نتایج جستجو برای: computer crime
تعداد نتایج: 598955 فیلتر نتایج به سال:
Previous research suggests a link between Attention Deficit Hyperactivity Disorder (ADHD) and criminal behaviour. The present study explored the relationship ADHD symptoms cyberdeviance. 170 participants completed an online questionnaire measuring computer crime behaviour, symptoms, impulsivity. A statistically significant was found Cyberdeviance, Regression analysis showed that hyperactivity g...
In this paper I will discuss computer evidence. The law enforcement agencies are at the cross road of the new technology. These days, some crimes are committed by using computer and often the offender is located miles away from the victim. That kind of crime (fraud, threat, DoS and other) is very hard to resolve. Investigators have to perform searches on computer. To make sure that the searches...
1. There is a way of thinking about law that contemporary normative theorists on criminalization and legal punishment are particularly anxious about, and that way is to conceive law as involving legal coercion in the manner of threats. This way of conceiving law is unsurprising, especially when we look at criminal law; it prescribes requirements of conduct (e.g. do not murder) for which we are ...
OBJECTIVE The authors studied all defendants in Baltimore City's circuit and district courts who pleaded not criminally responsible, Maryland's version of the not guilty by reason of insanity plea, during a 1-year period. The study was designed to compare the perception that the insanity plea is misused to actual outcome data. METHOD The cohort of defendants who pleaded not criminally respons...
Criminal acts of a computer crime are no longer new social and legal phenomenon. In addition to the execution criminal that fall within domain crime, computers have found their application in so-called classic acts, giving them different modus operandi. A spatial distance between action taken resulting consequences during led strengthening transnational crime. Initially, international community...
1. Introduction Traditional information security research focuses on defending systems against attack before they happen. More recently, security auditing has evolved to intrusion detection systems that are concerned with recognizing attacks and taking action to curb further damage at the time of the attack. Comparatively little research has focused on after the fact investigation, partly becau...
Computer crime has escalated considerably over recent years and has become a very serious problem that costs governments, organisations and general computer user’s significant losses annually. The Internet provides endless connectivity to billions of users around the world which has greatly influenced the flow of information. As revolutionary as this has been, the associated benefits have exten...
To find out the evidence of crime-related evidence and association rules among massive data, the classic decision tree algorithms such as ID3 for classification analysis have appeared in related prototype systems. So how to make it more suitable for computer forensics in variable environments becomes a hot issue. When selecting classification attributes, ID3 relies on computation of information...
Background & Aims: Pornography in cyberspace is one of the emerging and multidimensional challenges in society. Each discipline offers different criteria, reasons, perspectives and solutions according to their point of view; But this multidimensional phenomenon has involved all aspects of human societies in individual and group dimensions and has left negative consequences. The aims of this stu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید