نتایج جستجو برای: computer crime

تعداد نتایج: 598955  

Journal: :Digital Investigation 2004
Monique Mattei Ferraro Andrew Russell

Over the past five years, a large number of agencies have developed specialized units to deal with high technology crimes and Internet crimes against children. The United States currently funds approximately 45 Internet Crimes Against Children Task Forces. This article talks about some of the issues confronting established Internet crimes against children and high technology crime units and exa...

Journal: :Russian Law Journal 2023

Electronic piracy is considered one of the electronic crimes sweeping our world today, and it a crime material nature, which represented in every illegal act or behavior related to any destination way with computers computer networks, that causes victim suffer loss, perpetrator obtains able obtain Any gain. These often aim at stealing information devices, indirectly persons parties concerned in...

2015
Alleyn Conway Joshua James Pavel Gladyshev

Imagine the following scenario: an inexperienced law enforce‐ ment officer enters a crime scene and – on finding a USB key on a potential suspect – inserts it into a nearby Windows desktop computer hoping to find some information which may help an ongoing investigation. The desktop crashes and all data on the USB key and on the Windows desktop has now been potentially compromised. However, the ...

2014
Sharad Gangele Dr. Diwakar Shukla

Abstract— Cybercrime is a fast growing area of research, it covers any illegal activity that uses a computer as its primary means of commission. More and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities. In the same line Naldi (2002) proposed internet traffic share problem in a new look by using markov chain. Thi...

2017
Kirill Levchenko

Real software systems are messy. They are too ill-specified and complex to reason about formally, yet they face, and must defend against, security threats that were never contemplated in their original design. To address these computer security challenges, we have turned to empirical methods. Computer security has evolved from a prescriptive engineering discipline into a experimental science th...

Journal: :JoWUA 2012
Clara Maria Colombini Antonio Colella

Nowadays the investigations are becoming more difficult than in the past due to the complexity of the scene of crime and the implication that the technology has in this new environment. This article describes a new technique called “Digital Profiling”. The technique is an investigative method of computer forensics that offers a new prospective for analyzing digital memories of electronic device...

2006
Nick Malleson

The candidate confirms that the work submitted is their own and the appropriate credit has been given where reference has been made to the work of others. I understand that failure to attribute material which is obtained from another source may be considered as plagiarism. Summary Occurrences of crime are complex phenomenon. They are the result of a vast number of interrelated factors which can...

Journal: :Doctrina 2021

All kinds of illegal trafficking, prostitution, pornography, gambling, fraud and counterfeiting, computer crime, corruption, piracy, immigration many other criminal activities can pose a threat to national even international security if conducted by larger groups or organizations. The phenomenon organized crime has acquired transnational character due the increasing globalization financial mark...

2011
Clara Maria Colombini Antonio Colella

Nowadays investigations have become more difficult than in the past. It is already clear that, in modern crime scene, a vast amount of evidence are in the electronic or digital form and that the computer system or network have a paramount role in researching of indicators and evidence. The correct analysis of log file and the data saved in the system memory, in this new scenario, are crucial fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید