Academic literature on the topic 'Computer crimes Computer crimes Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer crimes Computer crimes Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer crimes Computer crimes Computer networks"

1

Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.

Full text
Abstract:
Unfortunately, along with positive achievements, informatization also has negative manifestations, namely, the possibility of using computer technology to commit crimes. The world has long been talking about "cy-bercrime" about "computer crime," and chapter 16 of the Criminal Code of Ukraine deals with crimes in the use of computers, computer systems and networks, as well as telecommunications. Therefore, we can state that a unified approach to the definition of a concept does not exist. However, the introduction of certain norms into the law does not solve the problems. Problems arise with th
APA, Harvard, Vancouver, ISO, and other styles
2

М.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.

Full text
Abstract:
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the m
APA, Harvard, Vancouver, ISO, and other styles
3

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
APA, Harvard, Vancouver, ISO, and other styles
4

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Full text
Abstract:
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement,
APA, Harvard, Vancouver, ISO, and other styles
5

Futra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.

Full text
Abstract:
Cyber ​​Crimeis a form of virtual crime by utilizing computer which connected to the internet network, and exploiting other devices or computers that is connected to the internet. Cybercrime was previously regulated in the regulation Number 36 Year 1999 concerning Telecommunications, however this regulation has not been able to accommodate virtual and computer crimes. To anticipate the development of information technology, regulation Number 19 Year 2016 concerning Amendments to regulation Number 11 of 2008 concerning Electronic Information and Transactions was issued. In Sawahlunto City in 20
APA, Harvard, Vancouver, ISO, and other styles
6

Rostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.

Full text
Abstract:
<p class="a">By development of computer networks, computer -related crime spreading immoral that had negative impact on social systems including families and organizations and, more children were invaded by, the spread of computer crimes in the third world called cultural invasion.</p><p class="a">Committing dishonest acts in ignorance or belief that the right to intervene in the operation of computer systems or data entry, or data deletion, or the messages. those committed acts does not categorize in fraud documentary, if the aforementioned act intended to endamage business
APA, Harvard, Vancouver, ISO, and other styles
7

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of p
APA, Harvard, Vancouver, ISO, and other styles
8

Tkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.

Full text
Abstract:
Actuality of surveillance the cyber-criminality problem and its impact upon a society is proved out by the rapid increase in a quantity of such crimes and material losses accordingly. The statistical analysis of their number increases and the caused losses is made in the process of cybercrimes studying. It’s revealed that besides the catastrophic number growth of such crimes, the relative size of losses is increased too. The analysis of the actual data for the nine years is made, on which basis the indicators’ table of the cyber-attacks number, the general losses and the indexes of their dynam
APA, Harvard, Vancouver, ISO, and other styles
9

Ovalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.

Full text
Abstract:
Computer crime and its evolution in Colombia, is relevant, the computer crimes described in Law 1273 of January 5, 2009 on the protection of information and data. Therefore, in the political constitution, article 15. All persons have the right to their personal and family privacy and their good name, and the State must respect them and enforce them, also, they have the right to know, update and rectify the information that they have been collected on them in databases and in archives of public and private entities. For this reason, cybercriminals, have specialized mainly in theft through compu
APA, Harvard, Vancouver, ISO, and other styles
10

Tariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.

Full text
Abstract:
Crime is a bone of contention that can create a societal disturbance. Crime forecasting using time series is an efficient statistical tool for predicting rates of crime in many countries around the world. Crime data can be useful to determine the efficacy of crime prevention steps and the safety of cities and societies. However, it is a difficult task to predict the crime accurately because the number of crimes is increasing day by day. The objective of this study is to apply time series to predict the crime rate to facilitate practical crime prevention solutions. Machine learning can play an
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer crimes Computer crimes Computer networks"

1

Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
3

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Full text
Abstract:
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
APA, Harvard, Vancouver, ISO, and other styles
5

Seeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Foster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
APA, Harvard, Vancouver, ISO, and other styles
9

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.

Full text
Abstract:
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer crimes Computer crimes Computer networks"

1

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diane, Barrett, and Broom Neil, eds. Computer forensics jumpstart. SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

author, Rudolph K., Tittel Ed author, Broom Neil author, and Barrett Diane author, eds. Computer forensics jumpstart. Wiley Publishing, Inc., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Branigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Digital evidence and computer crime: Forensic science, computers, and the Internet. 2nd ed. Academic Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer crimes Computer crimes Computer networks"

1

Kizza, Joseph Migga. "Computer Networks and Online Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patra, Manas Ranjan, and Bipin Bihari Jayasingh. "A Software Agent Based Approach for Fraud Detection in Network Crimes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30176-9_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Computer Crimes." In Undergraduate Topics in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Computer Crimes." In Texts in Computer Science. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Computer Crimes." In Ethics in Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer crimes Computer crimes Computer networks"

1

Zhu, Shijie. "Research of Computer Network Crimes Investigation and Legal Supervision Measures." In 2016 2nd International Conference on Education, Social Science, Management and Sports (ICESSMS 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/icessms-16.2017.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arias, Alejandra Ivone, and Mario Jose Divan. "Contributions to the Genre Violence Analysis in Jujuy: Initial Characterization of Crimes." In 2019 4th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2019. http://dx.doi.org/10.1109/iscon47742.2019.9036189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zaliwski, Andrzej. "Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2857.

Full text
Abstract:
The business organizations currently functioning inside cyberspace are vulnerable to threats and forms of crimes that were unknown prior to the Internet era. New challenges for security have emerged from this situation. It has become increasingly necessary to educate a large number of professionals to be better prepared to maintain the growing number of computer networks. Also, there is a need to place strong emphasis on the security aspects of a network. These goals are impossible to realize without solving the following problems: lack of safe infrastructure, where security experiments can no
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph M. "Combating computer crimes." In the conference. ACM Press, 1994. http://dx.doi.org/10.1145/199544.199609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quintiliano, Paulo. "Crimes Cibernéticos e seus Efeitos Internacionais." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bueno, Pedro. "Cyber Crimes - a trilha do dinheiro." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ianelli, Nicholas, and Aaron Hackworth. "Botnets as a Vehicle for Online Crimes." In First International Conference on Forensic Computer Science. ABEAT, 2006. http://dx.doi.org/10.5769/c2006003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carvalho, Ana, Fernando Sousa, José Neto, Paulo Neves, Rafael Fragoso, and Rodolfo Mazzonetto. "Crimes da Informática no Código Penal Brasileiro." In The Third International Conference on Forensic Computer Science. ABEAT, 2008. http://dx.doi.org/10.5769/c2008010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jian, Shuyi, and Hongyan Chen. "Legal explore & analyse on computer and cyber crime." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6201653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olinder, Nina, and Aleksej Tsvetkov. "Leading Forensic and Sociological Aspects in Investigating Computer Crimes." In 6th International Conference on Social, economic, and academic leadership (ICSEAL-6-2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.200526.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!