نتایج جستجو برای: computer crime
تعداد نتایج: 598955 فیلتر نتایج به سال:
Security plays a big part in today’s world of computers, e-commerce and the Internet. Technology however, has brought with it, the evils of crime. We thus need laws to protect those who maybe exposed to these new threats. In this paper, I will discuss the issues faced by the legal system in keeping up with the fast paced development of technology, the ways in which the current laws can help, an...
Security plays a big part in today’s world of computers, e-commerce and the Internet. Technology however, has brought with it, the evils of crime. We thus need laws to protect those who maybe exposed to these new threats. In this paper, I will discuss the issues faced by the legal system in keeping up with the fast paced development of technology, the ways in which the current laws can help, an...
We are living in the era of science and technology and it have infused with many aspects of our everyday life. With the advent of newer technologies the criminals have made full use of it which sometimes facade a challenging task to investigators such as forensic experts to catch the crime. This paper will discuss the need for computer forensics and application of technologies to be practiced i...
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the curre...
چکیده ندارد.
امروزه در نظام قانونگذاری کیفری ایران با دو نوع بزه جعل روبه رو هستیم؛ یکی جعل سنتی (کلاسیک) و دیگری جعل رایانه ای می باشد. جعل رایانه ای همانند سایر جرایم رایانه ای زاییده انقلاب فن آوری اطلاعات و در واقع به منصه ظهور رسیدن رایانه و فضای سایبر می باشد. اگر چه در جعل سنتی ممکن است با استفاده از رایانه موجبات تحقق این بزه فراهم گردد ولی مراد از استفاده از رایانه در بزه جعل رایانه ای در واقع جعل ...
An intertemporal general equilibrium model of criminal behavior is used to analyze the effect on crime of changing policy parameters. The policy parameters are the length of the prison term, the severity of punishment, and the amount of police resources. The number of crimes in society can be decomposed into an incentive part, an incarceration part, and a crime competition part. The magnitudes ...
In an in uential paper in the June 1997 American Economic Review, Steven Levitt argues that there is an electoral cycle in police hiring, with faster hiring in election years and slower hiring in other years. He then uses elections as an instrument for police hiring to estimate the causal effect of police on crime. This comment points out that a weighting error in Levitt’s estimation procedure...
In our network connected society, intrusion becomes a new form of trespassing, one which quite often leads to significant problems and poses great risks for the individual and for businesses, which are increasingly relying on modern information systems. The main appearances of intrusion, in the Information Society, are those concerning privacy intrusion and intrusion into information systems. I...
Abstract According to recent legislative initiatives, non-consensual pornography is a crime in several countries and social media providers have duty provide their users easy use mechanisms report abuses. In this paper, we analyse the state of art interfaces for reporting from victim’s perspective. Firstly, analysed 45 content sharing platforms where aggressors might post pornography. The analy...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید