Dissertations / Theses on the topic 'Criminalité informatique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Criminalité informatique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jerrari, Sai͏̈d. "La fraude informatique." Montpellier 1, 1986. http://www.theses.fr/1986MON10017.
Full textComputer fraud a new variation on attempts to obtain money or property by deception. The prevaling penal code has shown itself power less in the face of the new criminal connection with data processing. From this it may be concluded to be essential that a specific solution and new remedes to the real problem of computer crime be found
El, Chaer Nidal. "La criminalité informatique devant la justice pénale." Poitiers, 2003. http://www.theses.fr/2003POIT3006.
Full textChampy, Guillaume. "La fraude informatique." Aix-Marseille 3, 1990. http://www.theses.fr/1990AIX32018.
Full textIn a world context largely dominated by a free-market economy, recent technological develpments in the field of communications confer to the concept of "information" an unmatched value in all of human history, as well as it engenders the parallel development of computer crime. Computer crime, in this context, can be analysed as an illicit act committed, with the aid, or against, a computerized system of data. From the viewpoint of criminal law, the protection of such a system is assured by the regulation of its conditions of access and use; these concepts necessarily go beyond the traditional notions of criminal law. Recent legislative interventions in this matter show that the conditions of access to a system of computerized data affects necessarily its conditions of use. We can consider as illicit use, the act of denaturation, or on the other hand, the misappropreation of such data : these two actions invalue the function as well as the data of the system. However, if the fraudulent nature of the act of denaturation results from legal texts, the fraudulent nature of the act of misappropriation stems from conditions of access considered to be illicit or unlawful
Frydlender, Alain. "La fraude informatique : étude phénomenologique et typologies appliquées au contexte français." Paris 9, 1985. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1985PA090042.
Full textCasile, Jean-François. "Le code pénal à l'épreuve de la délinquance informatique." Amiens, 2001. http://www.theses.fr/2001AMIE0053.
Full textDruffin-Bricca, Sophie. "Le traitement juridique de la fraude informatique." Nice, 1992. http://www.theses.fr/1992NICE0025.
Full textTarento, Sabrina. "Formalisation en Coq de modèles cryptographiques idéalisés et application au cryptosystème ElGamal." Nice, 2006. http://www.theses.fr/2006NICE4081.
Full textThe work begun in this thesis concerns the formal check of cryptographic algorithms under the proof assistant Coq. The cryptographic algorithms base on cryptographic primitives aiming at assuring the confidentiality of the data, the indistinguabilité, the infalsifiabilité, etc… However, most approaches to the formal analyses of cryptographic protocols make the perfect cryptographic assumption, i. E. The hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining ti a ciphertext without knowing the key. Such a view is permitted by the generic model and the random oracle model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random >Oracle Model. We exploit this framework to prove the safety of cryptosystems that depend on a cyclic group (like ElGamal cryptosystem), against non-interactive (by using the generic model) and interactive (by using the random oracle model) generic attacks ; and we prove the security of blind signatures against interactive attacks (by using the generic model and the random oracle model). To prove the last step, we use a generic parallel attack to create a forgery signature
Tourny, Eve. "La lutte contre la criminalité informatique bancaire : approches de droit comparé et de droit international." Nice, 2011. http://www.theses.fr/2011NICE0014.
Full textDuval, Thomas. "Analyse informatique post-mortem : mise en oeuvre et évaluation d'une approche bayésienne." Rennes 1, 2005. http://www.theses.fr/2005REN1S185.
Full textBascou, Jean-Jacques. "Contribution à la sécurité des systèmes : une méthodologie d'authentification adaptative." Toulouse 3, 1996. http://www.theses.fr/1996TOU30253.
Full textSadde, Gérald. "Sécurité logicielle des systèmes informatiques : aspects pénaux et civils." Montpellier 1, 2003. http://www.theses.fr/2003MON10019.
Full textChawki, Mohamed. "Le droit pénal à l'épreuve de la cybercriminalité : étude comparative de la politique criminelle face aux N.T.I.C." Lyon 3, 2006. http://www.theses.fr/2006LYO33024.
Full textReverdy, Pierre-Marie. "La matière pénale à l'épreuve des nouvelles technologies." Toulouse 1, 2005. http://www.theses.fr/2005TOU10069.
Full textThere is no denying that the emergence of the new technologies in today's society contributes to an overhaul of the basic tenets of western law. While the existing legislation is on the whole flexible enough to adapt to this evolution, the deepest changes call for a more specialized form of criminal law, as well as an international response to the problems generated by the new technologies. Such a globalized approach is indeed absolutely necessary, no matter how difficult it will prove to work out a common deal owing to the deep-seated differences in cultures and legal systems
Humbert, Jean-Philippe. "Les mondes de la cyberdélinquance et images sociales du pirate informatique." Thesis, Metz, 2007. http://www.theses.fr/2007METZ003L/document.
Full textThe cyberdelinquency constitutes an inseparable phenomenon from the numerical world, since the first hackers seeking comprehension of the innovating mechanisms of communication, to the recent computer pirates being posed as true criminals. The evolution and the current state of this phenomenon determine a true questioning on the social reality of the computer pirate responsible for the facts of cyberdelinquency. Indeed how to arrest it and attain knowledge ? To clear the keys of it of understanding, these questionings are approached by the qualitative study of this social actor responsible for acts of computer spitefulness. This research carries specifically the identification of the building processes of the social signification of the computer pirate. We'll answer mainly this question : can we speak, not of a normalized social picture, but rather the existence of several social pictures ? To allow an understanding study, the object will be declined via the reference frame of the concept of "social world". The analysis concerns firstly the social perception of cyberdelinquency, by determining its constructed picture. A second instant is dedicated to the communicative approach of this social context of the cyberdelinquency, declining the media picture predominant as for the signification of the computer pirate. Finally, to anticipate social perception in building of the computer pirate, a last party dedicates itself to a possible integrated approach of social pictures of the computer pirate, via different social worlds of the cyberdelinquency. These three keys of understanding aim at determine the phenomenon of cyberdelinquency better and his main actors, in building socially, across an intercultural dimension
Echenne, Frédéric. "L' incidence des technologies de la communication et de l'information sur la criminalité économique et financière." Montpellier 1, 2006. http://www.theses.fr/2006MON10007.
Full textSanchez, Virginie. "L'acte de modification de pages de sites internet ou "déface" : des indices objectifs aux traces/marques psychologiques de la délinquance informatique." Toulouse 2, 2010. http://www.theses.fr/2010TOU20101.
Full textMohsni, Samy. "Le progrès de la science face au droit pénal." Grenoble 2, 2005. http://www.theses.fr/2005GRE21002.
Full textMendy, Norbert Lucien. "Les attaques et la sécurité des systèmes informatiques." Paris 8, 2006. http://www.theses.fr/2006PA082735.
Full textHacking activities appeared around 1980 with first personal computers and since did not stop developing. At the beginning, this practice was primarily individual and playful. Now it is mainly made up by the activities of groups, with very various motivations. Today, due to the development of electronic means of communication, data security concerns a wider public. This thesis examines initially, from a technical and sociological point of view, attacks and defense mechanisms, and proposes a new concept of the security which is not only any centered on technical solutions but also takes in consideration the social dimension of the problem
Choi, Jong Ho. "Les comportements des internautes et l'évolution de la cybercriminalité : Etude comparée entre la France et la Corée du Sud." Montpellier 1, 2007. http://www.theses.fr/2007MON10059.
Full textPalpacuer, Jennifer. "L'utilisation des nouvelles technologies et leur influence sur le blanchiment d'argent : aspects juridiques." Nice, 2008. http://www.theses.fr/2008NICE0039.
Full textMore pernicious than traditional money laundering techniques, cyberlaundering uses electronic transfers, Internet services and electronic money. These new methods all have in common anonymous users and rapid, mobile, voluminous transactions. Thus, the criminal benefits from additional discretion when laundering his illegal funds. The evolution in money laundering techniques requires identifying its specific risks and questions whether or not current anti-money laundering regulations are applicable to the situation. Due to the ever-present difficulty of detecting the offense, it is necessary to make sure all professionals alike, those included in the fight against money laundering in order to help investigation services and the latter, are able to effectively confront the challenges brought on by new technologies. Finally, the repression of the offense, based on an efficient international cooperation, is even more exacting when fighting the electronic version of money laundering, which possesses the intrinsic capacity to ignore national barriers
Nlend, Cécile. "La protection du mineur dans le cyberespace." Amiens, 2007. https://tel.archives-ouvertes.fr/tel-00432247.
Full textJaghdam, Ali. "Les conditions d’assurabilité de la cybercriminalité : Une approche économique du transfert des cyber-risques." Paris 9, 2008. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2008PA090062.
Full textThe insurance has always participated in the success of the global information infrastructure by the guarantees offered to hedge against risks arising from conventional computer-based risks. However, cyber-risks have several "non-conformities" to the traditional actuarial model mainly due to the interconnection of information systems. The main contribution of the thesis focuses on the identification of conditions that make cyber-risks insurable following a risk-transfer economic approach. The study of the dynamics of insurability from a stochastic modeling of supply and demand behaviors has identified two conditions for enlarging the scope of insurability: increasing policyholders’ aversion to cyber-risk, and reducing the likelihood of successful attacks. From these two conditions, we determined what could increase the first and reduce the second. One solution is to play better synergy between the state and insurance companies regarding compliance with the regulations or recommendations on cyber-risk prevention both by the potential insured as the suppliers of connectivity equipments and security services providers. From this research covering both theoretical and empirical aspects of our thesis, we were able to identify the conditions under which cyber-risks could have an insurance contract. This is of great importance when the survival of businesses in an economic environment "reconfigured" to an intensive usage but also essential of information networks
Furon, Teddy. "Application du tatouage numérique à la protection de copie." Paris, ENST, 2002. http://www.theses.fr/2002ENST0014.
Full textWe consider in this thesis the use of digital watermarking in the copy protection framework for consumer electronics devices. We describe first the copy protection issue. Then, we build the global system with elementary securityparts such as encryption and digital signature. Yet, contrary to common approaches, the role of the watermark hasbeen reduced to the minimum: it is only a flag warning the devices that the content is protected. It is a kind ofsecond line of defence. Watermarking for copy protection is difficult due to two facts: the protected contents arewatermarked with the same key and the pirates have access to a watermark detector. Three kinds of attacks stemfrom these facts: the watermarked contents only attack, the original/watermarked contents attack and the chosenwatermarked contents attack. Even if we manage to reduced the capacity to one bit, the choice of a watermarkingtechnique is still difficult: an analysis shows that classical spread spectrum techniques do not provide a sufficientlyhigh level of security for this application. This is the reason why we invent a new class of methods known asasymmetric watermarking. This provides high security level but requires a bigger amount of data to detect thewatermark. To boost the detector, we take advantage of the side information at the embedding stage to optimisethe watermark detection. This gives birth to another new method so-called JANIS. For a small loss in the securitylevel, the detector is much more efficient. To conclude, these new methods may justify the Kerckhoffs principle in watermarking for copy protection
Thonnard, Olivier. "Vers un regroupement multicritères comme outil d'aide à l'attribution d'attaque dans le cyber-espace." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00006003.
Full textTeglia, Yannick. "Ingénierie et robustesse des systèmes embarqués sécuritaires." Paris 6, 2011. http://www.theses.fr/2011PA066183.
Full textThonnard, Olivier. "Vers un regroupement multicritères comme outil d'aide à l'attribution d'attaque dans le cyber-espace." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00006003.
Full textMany security experts have recently acknowledged the fact that the cyber-crime scene becomes increasingly organized and more consolidated. Even though there are some plausible indicators about the origins, causes, and consequences of these new malicious activities observed in the Internet, very few claims can be backed up by scientific evidence. In particular, many questions remain regarding the attribution of the attacks and the organization of cybercrime. The main contribution of this thesis consists in developing an analytical method to systematically address the problem of attack attribution in cyberspace. Our approach is based on a novel combination of a graph-based clustering technique with a data aggregation method inspired by multi-criteria decision analysis (MCDA). More specifically, we show that it is possible to analyze large-scale attack phenomena from separate viewpoints, revealing meaningful patterns with respect to various attack features. Secondly, we show how to sys tematically combine all those viewpoints such that the behavioral properties of attack phenomena are appropriately modeled in the aggregation process. Consequently, our global threat analysis method can attribute apparently different security events to a common root cause or phenomenon, based on the combination of all available evidence. Perhaps more importantly, our attack attribution technique can also emphasize the modus operandi of the attackers. This can help an analyst to get insights into how cybercriminals operate in the real-world, but also which strategies they are using
Arnal, Jérôme. "Cybercriminalité et droit pénal." Montpellier 1, 2008. http://www.theses.fr/2008MON10044.
Full textLeita, Corrado. "Automated protocol learning for the observation of malicious threats." Nice, 2008. http://www.theses.fr/2008NICE4061.
Full textOne of the main prerequisites for the development of reliable defenses to protect a network resource consists in the collection of quantitative data on Internet threats. This attempt to “know your enemy” leads to an increasing interest in the collection and exploitation of datasets providing intelligence on network attacks. The creation of these datasets is a very challenging task. The challenge derives from the need to cope with the spatial and quantitative diversity of malicious activities. The observations need to be performed on a broad perspective, since the activities are not uniformly distributed over the IP space. At the same time, the data collectors need to be sophisticated enough to extract a sufficient amount of information on each activity and perform meaningful inferences. How to combine the simultaneous need to deploy a vast number of data collectors with the need of sophistication required to make meaningful observations? This work addresses this challenge by proposing a protocol learning technique based on bioinformatics algorithms. The proposed technique allows to automatically generate low-cost responders starting from a set of samples of network interaction. Its characteristics are exploited in a distributed honeypot deployment that collected information on Internet attacks for a period of 8 months in 23 different networks distributed all over the world (Europe, Australia, United States). This information is organized in a central dataset that is analyzed in the context of this work
Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.
Full textEzzo, Haitham Adnan. "Le paiement électronique en matière d'opérations bancaires et de commerce en ligne." Toulouse 1, 2012. http://www.theses.fr/2012TOU10054.
Full textThe development of e-commerce requires the availability of secure and efficient payment instruments, but adapted and fully compatible with its dematerialized nature. Accordingly, traditional payment instrument have been adapted to the electronic context to enhance electronic transfers (cards and wire transfers) and to cover new emerging electronic micro payment operations (electronic purse card systems, GSM payments). Indeed, the electronic payment takes new legal dimension and a dominating position in the market. On the other hand, this kind of payment highlight several legal issues : the regulation of electronic money, the legal relationship between actors involved in payment process, data security, electronic evidence, determination of applicable jurisdiction and law for international e-payment operations. The dematerialization and automation of payment means are to be considered at legal level. Therefore impact on payments of IT technology shall be addressed. Major question we will answer by examining the concept (Part I) and legal regime of electronic payment ( Part II). This thesis, achievement of many years research, try to pragmatically and comprehensively provide answer for all electronic payment related aspects
Ghaibi, Dhia Moslem Abd Alameer. "La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international." Thesis, Lille, 2018. http://www.theses.fr/2018LIL2D013.
Full textThe security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity
Vallet, Caroline. "La protection des mineurs face à la cyberpédopornographie : Etude comparée entre le droit criminel canadien et français." Université de Paris-Sud. Faculté Jean-Monnet. UFR Droit, Économie, Gestion, 2009. http://www.theses.fr/2009PA111034.
Full textJaber, Abbas. "Les infractions commises sur internet." Dijon, 2007. http://www.theses.fr/2007DIJOD003.
Full textIn spite of is rooting in the economic, cultural and social landscape, the legal status of Internet remains obscure. Though it embodies the most sublime dreams of a communication society, Internet prefigures a criminality of communication whose threats, often ignored, are increasingly polyvalent and dangerous. Consequently, it is necessary to clarify the uncertainties regarding the applicability of the criminal law to Cyberspace. On formal ground, the range of Cyber-criminality as well as its definition is to be specified. On procedural ground, it is advisable to enlighten the bonds maintained with traditional and data-processing criminalities. Lastly, on material ground, if the intervention of the legislator and of the criminal judge in order to control Internet is generally agreed upon, it is however important to wonder whether traditional legal rules are suitable for such a control
Meier, Marsella Carole. "L'effectivité du processus répressif dans le traitement de la cybercriminalité (enquête sur le système judiciaire français)." Paris 2, 2005. http://www.theses.fr/2005PA020021.
Full textDeligné, Eddy. "Hyperviseur de protection d'exécutables : étude, développement et discussion." Palaiseau, Ecole polytechnique, 2014. http://www.theses.fr/2014EPXX0072.
Full textLeloup, Gilles. "Crime et analyse économique." Angers, 1991. http://www.theses.fr/1991ANGE0009.
Full textIllegal activities can be more profitable than legal activities and a part of the population could come to that king of activity. Choice formalisation, within an "economic model of crime", can allow the field to come out for the rational individual and get important lessons for criminal policy. But it is probably due to its capacity of foresight that the model gets better than a theory, that is sometimes produced as a rival one : the stability of punishment
Oundjian-Barts, Hélène. "Droit, sécurité et commerce électronique." Aix-Marseille 3, 2007. http://www.theses.fr/2007AIX32063.
Full textSince the 1st January of 1978 law, Internet has become a new mean of exchange which has stirred up the whole world economy functioning, and due to discrepancies between regulations, France has been compelled to adopt appropriate laws as far as proof, cryptology, or special definitions, are concerned, with for instance the 21st June 2004 law. So that it took part in the lex electronica apparition, similar to its ancestor the lex mercatoria. As contracting on Internet has become usual, those plans of action are fully justified and they give security questions a particular sharpness because of so many possible sites of infringements and of the increasing number of web partners who make the identification, localisation and catching trespassers, very uncertain therefore as the determination of law enforcement. It went on with its modernisation by adopting the new regulation about computer and liberties, and the DADVSI law in 2006 about royalties and bordering rights in the information society. Within the framework of a strategic security managerial politics responding to an investment optimisation logical economy of the cyber-company, and in order to make web partners be sensitive to this problem, technologies and law (which global consistence will be assured by Courts), will reinforce confidence and rights respects in that way, to serve a durable electronic commerce development
Maghrebi, Houssem. "Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0083.
Full textSide channel attacks take advantage of the fact that the power consumption of a cryptographic device depends on the internally used secret key. A very common countermeasure against side channel attacks is masking. It consists in splitting the sensitive variable of cryptographic algorithms into random shares (the masked data and the random mask) so that the knowledge on a subpart of the shares does not give information on the sensitive data itself. However, other attacks, such as higher-order side channel attacks, can defeat masking schemes. These attacks consist in combining the shares in order to cancel (at least partially) the effects of the mask. The overall goal of this thesis is to give a deep analysis of higher-order attacks and to improve the robustness of masking schemes.The first part of this thesis focuses on higher-order attacks. We propose three novel distinguishers. Theoretical and experimental results show the advantages of these attacks when applied to a masking countermeasure. The second part of this thesis is devoted to a formal security evaluation of hardware masking schemes. We propose a new side channel metric to jointly cover the attacks efficiency and the leakage estimation.In the last part, we propose three novel masking schemes remaining more efficient than the state-of-the-art masking. They remove (or at least reduce) the dependency between the leakage and the sensitive variable when the leakage function is known e.g. the Hamming weight or the Hamming distance leakage model). The new solutions have been evaluated within a security framework proving their excellent resistance against higher-order attacks
Barbu, Guillaume. "De la sécurité des platesformes JavaCardTM face aux attaques matérielles." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0037.
Full textSmart cards play a key role in various applications we use on a daily basis: payment, mobile communication, public transports, etc. In this context, the Java Card technology has evolved since its introduction in the mid-nineties to become nowadays the world leading smart card platform. In the context of Java Card, researches on security have revealed that the possibility of loading malicious applications represents a real threat. In the meantime, the scientific community has also paid interest to the security of embedded cryptography, revealing that theoretically strong cryptosystems can be easily broken if their implementation does not take into account certain physical properties of the underlying hardware device. In particular, a part of the published attacks relies on the attacker’s capacity to physically perturb the component during a cryptographic operation. These latter fault attacks have been rarely considered in the literature in the Java Card context. In this thesis, we study and evaluate the security of Java Cards against the combination of fault and software attacks in order to enhance it. First, we present various attack paths involving both hardware and software attacks and expose how these attacks allow to break various security mechanisms of Java Cards. In particular, our security analysis proves that the type-safety property, the control-flow integrity and the application isolation can be tampered with by the combination of adequate fault injections and malicious applications. Then, with regards to the goal of this thesis and the results of our security analysis, we present different approaches allowing to improve the resistance of Java Cards and Java Card applications against combined attacks. Thus we define several countermeasures against the attack we exposed as well as against some of the state-of-the-art attacks, always bearing in mind the strong constraints relative to smart cards
Perez, Charles. "Approche comportementale pour la sécurisation des utilisateurs de réseaux sociaux numériques mobiles." Thesis, Troyes, 2014. http://www.theses.fr/2014TROY0019/document.
Full textOur society is facing many changes in the way it communicates. The emergence of mobile terminals alongside digital social networks allows information to be shared from almost anywhere with the option of all parties being connected simultaneously. The growing use of smartphones and digital social networks in a professional context presents an opportunity, but it also exposes businesses and users to many threats, such as leakage of sensitive information, spamming, illegal access to personal data, etc.Although a significant increase in malicious activities on social platforms can be observed, currently there is no solution that ensures a completely controlled usage of digital social networks. This work aims to make a major contribution in this area through the implementation of a methodology (SPOTLIGHT) that not only uses the behaviour of profiles for evaluation purposes, but also to protect the user. This methodology relies on the assumption that smartphones, which are closely related to their owners, store and memorise traces of activity (interactions) that can be used to better protect the user online.This approach is implemented in a mobile prototype called SPOTLIGHT 1.0, which analyses traces stored in users’ smartphone to help them make the right decisions to protect their data
Alata, Eric. "Observation, caractérisation et modélisation de processus d'attaques sur Internet." Phd thesis, INSA de Toulouse, 2007. http://tel.archives-ouvertes.fr/tel-00280126.
Full textBonnet, Typhaine. "La crise de la sanction face à la cybercriminalité : l'exemple du droit d'auteur." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/28340.
Full textThe violation of copyright in the digital era is a worldwilde curse. It constitutes a cybercrime putting in jeopardy the authors’ salary and, more largely, the entire economy of the industrial culture. In order to fight this kind of violation, the French legislator has created several criminal responsibilities. The Canadian legislator, for his part, has sporadically revising the Copyright Act, without modify the existing criminal proceedings. Even though the French and Canadian approaches are antagonistic, we will try to demonstrate the fact that those approaches have the same result: they are ineffective. According to the assumption, we will endeavor to submit solutions that allow the rectification of the ineffectiveness of the criminal enforcement of copyright law in the digital era.
Chikhi, Kamal. "Le droit et l'informatique : manifestation et remèdes : étude comparative entre les législations des pays du Magreb et de l'Union européenne." Perpignan, 2006. http://www.theses.fr/2006PERP0729.
Full textThere one day which passes without that we hear about Internet? Internet is a phenomenon of company (society). Internet is a new media. On the technical plan: it is the fleuron of the new information technologies. On the economic plan: it is the sign of the new economy and the globalization. On the social plan: two billion web pages, and more than two hundred million Internet users. Figures are exceeded before the end of their reading. The expansion of the net upsets not only the production of the knowledge, but exchanges also the legal rules. It is the objective to which we hope to contribute modestly with this study. " The developments relative to this subject appeared according to the following structure: In a first part(party), we bent over the e-commerce (definitions, reality, problems put by this new mode of business, meeting of the wills, assent, proof) As for the second part(party), we dedicated him(it), As for the second part(party), we dedicated him(it), completely, on examination of computer crime (malpractices, problems, application). La understanding of the functioning of internet and its history, seems necessary to encircle well the subject, and a study on the presence of the net on the market of the States of the Maghreb seems compulsory to see the dimension of the phenomenon. We dedicated a preliminary part (party) to the functioning and the inventory of fixtures. The countries of the Maghreb do not suffer from a gap in the law but from a legal lack, the State is invited to find solutions and to take advantage of the experience (experiment) of the countries which are exceeded to us to find solutions of the new legal and practical obstacles which put the internet. .
Boisset, Marc-Olivier. "Contributions à la gestion de crise « cyber » : une approche juridique et managériale." Thesis, Paris, EHESS, 2022. http://www.theses.fr/2022EHES0040.
Full textThe omnipresence of cyberspace in people's life makes it a particularly interesting object of study, especially given its broad spectrum and its tight and strong link with the physical space. Indeed, "cyber" crises have effects not only in cyberspace, but also in physical space. As a result, cyber crises need to be well managed in order to limit their impact on organisations. It is necessary to adopt and implement adequate measures to contain cyber incidents, and also to get appropriate legal framework to prosecute cyber criminals. The objective of our approach is to improve the training of cyber crisis management experts and thus to define a crisis management model or process that will facilitate the work of cyber defence experts when they deal with external attacker who wants to harm the organisation
Robin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.
Full textToday, it seems possible to consider that digital technology and cyberspace have completely changed the balance of power in our modern society. By digitizing, the society gives its members almost unlimited access to millions of resources and data. Digital technology also facilitates personal and professional relationships between individuals. If digital technology can be presented as a real revolution, it exposes its user to new vulnerabilities and risks. The criminal law, insofar as it governs society and chooses the social values to be protected, has therefore been concerned with the development of digital technology. The present study notes the extensive legislative arsenal for fighting in the most effective manner against digital delinquency. Nevertheless, the analysis observes that many obstacles are against the application of criminal law into the cyberspace because of networks particularities. Moreover, digital crime is not the only threat generated by digital technology, since it is now possible to consider the cyberspace as a new space for confrontation. Thus, military threat is added to digital delinquency as the States set up electronics weapons into networks. Then, the arised question is about the relevance of these state choices and the solutions to intensify the fight against digital delinquency
Barbu, Guillaume. "De la sécurité des platesformes JavaCardTM face aux attaques matérielles." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00834324.
Full textMaghrebi, Houssem. "Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00913472.
Full textHabhab, Mohamad Ahmad. "Le droit pénal libanais à l'épreuve de la cybercriminalité : la prise en compte de l'exemple français." Montpellier 1, 2009. http://www.theses.fr/2009MON10033.
Full textNikooazm, Elina. "Validation des logiciels d'expertise judiciaire de preuves informatiques." Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020021.
Full textIn criminal cases, judges confronted with questions of technical order in computer technology, designate expert witnesses who put their expertise at the service of justice. Duly appointed by the courts, they help the judge by providing evidence relevant to the investigation.They search the suspect’s seized digital devices for elements of computer related crime, while preserving the integrity of the data and avoiding any alteration of the original media.The evidence thus collected is analyzed by a digital forensic expert who will document their findings to the judge in a report.Technical investigations are conducted by using powerful and sophisticated tools to find the current files and recover deleted, hidden or encrypted data from the digital media device examined.This requires perfect control of the utilized equipment and a clear identification of the methods used during the analysis. This research project aims to highlight the technical challenges which experts face, the complexity of digital forensic tools used for technical investigations, and the importance of their validation to understand the capabilities and limitations of each tool
Boos, Romain. "La lutte contre la cybercriminalité au regard de l’action des États." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0158/document.
Full textThe twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences