نتایج جستجو برای: cybercrime
تعداد نتایج: 1455 فیلتر نتایج به سال:
With the advent of Information and Communication Technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist in a crime scene. Furthermore, various items found in a crime scene ma...
E-fraud is an e-crime that affects society, as a whole, impacting upon individuals, businesses and governments. Recent studies suggest that e-fraud is on the increase and that a lack of awareness, and inappropriate, limited or absent countermeasures have only exacerbated the negative impact of E-fraud to society. The response to e-fraud has concentrated on context specific technical solutions b...
This paper investigates the prevalence of cyber crimes in Ghana and its impact on ICT adoption. Through a qualitative approach, we explore efforts by organizations and organs of government in Ghana towards curtailing cyber crimes in terms of apprehension, prosecution, reporting, and law enforcement. Findings from our research showed that although awareness of cyber crimes is on the increase, th...
A solution to get the problem off, have you found it? Really? What kind of solution do you resolve the problem? From what sources? Well, there are so many questions that we utter every day. No matter how you will get the solution, it will mean better. You can take the reference from some books. And the digital forensics and cyber crime fifth international conference icdf2c 2013 moscow russia se...
South Africa has recently enacted several e-legislation in order to address the escalating e-crime, the rise in electronic abuse and also the indifferences of the past. However, research shows that many organisations including public institutions do not understand these laws and thus, fail to comply with them. One major contributor to this are the inconsistencies found in the legislation. The N...
Our research-in-progress uses Adaptive Structuration Theory to explain the evolving characteristics of cyber-crime – specifically, the increasing use of computing and networking technology by criminals to facilitate financial fraud and theft. Our goal is to understand the processes by which the perpetrators of cyber-crime form technology-based social networks.
The development of technology in the world mobile devices is growing. However, these developments have a detrimental impact, one which cybercrime. Cybercrime crime that uses information technology. One smart phone technologies includes cases cybercrime are often found Indonesia include online prostitution minors. This done by utilizing social media, namely Michat as medium communication. “chat ...
Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well as to detect the threat. The main contribution of this paper is a step towards addressing this by i...
This paper aimed to investigate the role of participatory criminal policy in the prevention of cybercrime. This paper, using different theories and analytical and documentary methods, has tried to investigate this important issue. participatory criminal policy measures to make cyberspace healthy, various measures such as technical measures such as licensing technology and technologies regardi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید