نتایج جستجو برای: computer crime

تعداد نتایج: 598955  

Journal: :Trends in Organized Crime 2023

Abstract Criminological literature on crime and deviance in cyberspace has boomed recent years with most studies focusing computer integrity crimes, content crimes financial cybercrimes, also discussing the opportunity to consider some of these as profit-driven forms organised crime. The existing literature, however, not addressed extensively yet impact emergence proliferation cyber affordances...

2004
A. Voiskounsky

Prevention of computer crime includes two types of action: first, enhancement of computer security, and second, moral education adjusted to the IT environments. The latter is the main theme of the paper. Research on moral conduct in the IT environment is currently being carried out under the heading of cyberethics. New trends in cyberethics are discussed, aimed at reducing harmful effects of ad...

1995
Thomas McEwen Faye S. Taxman

Computer mapping is a rapidly developing technique that can assist police departments in a variety of ways. Computer mapping techniques can be classified into three general categories: descriptive, analytical and interactive mapping. Descriptive mapping shows data in a pin map or shaded area format. Analytical mapping starts with analysis of data followed by automatically displaying the results...

Journal: :IJESDF 2012
Stavroula Karayianni Vasilios Katos Christos K. Georgiadis

In this paper, we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is te...

2011
Stavroula Karayianni Vasilios Katos

In this paper we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is ter...

2013
Sarah E. Wiehe Mei-Po Kwan Jeff Wilson J. Dennis Fortenberry

BACKGROUND Various forms of community disorder are associated with health outcomes but little is known about how dynamic context where an adolescent spends time relates to her health-related behaviors. OBJECTIVE Assess whether exposure to contexts associated with crime (as a marker of community disorder) correlates with self-reported health-related behaviors among adolescent girls. METHODS ...

2006
David Weisburd Tom McEwen

Crime maps have only recently begun to emerge as a significant tool in crime and justice. Until a decade ago, few criminal justice agencies had any capability for creating crime maps, and few investigators had the resources or patience to examine the spatial distribution of crime. Today, however, crime mapping is experiencing what might be termed an explosion of interest among both scholars and...

2014
K. Nalini

CRIME has always the very first thing that people want to avoid and police officer want to stop. A major challenge facing all lawenforcement and intelligence –gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Crime activity reports available from victims, governmental organizations, news press, and social networks play a significant role in publi...

Journal: :Journal of Asian Architecture and Building Engineering 2023

Since physical crimes committed on the street against children typically occur during school commutes, there is an urgent need to address Japanese mothers’ fear of such crimes. Although previous studies have proven that several elements affect parents’ crime, these been evaluated individually, and little analysis crime using computer graphics (CG) visualize scenes. In this study, 96 montage pho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید