businesses use the Internet as a communication medium to learn and to socialize, other individuals and groups use the Internet as a medium for criminal purposes. The Internet has positively transformed many legitimate business activities, lowering costs and accelerating transaction speed. It has also served as a platform for criminals who strategize online and attack ...

2015
Kristin Finklea

"Who did it?" Attribution, some may argue, is a challenge "as old as crime and punishment." In the cyber realm too, criminal attribution is a key delineating factor between cybercrime and other threats. When investigating a given incident, law enforcement is challenged with tracing the action to its source and determining whether the actor is a criminal or whether the actor may be a terrorist o...

Journal: :Razvitie territorij 2022

The article is devoted to the study of problems spread cybercrime, which has recently become very popular. We analyze information about crimes committed with use and telecommunication technologies in Russia 2019-2022. consider development actual threats by quarters for 2019-2022: mobile threats, new modifications encryptors, banking Trojans, Trojan-extortionists. Statistical analysis cybercrime...

Journal: :European Journal of Business Science and Technology 2017

Journal: :Zbornik radova Pravnog fakulteta Nis 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید