نتایج جستجو برای: computer crime
تعداد نتایج: 598955 فیلتر نتایج به سال:
Abstract Criminological literature on crime and deviance in cyberspace has boomed recent years with most studies focusing computer integrity crimes, content crimes financial cybercrimes, also discussing the opportunity to consider some of these as profit-driven forms organised crime. The existing literature, however, not addressed extensively yet impact emergence proliferation cyber affordances...
Prevention of computer crime includes two types of action: first, enhancement of computer security, and second, moral education adjusted to the IT environments. The latter is the main theme of the paper. Research on moral conduct in the IT environment is currently being carried out under the heading of cyberethics. New trends in cyberethics are discussed, aimed at reducing harmful effects of ad...
Computer mapping is a rapidly developing technique that can assist police departments in a variety of ways. Computer mapping techniques can be classified into three general categories: descriptive, analytical and interactive mapping. Descriptive mapping shows data in a pin map or shaded area format. Analytical mapping starts with analysis of data followed by automatically displaying the results...
In this paper, we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is te...
In this paper we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is ter...
BACKGROUND Various forms of community disorder are associated with health outcomes but little is known about how dynamic context where an adolescent spends time relates to her health-related behaviors. OBJECTIVE Assess whether exposure to contexts associated with crime (as a marker of community disorder) correlates with self-reported health-related behaviors among adolescent girls. METHODS ...
Crime maps have only recently begun to emerge as a significant tool in crime and justice. Until a decade ago, few criminal justice agencies had any capability for creating crime maps, and few investigators had the resources or patience to examine the spatial distribution of crime. Today, however, crime mapping is experiencing what might be termed an explosion of interest among both scholars and...
CRIME has always the very first thing that people want to avoid and police officer want to stop. A major challenge facing all lawenforcement and intelligence –gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Crime activity reports available from victims, governmental organizations, news press, and social networks play a significant role in publi...
Since physical crimes committed on the street against children typically occur during school commutes, there is an urgent need to address Japanese mothers’ fear of such crimes. Although previous studies have proven that several elements affect parents’ crime, these been evaluated individually, and little analysis crime using computer graphics (CG) visualize scenes. In this study, 96 montage pho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید