نتایج جستجو برای: cybercrime

تعداد نتایج: 1455  

2014
Ian Cleland Timothy Patterson Chris D. Nugent Federico Cruciani Norman D. Black Cristiano Paggetti

Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim’s health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the nu...

2015
Richard Clayton Tyler Moore Nicolas Christin

We review the cybercrime literature to draw attention to the many occasions on which authors have identified concentrations within criminal activity. We note that the existence of concentrations often leads authors to suggest that concentrations, or ‘choke points’ are amenable to effective intervention. We then discuss the reasons that concentrations are observed – it is often the result of the...

2017
Gaurav Misra Marianne Junger Lorena Montoya

Computers and the internet have become essential in areas such as professional life, interpersonal communication, finances, and leisure. Most scholars agree that the Internet has had a major impact upon criminality [1,2]. The increased use of computers and the fact that internet connects (almost) everybody to (almost) everybody else in the world has made crime considerably easier to perpetrate ...

2015
Michele Maasberg Charles Liu

This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharin...

2012
Nurdeen M. Ibrahim Hamid Jahankhani R. Bashroush

The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows operating system, such as the Registry, slack space and the Windo...

2009
Peter M. Bednar Vasilios Katos

This paper is built upon the need that digital forensic investigators are required in many cases to investigate, understand and report on all kind of cyber-crime including novel security breaches which have not been performed in the past. When an investigator is faced with the challenge to explore a new threat, we argue that the inquiry dynamics do not differ from an organisational employee cha...

Journal: :Journal of Accounting and Management Information Systems 2017

Journal: :Journal of Global Information Technology Management 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید