نتایج جستجو برای: computer crime
تعداد نتایج: 598955 فیلتر نتایج به سال:
Thoroughly and consistently calculating losses from computer intrusions is a difficult endeavor because security incidents are characterized by intangible harms like interference with system availability and interference with the integrity of data. These harms can be difficult to translate into monetary terms. More easily measured are labor and hardware costs associated with repairing and resto...
Analysis of incidence and impact trends mined from recent computer crime survey data has yielded circumstantial evidence in support of the previously proposed concept of the ‘inverse CSI effect’, operating in the cyber-crime domain. The implications of this finding for digital forensics and e-crime investigations are discussed.
The aim of this study is to explore research trends in computer crime and cybercrime from 1968 to 2009. The findings of the current study will provide some insight into scholarly activity related to computer crime and cybercrime and will be useful in tracking computer user’s illegal behavior research trends. Our other goal is to explore the range of the theoretical lens that can be used to unde...
Financial crime has significantly increased in the modern era. Technology advances have made possible instant electronic telecommunications among users through the development of high speed computer networks. Criminals take advantage of the anonymity offered by computer networks and cast their nets with alluring bait to attract inexperienced victims. In this study various disinformation methods...
There are challenges faced in today’s world in terms of crime analysis when it comes to visualization and analysis of data in fighting crime. Activities of criminals in terms of who they communicate with, and how they are linked and related with other groups is very difficult to visualize and follow using traditional investigative procedures. In this world of terrorism, it is very important to ...
A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...
In today’s security conscious environment, the primary concern of security professionals and police departments is to protect the lives and property of citizens. Any act that causes loss of lives and harms people is called as crime. Crime analysis, a part of criminology, is a task that includes exploring and detecting crimes and their relationships with criminals. Presently there are several cr...
The Crime investigation department have very significant role in police system in all countries in the world. Computer systems are placed in almost all police stations to store and retrieve the crimes and criminal data and for subsequent reporting. For crime analysts, it is a challenging, time-consuming to determine who have been committed crimes from the large set of crimes that are happening ...
This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید