نتایج جستجو برای: cybercrime
تعداد نتایج: 1455 فیلتر نتایج به سال:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated b...
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...
: Cybercrime is defined as an unlawful act that utilizes computer technology based on the sophistication of development internet technology. The difficulty obtaining evidence and proving cybercrime a new problem in resolving case. validity fulfilling terms conditions both formal material aspects. purpose this paper to find out how provisions cybercrime. Abstrak didefinisikan sebagai perbuatan m...
IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. We describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a given IP packet was sent by a particular network subscriber. This capabi...
Description: Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to. Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpe...
The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending citizens from harm delivered through exploit kits. In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a wide ran...
Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic psychosocial proposed by Lazarus (2019) to investigate whether hold different perceptions of digital crimes across these two dimensions. Informed synergy feminist theory Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential (online fraud) (cyberbull...
This chapter describes the state of technology for studying Internet crimes against children, specifically and . We begin by presenting a survey of relevant research articles that are related to the study of . This survey includes a discussion of our work on the classification of chat logs that contain or . Many commercial enterprises have developed to monitor these behaviors, and the latest ve...
this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید