نتایج جستجو برای: cybercrime

تعداد نتایج: 1455  

2014
K. Alese Boniface K. Adu Michael

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated b...

Journal: :Future Internet 2014
Alastair Irons Harjinder Singh Lallie

In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...

Journal: :Mahkamah 2022

: Cybercrime is defined as an unlawful act that utilizes computer technology based on the sophistication of development internet technology. The difficulty obtaining evidence and proving cybercrime a new problem in resolving case. validity fulfilling terms conditions both formal material aspects. purpose this paper to find out how provisions cybercrime. Abstrak didefinisikan sebagai perbuatan m...

2011
Andreas Haeberlen Pedro Fonseca Rodrigo Rodrigues Peter Druschel

IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. We describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a given IP packet was sent by a particular network subscriber. This capabi...

1998
Donn B. Parker

Description: Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to. Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpe...

2015
Birhanu Eshete Abeer Alhuzali Maliheh Monshizadeh Phillip A. Porras V. N. Venkatakrishnan Vinod Yegneswaran

The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending citizens from harm delivered through exploit kits. In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a wide ran...

Journal: :Journal of Cybersecurity Research (JCR) 2017

Journal: :The Howard journal of crime and justice 2022

Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic psychosocial proposed by Lazarus (2019) to investigate whether hold different perceptions of digital crimes across these two dimensions. Informed synergy feminist theory Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential (online fraud) (cyberbull...

2009
Lynne Edwards Amanda Leatherman

This chapter describes the state of technology for studying Internet crimes against children, specifically and . We begin by presenting a survey of relevant research articles that are related to the study of . This survey includes a discussion of our work on the classification of chat logs that contain or . Many commercial enterprises have developed to monitor these behaviors, and the latest ve...

Journal: :international journal of management and business research 2012
ismaila adeleke ade ibiwoye folake olowokudejo

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید