نتایج جستجو برای: cybercrime

تعداد نتایج: 1455  

2008
Aaron J. Burstein

The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially applicable. Moreover, even when the law permits a research activity, researchers may wonder whether it is ethically perm...

pazhouhesh, amin, zamani, afsaneh,

This paper tries to investigate the question of how virtual cybercrimes fall within the realm of criminal law and what their principles and conditions of criminalization are. Despite the large number of Internet users in virtual worlds, such as "Second Life", there has been limited literature and research especially on the extent and scope of the issue, the identity of the perpetrators and vict...

2017
Gibson Mba Jeremiah Onaolapo Gianluca Stringhini Lorenzo Cavallaro

Most of cyberscam-related studies focus on threats perpetrated against the Western society, with a particular attention to the USA and Europe. Regrettably, no research has been done on scams targeting African countries, especially Nigeria, where the notorious and (in)famous 419 advancedfee scam, targeted towards other countries, originated. However, as we know, cybercrime is a global problem af...

2012
Paul Stephens

This paper outlines models for the process of course selection and the development process used for producing the Linux as an Investigative Tool and Forensic Scripting Using Bash courses. These modules were developed as part of the ISEC 2008 Project, titled: “Developing and disseminating an accredited international training programme for the future”. The two courses are part of an MSc accredite...

Journal: :CoRR 2017
Nathan Goodman

Botnets have come a long way since their inception a few decades ago. Originally toy programs written by network hobbyists, modern-day botnets can be used by cyber criminals to steal billions of dollars from users, corporations, and governments. This paper will look at cutting-edge botnet features and detection strategies from over a dozen research papers, supplemented by a few additional sourc...

Journal: :Digital Evidence and Electronic Signature Law Review 2016

Journal: :Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 2021

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید