Contents
Academic literature on the topic 'Criminalité informatique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Criminalité informatique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Criminalité informatique"
McMullan, John L., and David C. Perrier. "La sécurité du jeu et le jeu de la sécurité : piratage, loi et politique publique." Criminologie 39, no. 1 (June 26, 2006): 83–106. http://dx.doi.org/10.7202/013127ar.
Full textLeman-Langlois, Stéphane. "Questions au sujet de la cybercriminalité, le crime comme moyen de contrôle du cyberespace commercial." Criminologie 39, no. 1 (June 26, 2006): 63–81. http://dx.doi.org/10.7202/013126ar.
Full textFreyssinet, Éric. "Transformation numérique de la gendarmerie nationale." Sécurité et stratégie 31, no. 3 (March 19, 2024): 20–24. http://dx.doi.org/10.3917/sestr.031.0020.
Full textCortés Gómez, Ismael. "Antigypsyism as Symbolic and Epistemic Violence in Informative Journalism in Spain, 2010–2018." Critical Romani Studies 3, no. 1 (December 11, 2020): 4–25. http://dx.doi.org/10.29098/crs.v3i1.74.
Full textKuziev, Otabek Jurakulovich, and Azamat Timurovich Kurbanov. "Comparative Analysis o f Determination of the Human Genealogy Based on the Base of the Head in Jurisdictional Criminalism." Advances in Clinical Medical Research 2, no. 4 (December 31, 2021): 01–07. http://dx.doi.org/10.48112/acmr.v2i4.23.
Full textHe, Li, Antonio Páez, Jianmin Jiao, Ping An, Chuntian Lu, Wen Mao, and Dongping Long. "Ambient Population and Larceny-Theft: A Spatial Analysis Using Mobile Phone Data." ISPRS International Journal of Geo-Information 9, no. 6 (May 26, 2020): 342. http://dx.doi.org/10.3390/ijgi9060342.
Full textBjelajac, Željko, and Aleksandar Filipović. "Media and criminal behavior: Between social responsibility and destruction." Pravo - teorija i praksa 40, no. 4 (2023): 17–32. http://dx.doi.org/10.5937/ptp2304017b.
Full textNaidoo, Kamban. "The Shaping, Enactment and Interpretation of the First Hate-Crime Law in the United Kingdom - An Informative and Illustrative Lesson for South Africa." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 20 (October 9, 2017): 1. http://dx.doi.org/10.17159/1727-3781/2017/v20i0a1356.
Full textViachaslau, Kipen, Burakova Aryna, Dobysh Olga, Zotova Ol’ga, Bulgak Aleksandr, and Lemesh Valentina. "Specifics of determination of human biological age by blood samples using epigenetic markers." Annals of Cytology and Pathology 9, no. 1 (February 14, 2024): 001–12. http://dx.doi.org/10.17352/acp.000030.
Full textEl Madani, Mohamed. "L'arsenal Pénal Et Aspects De La Protection Juridique En Matière De La Criminalité Informatique Au Maroc." المجلة المغربية للقانون الجنائي والعلوم الجنائية, 2019, 9. http://dx.doi.org/10.37325/1590-000-006.007-017.
Full textDissertations / Theses on the topic "Criminalité informatique"
Jerrari, Sai͏̈d. "La fraude informatique." Montpellier 1, 1986. http://www.theses.fr/1986MON10017.
Full textComputer fraud a new variation on attempts to obtain money or property by deception. The prevaling penal code has shown itself power less in the face of the new criminal connection with data processing. From this it may be concluded to be essential that a specific solution and new remedes to the real problem of computer crime be found
El, Chaer Nidal. "La criminalité informatique devant la justice pénale." Poitiers, 2003. http://www.theses.fr/2003POIT3006.
Full textChampy, Guillaume. "La fraude informatique." Aix-Marseille 3, 1990. http://www.theses.fr/1990AIX32018.
