نتایج جستجو برای: computer crime
تعداد نتایج: 598955 فیلتر نتایج به سال:
Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in the fields of psychology and criminology, a number of questions regarding this population remain. Does Gottfredson and Hirschi’s concept of low self-control predict the unauthorized access of computer systems? Do computer hackers have low levels of self-control, as has ...
Artificial crime analysis and crime simulation is an emerging research area that has the potential of revealing hidden processes behind urban crime patterns and criminal justice system operations. This book takes an interdisciplinary approach, combining criminology, computer simulation, and geographic information systems to examine how crime patterns form and what can be done to prevent crime. ...
RAM content acquisition is an important step in live forensic analysis of computer systems. FireWire offers an attractive way to acquire RAM content of Apple Mac computers equipped with a FireWire connection. However, the existing techniques for doing so require substantial knowledge of the target computer configuration and cannot be used reliably on a previously unknown computer in a crime sce...
Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The finding...
Baggili, Ibrahim M. Ph.D. Purdue University, August 2009. Effects of anonymity, selfreported pre-employment integrity and self-reported antisocial behavior on self-reported cyber crime engagement: An exploratory study. Major Professor: Marcus Rogers. A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the...
Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving informa...
This study examined news readers’ memories of race-related facial features of an individual pictured in the news. Participants were presented with a series of news stories, including one of four different versions of the news story of interest: nonstereotyped, stereotyped/noncrime, nonviolent crime, violent crime. Each of the four versions contained a photograph of an individual who was the foc...
! Prior work in architectural and urban studies suggests that there is a strong correlation between people dynamics and crime activities in an urban environment. These studies have been conducted primarily using qualitative evaluation methods, and as such are limited in terms of the geographic area they cover, the number of respondents they reach out to, and the temporal frequency with which th...
Description: Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to. Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید