Fighting theft of cell phones containing personal data: problems and solutions

نویسندگان

چکیده

In recent years the problem of fighting cell phones theft has been still relevant. At present stage development criminological thought, issues combating phone remain topical, require constant research and specific preventive measures.
 Today, a mobile can be compared to full-fledged pocket computer, where each user, depending on his preferences needs, download one or another application (entertainment, communication, navigation, etc.) that he needs solve problems. Every year technological characteristics sold territory Russian Federation become more perfect. The is not only means communication; it had multifunctional properties also contained confidential information. Having stolen any criminal get an access such information able commit others serious crimes against victim. These are analyzed by author this article. article formulates measures fight ensure security personal data in cases if phone.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fighting Child Labor Abroad: Conceptual Problems and Practical Solutions

Child labor is a topic that evokes deep emotions and a growing international concern. Most recent ILO estimates show that some 211 million children between 5 and 14 are engaged in some form of economic activity, and 119 million of them are engaged in haz­ ardous work. The poverty implications of child labor are often transmitted from parents to children, a process that is called the dynastic po...

متن کامل

P-45: Cell Phones and Male Infertility

Background: Cell phones have become a vital part of everyday life. However, the health risks associated with their usage are often overlooked. Materials and Methods: MEDLINE, EMBASE, Cochrane Library and CINAHLPUBMED were searched for relevant trials published from respective database inception dates to Jun 2011. Results: Recently, evidence from several studies supports a growing claim that cel...

متن کامل

Personal messages reduce vandalism and theft of unattended scientific equipment

Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended s...

متن کامل

problems and strategies of translating persian lexical collocations into english: the case of noun-verb and noun-adjective collocations

در محیط های دانشگاهی ایران ، آموزش ترجمه واژگان هم آیند که به منزله امری لاینفک برای دانش جویان رشته مترجمی زبان می باشد، تا حدود زیادی نادیده گرفته شده است . این واقعیت باعث شده است تا دانش جویان رشته مترجمی زبان در ترجمه ی واژگان هم آیند اشتباهات بسیاری مرتکب شوند. این پژوهش توجه ویژه ای به ترجمه واژگان هم آیند داشته است. برای مشخص نمودن مشکلات و استراتژی های مورد استفاده ی دانش جویان در ترجم...

15 صفحه اول

Data Breaches and Identity Theft

This paper presents a monetary-theoretic model to study the implications of networks’ collection of personal identifying data and data security on each other’s incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data collection and too little security arise in equilibrium with noncooperative networks compared with the e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vestnik Sankt-Peterburgskogo universiteta MVD Rossii

سال: 2022

ISSN: ['2071-8284']

DOI: https://doi.org/10.35750/2071-8284-2022-2-108-113