Full textIn a world context largely dominated by a free-market economy, recent technological develpments in the field of communications confer to the concept of "information" an unmatched value in all of human history, as well as it engenders the parallel development of computer crime. Computer crime, in this context, can be analysed as an illicit act committed, with the aid, or against, a computerized system of data. From the viewpoint of criminal law, the protection of such a system is assured by the regulation of its conditions of access and use; these concepts necessarily go beyond the traditional notions of criminal law. Recent legislative interventions in this matter show that the conditions of access to a system of computerized data affects necessarily its conditions of use. We can consider as illicit use, the act of denaturation, or on the other hand, the misappropreation of such data : these two actions invalue the function as well as the data of the system. However, if the fraudulent nature of the act of denaturation results from legal texts, the fraudulent nature of the act of misappropriation stems from conditions of access considered to be illicit or unlawful
Frydlender, Alain. "La fraude informatique : étude phénomenologique et typologies appliquées au contexte français." Paris 9, 1985. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1985PA090042.
Full textCasile, Jean-François. "Le code pénal à l'épreuve de la délinquance informatique." Amiens, 2001. http://www.theses.fr/2001AMIE0053.
Full textDruffin-Bricca, Sophie. "Le traitement juridique de la fraude informatique." Nice, 1992. http://www.theses.fr/1992NICE0025.
Full textTarento, Sabrina. "Formalisation en Coq de modèles cryptographiques idéalisés et application au cryptosystème ElGamal." Nice, 2006. http://www.theses.fr/2006NICE4081.
Full textThe work begun in this thesis concerns the formal check of cryptographic algorithms under the proof assistant Coq. The cryptographic algorithms base on cryptographic primitives aiming at assuring the confidentiality of the data, the indistinguabilité, the infalsifiabilité, etc… However, most approaches to the formal analyses of cryptographic protocols make the perfect cryptographic assumption, i. E. The hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining ti a ciphertext without knowing the key. Such a view is permitted by the generic model and the random oracle model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random >Oracle Model. We exploit this framework to prove the safety of cryptosystems that depend on a cyclic group (like ElGamal cryptosystem), against non-interactive (by using the generic model) and interactive (by using the random oracle model) generic attacks ; and we prove the security of blind signatures against interactive attacks (by using the generic model and the random oracle model). To prove the last step, we use a generic parallel attack to create a forgery signature
Tourny, Eve. "La lutte contre la criminalité informatique bancaire : approches de droit comparé et de droit international." Nice, 2011. http://www.theses.fr/2011NICE0014.
Full textDuval, Thomas. "Analyse informatique post-mortem : mise en oeuvre et évaluation d'une approche bayésienne." Rennes 1, 2005. http://www.theses.fr/2005REN1S185.
Full textBascou, Jean-Jacques. "Contribution à la sécurité des systèmes : une méthodologie d'authentification adaptative." Toulouse 3, 1996. http://www.theses.fr/1996TOU30253.
Full textBooks on the topic "Criminalité informatique"
Rosé, Philippe. La criminalité informatique. Paris: Presses universitaires de France, 1988.
Find full textBurger, Ralf. Virus, la maladie des ordinateurs : de la protection du matériel à la protection juridique. Paris: Éditions Micro Application, 1989.
Find full textHébert, Monique. Les délits informatiques. Ottawa, Ont: Bibliothèque du Parlement, Service de recherche, 1991.
Find full textRmail, Bouchaïb. Criminalité informatique ou liée aux nouvelles technologies de l'information et de la communication. 2nd ed. [Casablanca?: s.n.], 2010.
Find full textBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Find full textPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Find full textLisa, Yount, ed. Does the Internet increase the risk of crime? San Diego, Calif: Greenhaven Press, 2006.
Find full textDaniel, Martin. La criminalité informatique. Paris: Presses universitaires de France, 1997.
Find full textChatelain, Yannick. Marketing et cybercriminalité. Paris: Hermes science publications, 2000.
Find full textSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Find full text