Academic literature on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"
Kaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.
Full textBlank, Grant. "The Digital Divide Among Twitter Users and Its Implications for Social Research." Social Science Computer Review 35, no. 6 (October 12, 2016): 679–97. http://dx.doi.org/10.1177/0894439316671698.
Full textTennakoon, Hemamali, George Saridakis, and Anne-Marie Mohammed. "Child online safety and parental intervention: a study of Sri Lankan internet users." Information Technology & People 31, no. 3 (June 4, 2018): 770–90. http://dx.doi.org/10.1108/itp-09-2016-0213.
Full textKirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (December 30, 2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.
Full textOlukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (September 16, 2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.
Full textNurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (April 10, 2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.
Full textSekhavat, Yoones A. "Nowcasting Mobile Games Ranking Using Web Search Query Data." International Journal of Computer Games Technology 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9859813.
Full textSoni, Soni, Afdhil Hafid, and Didik Sudyana. "ANALISIS KESADARAN MAHASISWA UMRI TERKAIT PENGGUNAAN TEKNOLOGI & MEDIA SOSIAL TERHADAP BAHAYA CYBERCRIME." JURNAL FASILKOM 9, no. 3 (November 14, 2019): 28–34. http://dx.doi.org/10.37859/jf.v9i3.1664.
Full textPutri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (October 9, 2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.
Full textHikmatulloh, Reza, and Evy Nurmiati. "Analisis Strategi Pencegahan Cybercrime Berdasarkan UU ITE Di Indonesia (Studi Kasus: Penipuan Pelanggan Gojek)." Kosmik Hukum 20, no. 2 (July 22, 2020): 121. http://dx.doi.org/10.30595/kosmikhukum.v20i2.6449.
Full textDissertations / Theses on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"
Alshalan, Abdullah. "Cyber-crime fear and victimization." Diss., Mississippi State : Mississippi State University, 2006. http://library.msstate.edu/etd/show.asp?etd=etd-01232006-095728.
Full textSkaf, Faten. "La justice pénale face à la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.
Full textNowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
Books on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"
Book chapters on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"
Herath, Tejaswini. "Internet Crime." In Handbook of Research on Social and Organizational Liabilities in Information Security, 433–45. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-132-2.ch026.
Full textLuong, Hai Thanh. "Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam." In Combating the Exploitation of Children in Cyberspace, 68–94. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2360-5.ch004.
Full textLuong, Hai Thanh. "Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam." In Combating the Exploitation of Children in Cyberspace, 68–94. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2360-5.ch004.
Full textR., Parkavi, Anitha S., and Gayathri R. "Digital Steganography Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 144–73. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1558-7.ch009.
Full textUmadevi, K. S., Geraldine Bessie Amali, and Latha Subramanian. "Digital Forensics and Cyber Law Enforcement." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, 1–20. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8241-0.ch001.
Full textAjewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes, 125–46. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.
Full textZlatanovska, Katerina. "Hacking and Hacktivism as an Information Communication System Threat." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 68–101. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8793-6.ch004.
Full textWang, Chia-Hui, Ray-I. Chang, and Jan-Ming Ho. "Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection." In Wireless Technologies, 713–24. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch313.
Full textWang, Chia-Hui, Ray-I. Chang, and Jan-Ming Ho. "Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection." In Surveillance Technologies and Early Warning Systems, 194–204. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-865-0.ch010.
Full textWoodcock, Leone E., and San Murugesan. "Gender Differences in Ethics Perceptions in Information Technology." In Information Security and Ethics, 3433–41. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch230.
Full text