Dissertations / Theses on the topic 'Cybercrim'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cybercrim.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Villavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.
Full textMaliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.
Full textBrandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Full textLusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.
Full textMwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.
Full textAl-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.
Full textEdwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.
Full textO'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.
Full textRoberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.
Full textMaahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.
Full textMoleko, Tsepo. "Assessing law enforcement's ability to fight cybercrime in South Africa." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11470.
Full textMatengu, Sinka. "Cybercrime awareness and reporting in the public sector in Botswana." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12044.
Full textSchultz, Charlotte Beverly. "Cybercrime : an analysis of the current legislation in South Africa." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60091.
Full textSimion, Raluca <1978>. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/1/Raluca_Simion_tesi.pdf.
Full textSimion, Raluca <1978>. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/.
Full textMassa, Margherita. "Internet e minori: la repressione dei cybercrime a sfondo sessuale." Doctoral thesis, Università degli studi di Padova, 2010. http://hdl.handle.net/11577/3427026.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textYetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.
Full textKaterina, Rebecca Paraskeva. "Targeting the escalation of cybercrime in Greece. A systematic literature review." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25447.
Full textGumbi, Dumisani. "Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29247.
Full textYie, Andoh Ernest Nyame. "THEORETICAL AND LEGAL ASPECTS OF CYBERCRIMES IN GHANA." Thesis, Юриспруденція в сучасному інформаційному просторі: [Матеріали ІХ Міжнародної науково-практичної конференції, м. Київ, Національний авіаційний університет, 1 березня 2019 р.] Том 1. – Тернопіль: Вектор, 2019. – 394 с, 2019. http://er.nau.edu.ua/handle/NAU/38073.
Full textBalajanov, Elvin. "Responses to cybercrime in Azerbaijan, with special reference to the United Kingdom." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22942/.
Full textConnolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.
Full textКравченко, Є. В. "Організаційно-правові засади діяльності суб’єктів протидії кіберзлочинності". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72555.
Full textКандюков, О. Г. "Правові засади діяльності кіберполіції в Україні та за кордоном: порівняльний аспект". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72466.
Full textKonte, Maria. "Understanding and defending against internet infrastructures supporting cybecrime operations." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54424.
Full textWilson, Jacob. "Cryptocurrencies and Cybercrime: The Effects of Ransom Events on the Evolution of Bitcoin." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1787.
Full textAskerniya, Imran. "Investigation into reduction and/or prevention of cybercrime victimisation among the user individuals." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542285.
Full textIbekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.
Full textMaria, Stam. ""HOW SAFE DO YOU FEEL OUT ALONE ONLINE?" FEAR OF CRIME AND CYBERCRIME: A SYSTEMATIC LITERATURE REVIEW." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25375.
Full textDornseif, Maximillian. "Phänomenologie der IT-Delinquenz : Computerkriminalität, Datennetzkriminalität, Multimediakriminalität, