نتایج جستجو برای: cybercrime
تعداد نتایج: 1455 فیلتر نتایج به سال:
At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime (Mann and Sutton 1998; Brenner 2002). In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper ex...
Technology has supposed a profound paradigm shift in human evolution, following Haraway’s cyborg metaphor we have forged a profound psycho-social rapport machines. This connectivity has also brought changes in crime patterns and fostered the development of cybercrime. From a criminological perspective, this work aims to explore the role of Per-Olof Wikströms Situational Action Theory in explain...
The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is undoubtedly education aimed at establishing greater a...
Due to the development of networks, cybercrime has many crime types, including network attack, mail fraud, intimidation, copyright infringement, and so on. For network attacks, many approaches have been proposed and used to detect and defense. However, after the network attack is confirmed or other crime exists, it still need to execute the investigation procedure by the investigators, collect ...
Background: Our lives have tremendously changed because of technological innovations. Over the last few decades, there has been a remarkable increase in the use and reliance on internet and digital technology for research, education, healthcare, business and even fun. Despite the valuable convenience and benefits technology has added to our life styles, there is a serious risk associated with t...
This study investigated cybercrime in Assessment among students Rivers State University, Port Harcourt. Two research questions and two corresponding null hypotheses guided the study. Descriptive survey design was adopted for A sample of 400 year III were drawn from population through stratified proportionate sampling technique used An instrument titled “Cybercrime Scale” (CAS) data analysis. Th...
A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and supporting the development of new techniques and tools for investigators. In this paper a model of investigations is presented which combines the existing models, generalises them, and extends them by explicitly addressing certain activities not included in them. Unlike prev...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید