نتایج جستجو برای: cyber crimes
تعداد نتایج: 23947 فیلتر نتایج به سال:
Abstract Internet fraud remains a problem in Ghana and thus attracts the attention of teachers, researchers, civil society organisations, state policymakers. Existing studies on focused reasons, combat strategies, cyber spiritualism, impact individuals country, inadequate legal frameworks for handling such cybercrimes. Despite efforts by government other interest groups fighting menace, phenome...
The establishment of two international ad hoc tribunals for Rwanda and the former Yugoslavia, and the creation of an International Criminal Court within the next fi ve years, has increased the need for archaeologists who can assist in the exhumation of individual and mass graves associated with war crimes and genocide throughout the world. This work examines the efforts of teams of archaeologis...
This chapter describes the state of technology for studying Internet crimes against children, specifically and . We begin by presenting a survey of relevant research articles that are related to the study of . This survey includes a discussion of our work on the classification of chat logs that contain or . Many commercial enterprises have developed to monitor these behaviors, and the latest ve...
E-mail has revolutionized business, academic, and personal communication The advantages of e-mail include speedy delivery, ease of communication, cost effectiveness, geographical independence, and the portability of mailboxes. The last two are the biggest advantages over snail mail. However, with e-mail comes the threat of a genuine user being compromised through key loggers, social engineering...
The development of information technology have an impact on cyber crimes such as identity theft, fraud, and misuse personal data. One the crimes, abuse data is doxing. It was illegal act to spreading action people's or without permission creates dangerous situations, humiliation, harassment, other adverse which can lead spoilage victims. doxing disseminating has recently increased, especially a...
The novel coronavirus has made an impact on virtually every aspect of our lives. current study utilizes secondary data to identify patterns and trends related shifting crime from the physical cyber domain. With millions, if not billions, people staying at home, attackers now look for new ways commit crimes. Our findings indicate that while a lot crimes such as robbery, assault, rape, murder hav...
The Financial Institutions of India and the banking sector has undergone massive revolution over past three decades in order to cater financial needs for all most efficient yet simple manners. Digitalization enabled users access their accounts carry on transactions without physical presence. But this advancement also given rise various crimes which exploit linchpins limitations these systems. S...
Our Indian government has set a goal of creating 100 smart cities that will use technology such as grids, phones, and various monitoring devices to generate large amount data. Traditionally, data centres have been in charge these files. One the most pressing issues is resource management. efficient strategy address this issue best method for handling data, when we're talking about Smart Cities,...
Diverse depictions of the WWII German army exist in Japanese popular culture. This essay will explore the origins of the Japanese fandom devoted to German military technology and also the way that authors have (re)produced stereotypes related to German culture and traditions in their portrayals of wartime Germany. Finally, using examples by authors Tezuka Osamu and Aramaki Yoshio, this essay wi...
Over the past five years, a large number of agencies have developed specialized units to deal with high technology crimes and Internet crimes against children. The United States currently funds approximately 45 Internet Crimes Against Children Task Forces. This article talks about some of the issues confronting established Internet crimes against children and high technology crime units and exa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید