نتایج جستجو برای: cybercrime
تعداد نتایج: 1455 فیلتر نتایج به سال:
Long abstract (c.120 words): Relatively little is known about the scale and cost of cybercrime in the UK, as current industry and academic efforts have produced largely unreliable estimates, often focusing primarily on large businesses. To address this, the authors developed one of the first customer surveys centred on the impact and prevalence of cybercrime to the average UK citizen. Just unde...
The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows OS, such as the Registry, slack space and the Windows event log. ...
-------------------------------------------------------Abstract--------------------------------------------------------A lot of people in the world, mostly Nigerian have a limited knowledge of the crime occurring in cyberspace, known as cybercrime. Cybercrime happens in the world of computer and the Internet. This kind of crime has a severe impact on our economy, lives and society, because our ...
Some economies in the Former Soviet Union and Central and Eastern Europe (FSU&CEE) are known as cybercrime hotspots. FSU&CEE economies have shown complex and varied responses to cybercrimes due partly to the differential incentives and pressures they face. This study builds upon literatures on white-collar crime, institutional theory and international relations (IR)/international political econ...
This research work is to bring to light, the danger posed by Cyber Crime in the world generally and Nigeria in particular with the hope that policy makers will work with the recommendations and practical combating framework design of this research work. In order to achieve this, the following approaches were adopted; survey of some common Cybercrime in Nigeria with the frequency of occurrence a...
While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we br...
Cybercrimes have become an eye-catching social problem in not only China but also other countries of the world. Cybercrimes can be divided into two categories and different kinds of cybercrimes shall be treated differently. In this article, some typical cybercrimes are introduced in detail in order to set forth the characteristics of those cybercrimes. However, to defeat cybercrimes, joint effo...
Insider computer abuse, the problem of intentional computer-related crimes by employees, is a costly problem for firms (Warkentin and Willison, 2009). To counter this threat, IT practitioners and IS researchers assess potential antecedents of and motivations for computer abuse intentions among employees. The theory of organizational justice, the techniques of neutralization, and the role of det...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید