To see the other types of publications on this topic, follow the link: Computer crimes Computer crimes Computer networks.

Dissertations / Theses on the topic 'Computer crimes Computer crimes Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer crimes Computer crimes Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
3

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Full text
Abstract:
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
APA, Harvard, Vancouver, ISO, and other styles
5

Seeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Foster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
APA, Harvard, Vancouver, ISO, and other styles
9

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.

Full text
Abstract:
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy
APA, Harvard, Vancouver, ISO, and other styles
11

Kwan, Yuk-kwan, and 關煜群. "The research of using Bayesian inferential network in digital forensicanalysis." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45898066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

McConky, Katie Theresa. "Design and analysis of information fusion, dynamic sensor management rules for cyber security systems using simulation /." Online version of thesis, 2007. http://hdl.handle.net/1850/4895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ibekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.

Full text
Abstract:
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effe
APA, Harvard, Vancouver, ISO, and other styles
14

Tsudama, Brett. "A novel distributed denial-of-service detection algorithm." DigitalCommons@CalPoly, 2004. https://digitalcommons.calpoly.edu/theses/1650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jiang, Lin, and 蒋琳. "New cryptographic schemes with application in network security and computer forensics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B44753226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identify
APA, Harvard, Vancouver, ISO, and other styles
17

Hashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.

Full text
Abstract:
Computer forensic tools have been developed to enable forensic investigators to analyse software artefacts to help reconstruct possible scenarios for activity on a particular computer system. A number of these tools allow the examination and analysis of system generated artefacts such as the Windows registry. Examination and analysis of these artefacts is focussed on recovering the data extracting information relevant to a digital investigation. This information is currently underused in most digital investigations. With this in mind, this thesis considers system generated artefacts that conta
APA, Harvard, Vancouver, ISO, and other styles
18

Gu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.

Full text
Abstract:
Most of the attacks and fraudulent activities on the Internet are carried out by malware. In particular, botnets, as state-of-the-art malware, are now considered as the largest threat to Internet security. In this thesis, we focus on addressing the botnet detection problem in an enterprise-like network environment. We present a comprehensive correlation-based framework for multi-perspective botnet detection consisting of detection technologies demonstrated in four complementary systems: BotHunter, BotSniffer, BotMiner, and BotProbe. The common thread of these systems is correlation analysis,
APA, Harvard, Vancouver, ISO, and other styles
19

Ransbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
Thesis (M. S.)--Management, Georgia Institute of Technology, 2008.<br>Committee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
APA, Harvard, Vancouver, ISO, and other styles
20

McRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.

Full text
Abstract:
The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where anti-forensic techniques defeat current forensic methods. The fields of Computer and Network Security have expanded with time to become inclusive of many complex ideas and algorithms. With ease, a student of these fields can fall into the thought pattern of preventive measures as the only major thrust of the topics. It is equally important to be able to determine the cause of a security breach. Thus, the field of Computer Forensics has grow
APA, Harvard, Vancouver, ISO, and other styles
22

Melo, Sandro Pereira de. "Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticos." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21181.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-06-26T12:35:40Z No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5)<br>Made available in DSpace on 2018-06-26T12:35:40Z (GMT). No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5) Previous issue date: 2018-03-19<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>According to the current academic literature, numerous taxonomic proposals for the classification of cyber threats have been pre
APA, Harvard, Vancouver, ISO, and other styles
23

Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunicatio
APA, Harvard, Vancouver, ISO, and other styles
24

Alharbi, Hani Sayyaf. "Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks." Thesis, University of Stirling, 2017. http://hdl.handle.net/1893/25389.

Full text
Abstract:
Millions of users world-wide are sharing content using Peer-to-Peer (P2P) networks, such as Skype and Bit Torrent. While such new innovations undoubtedly bring benefits, there are nevertheless some associated threats. One of the main hazards is that P2P worms can penetrate the network, even from a single node and then spread rapidly. Understanding the propagation process of such worms has always been a challenge for researchers. Different techniques, such as simulations and analytical models, have been adopted in the literature. While simulations provide results for specific input parameter va
APA, Harvard, Vancouver, ISO, and other styles
25

Egan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.

Full text
Abstract:
Phishing attacks employ social engineering to target end-users, with the goal of stealing identifying or sensitive information. This information is used in activities such as identity theft or financial fraud. During a phishing campaign, attackers distribute URLs which; along with false information, point to fraudulent resources in an attempt to deceive users into requesting the resource. These URLs are made obscure through the use of several techniques which make automated detection difficult. Current methods used to detect malicious URLs face multiple problems which attackers use to their ad
APA, Harvard, Vancouver, ISO, and other styles
26

Erdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.

Full text
Abstract:
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals
APA, Harvard, Vancouver, ISO, and other styles
27

Steh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Samsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.

Full text
Abstract:
Thesis (M.S.)--Southern Utah University, 2009.<br>Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
APA, Harvard, Vancouver, ISO, and other styles
30

Imhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bassi, Steven D. "An automated acquisition system for media exploitation." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483619.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Garfinkel, Simson L. "June 2008." Description based on title screen as viewed on August 28, 2008. Includes bibliographical references (p. 55-56). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
35

Stimson, Jared M. "Forensic analysis of Window's® virtual memory incorporating the system's page-file." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FStimson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2008.<br>Thesis Advisor(s): Eagle, Chris S. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 89-90). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
36

Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.

Full text
Abstract:
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; wa
APA, Harvard, Vancouver, ISO, and other styles
37

Young, Lap-ping John. "Using cultural perspective to study teenage computer crime." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31979415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Law, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cassidy, Regis H. Friend. "Automating case reports for the analysis of digital evidence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCassidy.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.

Full text
Abstract:
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether
APA, Harvard, Vancouver, ISO, and other styles
42

Proffitt, Tim Gene. "The Effects of Computer Crimes on the Management of Disaster Recovery." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5252.

Full text
Abstract:
The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to unders
APA, Harvard, Vancouver, ISO, and other styles
43

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can a
APA, Harvard, Vancouver, ISO, and other styles
44

Ibarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.

Full text
Abstract:
The main goal of this thesis is to provide a sociologically informed analysis of tax avoidance and tax evasion in contemporary Mexico and Sweden, focusing particular attention on the explanatory role of social networks, social interactions, and positive feedback mechanisms. Two major data sources are used: (1) A panel dataset that includes all persons, 16 years or older, who resided in Stockholm County during at least one of the years 1990 to 2003 (N=1,967,993). The dataset includes detailed information on the socio-demographic characteristics, kinship networks, and criminal offences of these
APA, Harvard, Vancouver, ISO, and other styles
45

Zomba, Lincoln Benn. "Computer related crimes: a comparative analysis of Tanzanian and South African frameworks." Thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13039.

Full text
Abstract:
Includes bibliographical references.<br>'Unknown to most of us, we are living inside and alongside a revolution of stupendous power and energy. It is not a communist, socialist, capitalist or even a religious revolution. It is the ICT revolution, the revolution of information communication technologies that is changing the nature and patterns of our social, commercial and political interactions. Like most revolutions, its true scope cannot yet be grasped nor can all the issues it raises be clearly understood even by those at its cutting edges". The Internet and other new technologies play an i
APA, Harvard, Vancouver, ISO, and other styles
46

Gunestas, Murat. "An evidence management model for web services behavior." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/5631.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2009.<br>Vita: p. 167. Thesis director: Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Nov. 11, 2009). Includes bibliographical references (p. 159-166). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
47

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Urrea, Jorge Mario. "An analysis of Linux RAM forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FUrrea.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Christopher S. Eagle. "March 2006." Includes bibliographical references (p.71-72). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
49

Costa, Fernando José da. "Locus delicti nos crimes informáticos." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/2/2136/tde-24042012-112445/.

Full text
Abstract:
Aborda a introdução do computador e da internet na sociedade e sua relação com o direito. Discorre sobre o uso da informática para a prática de crime, observando que o delito penal deixou de ser local e ganhou dimensões internacionais, porquanto seu resultado não se dê necessariamente no mesmo local onde foi praticada a conduta. Chama a atenção ao fato de que os princípios delimitadores da validade da lei penal no espaço podem não ser suficientes para dirimir eventuais conflitos de jurisdição, se interpretados como tradicionalmente se tem feito. Analisa e classifica as espécies de crimes infor
APA, Harvard, Vancouver, ISO, and other styles
50

Hewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.

Full text
Abstract:
Digital forensics has become a predominant field in recent times and courts have had to deal with an influx of related cases over the past decade. As computer/cyber related criminal attacks become more predominant in today’s technologically driven society the need for and use of, digital evidence in courts has increased. There is the urgent need to hold perpetrators of such crimes accountable and successfully prosecuting them. The process used to acquire this digital evidence (to be used in cases in courts) is digital forensics. The procedures currently used in the digital forensic process wer
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!