To see the other types of publications on this topic, follow the link: Cyber frauds.

Dissertations / Theses on the topic 'Cyber frauds'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'Cyber frauds.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Almuntaka, Abdelfattah. "Droit et cyber-blanchiment." Nice, 2006. http://www.theses.fr/2006NICE0016.

Full text
Abstract:
Juridiquement, le blanchiment d'argent est un crime passible d'une peine prévue par la loi quel que soit son modèle ou la façon dont il a été commis. L'utilisation de technologies ultrasophistiquées en matière de blanchiment d'argent, notamment l'Internet n'est qu'un phénomène récent qui sera bientôt remplacé par d'autres technologies plus développées. L'acte de crime se trouve plutôt dans l'action de donner une nouvelle apparence à l'argent sale. De nos jours, beaucoup de pays réalisent des bénéfices conséquents malgré l'intrusion de capitaux noirs dans leurs caisses. Par ailleurs, les économ
APA, Harvard, Vancouver, ISO, and other styles
2

Гриценко, Костянтин Григорович, Константин Григорьевич Гриценко та Kostiantyn Hryhorovych Hrytsenko. "Нечітко-множинна модель оцінки рівня захищеності банку від кібершахрайств". Thesis, Дніпро: ДНУ, 2018. https://essuir.sumdu.edu.ua/handle/123456789/80641.

Full text
Abstract:
Банківські установи являються об’єктами критичної інфраструктури держави. Вони надзвичайно привабливі для злочинців. У зв’язку з цим, обґрунтування вибору банківської установи для незалежного аудиту її кібербезпеки є актуальним завданням. Завдяки аудиту кібербезпеки можна сформулювати конкретні практичні рекомендації щодо поліпшення кібербезпеки. Інструментом попереджувального кіберзахисту є нечітка модель оцінки рівня захищеності банківської установи від кібершахрайств, що використовує як кількісні показники, так і якісні анкетні дані. Вона може бути використана для обґрунтування вибору банкі
APA, Harvard, Vancouver, ISO, and other styles
3

Al, Adwan Ahmad. "A cyber-consumer protection framework for prevention of online deceptive advertising." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/1744.

Full text
Abstract:
Online deceptive advertisements engender distrust among cyber-consumers; we found that such incidents occur in every country in the world. This research addressed issues with online fraud and deceptive advertising related to cyber-consumer transactions (CCT) and online consumer protection. This study includes a framework which provides potential solutions and redress methods in order to minimise online fraud and deceptiveness as well as protecting the cyber-consumer globally.
APA, Harvard, Vancouver, ISO, and other styles
4

Erdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.

Full text
Abstract:
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals
APA, Harvard, Vancouver, ISO, and other styles
5

Olsson, Jens. "Digital Evidence with Emphasis on Time." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3774.

Full text
Abstract:
Computer Forensics is mainly about investigating crimes where computers has been involved. There are many tools available to aid the investigator with this task. We have created a prototype of a completely new type of tool where all evidences are indexed by its time variable and plotted on a timeline. We believed that this way would make it easier and more intuitive to find coherent evidence and would make it faster to work with for the investigator. We have performed a user test where a group of people has evaluated our prototype tool against a modern commercial computer forensic tool and the
APA, Harvard, Vancouver, ISO, and other styles
6

Яровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko та І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку". Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.

Full text
Abstract:
Шахрайство з грошовими засобами є розповсюдженим способом незаконного збагачення, незалежно від того, яким чином воно здійснювалося. Особливо актуальною ця проблема є для фінансово-кредитних установ, які безпосередньо мають справу з фінансовими операціями. Але шахрайські дії в банківській сфері за часту важко виявити на тлі величезної кількості автентичних транзакцій, що проводяться щодня. З іншого боку, не виявлення зловживань, фінансових махінацій, відмивання кримінальних доходів, незаконне отримання коштів з клієнтських рахунків, тощо може завдати шкоди репутації банку. Найтривожніш
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Yan. "An investigation into financial fraud in online banking and card payment systems in the UK and China." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8290.

Full text
Abstract:
This doctoral thesis represents an investigation into financial fraud in online banking and card payment systems in the UK and China, involving network security, online financial transactions, internet fraud, card payment systems and individuals' perception of and behaviours towards electronic environments. In contrast to previous studies, the research questions were tackled by survey questionnaires both in the UK and China, with a particular interest in fraud and attempted fraud. The main findings from the UK respondents were that those with higher IT skill and younger respondents are more li
APA, Harvard, Vancouver, ISO, and other styles
8

Ghemmogne, Fossi Leopold. "Gestion des règles basée sur l'indice de puissance pour la détection de fraude : Approches supervisées et semi-supervisées." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI079.

Full text
Abstract:
Cette thèse traite de la détection de fraude par carte de crédit. Selon la Banque Centrale Européenne, la valeur des fraudes utilisant des cartes en 2016 s'élevait à 1,8 milliard d'euros. Le défis pour les institutions est de réduire ces fraudes. En règle générale, les systèmes de détection de la fraude sont consistués d'un système automatique construit à base de règles "si-alors" qui contrôlent toutes les transactions en entrée et déclenchent une alerte si la transaction est considérée suspecte. Un groupe expert vérifie l'alerte et décide si cette dernière est vrai ou pas. Les critères utilis
APA, Harvard, Vancouver, ISO, and other styles
9

Скринька, Л. О., та L. O. Skrynka. "Економіко-математичне моделювання ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів на основі методів виживання". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/85073.

Full text
Abstract:
У роботі розроблено структурно-логічну модель оцінювання ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів. У резуьтаті дослідження було здійснено аналіз ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів на основі методу Каплана-Мейєра. Виявлено залежності ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів від часового інтервалу після виявлення фактів порушення.<br>The paper examines provides a bibliometric analysis of scientific publications on the effective
APA, Harvard, Vancouver, ISO, and other styles
10

Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.

Full text
Abstract:
International lawyers are familiar with the question: “Is international law law?” But this thesis instead asks the question: “Is international law international?” Using a variety of methods, this work sheds light on some of the ways in which international law as a transnational legal field is constructed by international law academics, and is conceptualized in international law textbooks, in the five permanent members of the Security Council: the People’s Republic of China, the French Republic, the Russian Federation, the United Kingdom of Great Bri
APA, Harvard, Vancouver, ISO, and other styles
11

Huang, Teng –. Ming, and 黃登銘. "Cyber Crime Pattern Analysis and Investigation Mechanism-By an Example of Internet Frauds." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/84403512146475756947.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>多媒體網路通訊數位學習碩士在職專班<br>101<br>The rapid development of the internet makes it all dependent on the internet. Internet has become a part of human life. Internet development is unlimited: It covers the political, social, games, instant messaging, financial, industrial and commercial activities as well as scientific research. Internet has become a part of daily life but cybercrime continues to emerge. Advance in the development of the Internet gives more convenience, especially the development of electronic commerce, allowing people to enjoy the convenience and other benefits. Cyber
APA, Harvard, Vancouver, ISO, and other styles
12

CHEN, MU-CHUAAN, and 陳穆全. "The Study on Construction of Intergrative Investigation Process of Cyber Fraud Crimes – Using the Cases of Cyber Fraud from 2004 to 2016 in Taiwan." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2wfr66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Adeka, Muhammad I., Mohammad J. Ngala, Mohammed S. Bin-Melha, et al. "Nigeria: Cyber Space Security vis a vis Computerisation, Miniaturisation and Location-Based Authentication." 2015. http://hdl.handle.net/10454/11525.

Full text
Abstract:
No<br>The degree of insecurity occasioned by fraudulent practices in Nigeria has been of great concern economically, especially as it relates to overseas transactions. This paper was designed to mitigate this problem for Nigeria and countries with similar dispositions. Based on a survey involving field trip to Nigeria, the paper examines the general security situation in Nigeria and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that both computerisation and miniaturisation had some negative effects on cybersecurity,
APA, Harvard, Vancouver, ISO, and other styles
14

Adeka, Muhammad I., Kelvin O. O. Anoh, Mohammad J. Ngala, et al. "Africa: cyber-security and its mutual impacts with computerisation, miniaturisation and location-based authentication." 2017. http://hdl.handle.net/10454/12044.

Full text
Abstract:
Yes<br>The state of insecurity occasioned by fraudulent practices in Africa has been of concern economically, both at home and abroad. In this paper, we propose ways to mitigate this problem, using Nigeria as a case study. Based on surveys in West Africa, the paper examines the security situation in the continent and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that computerisation and miniaturisation had negative effects on cyber-security, as these were being exploited by fraudsters, using advance fee fraud; called 419. As
APA, Harvard, Vancouver, ISO, and other styles
15

Maat, Sandra Mariana. "Cyber crime: a comparative law analysis." Diss., 2004. http://hdl.handle.net/10500/2056.

Full text
Abstract:
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there
APA, Harvard, Vancouver, ISO, and other styles
16

AfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.

Full text
Abstract:
On a regular basis, a variety of events take place in computer systems: program launches, firewall updates, user logins, and so on. To secure information resources, modern organisations have established security management systems. In cyber incident management, reporting and awareness-raising are a critical to identify and respond to potential threats in organisations. Security equipment operation systems record ’all’ events or actions, and major abnormalities are signaling via alerts based on rules or patterns. Investigation of these alerts is handled by specialists in the incident resp
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!