نتایج جستجو برای: cybercrime
تعداد نتایج: 1455 فیلتر نتایج به سال:
Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim’s health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the nu...
We review the cybercrime literature to draw attention to the many occasions on which authors have identified concentrations within criminal activity. We note that the existence of concentrations often leads authors to suggest that concentrations, or ‘choke points’ are amenable to effective intervention. We then discuss the reasons that concentrations are observed – it is often the result of the...
Computers and the internet have become essential in areas such as professional life, interpersonal communication, finances, and leisure. Most scholars agree that the Internet has had a major impact upon criminality [1,2]. The increased use of computers and the fact that internet connects (almost) everybody to (almost) everybody else in the world has made crime considerably easier to perpetrate ...
This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharin...
The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows operating system, such as the Registry, slack space and the Windo...
This paper is built upon the need that digital forensic investigators are required in many cases to investigate, understand and report on all kind of cyber-crime including novel security breaches which have not been performed in the past. When an investigator is faced with the challenge to explore a new threat, we argue that the inquiry dynamics do not differ from an organisational employee cha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید