نتایج جستجو برای: crime and security

تعداد نتایج: 16851944  

Journal: :EJIS 2006
Robert Willison James Backhouse

Received: 22 July 2003 Revised: 28 January 2005 2nd Revision: 21 September 2005 3rd Revision: 8 December 2005 Accepted: 16 December 2005 Abstract Systems risk refers to the likelihood that an Information System (IS) is inadequately protected against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ thr...

ژورنال: حقوق پزشکی 2019

One of the challenging issues in the principles of jurisprudence and especially the rights of Iran, the question of the possibility or impossibility of carrying out the punishment on crimes committed by twin attached to this issue on two axes: the possibility or impossibility of separating them in terms of ordering the separation of the Clinging can be done. The findings have shown that, first...

2016
Sebastian Galiani Ivan Lopez Cruz Gustavo Torrens Gary S. Becker

This paper develops a model of the geographic distribution of crime in an urban area. Agents select their occupation, residence, consumption, and housing. The paper is the first to formally study how the location of crime, the residence of workers, and housing prices are affected by the spatial allocation of police protection. It examines two opposite strategies of police deployment: concentrat...

Journal: :CoRR 2009
Azeez Nureni Ayofe Osunade Oluwaseyifunmitan

Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international perspective on fighting Cybercrime. This work seeks to define the concept o...

2009
Philip J. Cook

Crime control deserves priority in urban policymaking. High crime rates are a drag on community development and a great burden on households that cannot afford to relocate. Successful control of theft, vandalism, public disorder (often associated with drug selling), and especially violence set the stage for increasing property values, investment, job growth, and a higher standard of living. The...

2011

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this cyber security cyber crime and cyber forensics applications and perspectives, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The success can be started by k...

2004
DAVID MANN

This paper is primarily concerned urith criminal activities in the publicly accessible areas of the Internet known as newsgroups. Findings are presented from a small scale exploratory study of two Internet newsgroups and a tentative model of the structure of these newsgroups is proposed. Members of both newsgroups disseminated information and products to those who might wish to commit crimes. O...

1995
Geoffrey C. Barnes

As the criminology of place becomes more refined, we become more inclined to put our knowledge into action. Police agencies and others concerned with the security industry have begun to use place-specific crime analyses, and then develop tailored responses to correct the problems of discrete locations. Often, these plans of action include the use of some type of situational crime prevention to ...

2005
Michael Kyobe

While small organizations are encouraged to adopt e-commerce, the impact of ecrime and the growing negative attitude of these organisations towards good security practices have been ignored. This study investigated e-crime and computer security issues facing small organizations and home Internet users in South Africa. The purpose was to report on the current state of these issues as well as hel...

2013
Jose R. Agustina

As cyber crime has proliferated exponentially across the globe, those in the criminal justice field have lacked suitable and updated knowledge concerning the pedestrian reality of modern cyber crime. Popular media has created an image of cyber crime that suggests a lone hacker breaking through seemingly impossible security measures to access lucrative secret data. Crimes like these are very rar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید