نتایج جستجو برای: cyber crimes
تعداد نتایج: 23947 فیلتر نتایج به سال:
illicit drug abuse continues to be a growing problem worldwide and a serious hazard to humanity. the crimes associated with drug abuse include sale or possession of drugs; property crimes or prostitution to support drug habits; and violent crimes reflecting out-of-control behavior. in fact, an offender drug use is involved in more than half of all violent crimes and in 60 to 80 percent of child...
Background and Objectives: The use of virtual networks has become a natural modern behavior, but the traumatic forms of their use have also received much attention in the last two decades. This study aimed at modelling structural relations of cyber-aggression based on perceived stress with the mediating role of virtual networks dependency in students of Mohaghegh Ardabili University in 2019. M...
Corporate crime is an extra pervasive and general term, including a broad spectrum of crimes. In spite of the importance and sensitivity, these crimes, has always been in the margin of the criminological considerations and the most criminological studies, theories and courts functions has devoted to violent or street crimes. Combating against corporate crime (as one type of the white collar c...
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
Illicit drug abuse continues to be a growing problem worldwide and a serious hazard to humanity. The crimes associated with drug abuse include sale or possession of drugs; property crimes or prostitution to support drug habits; and violent crimes reflecting out-of-control behavior. In fact, an offender drug use is involved in more than half of all violent crimes and in 60 to 80 percent of child...
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. Assume surveillance has identified suspect traffic such as child porn downloading traffic on the Internet. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is how to correlate the private wireless...
Online social networks, such as Facebook, Twitter, LinkedIn, etc., have grown exponentially in recent times with a large amount of information. These networks huge volumes data especially structured, textual, and unstructured forms which often led to cyber-crimes like cyber terrorism, bullying, extracting information from these has now become serious challenge order ensure the safety. In this w...
Digital forensic analysis Neural networks a b s t r a c t Post-event timeline reconstruction plays a critical role in forensic investigation and serves as a means of identifying evidence of the digital crime. We present an artificial neural networks based approach for post-event timeline reconstruction using the file system activities. A variety of digital forensic tools have been developed dur...
BACKGROUND The aim of this study was to assess the prevalence of potential environmental and psychopathological risk factors, with special focus on symptoms of attention-deficit/hyperactivity disorder (ADHD), in a sample of adolescent offenders in relation to the type of crime committed. METHODS The assessment included data collection and administration of clinical standardized scales such as...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید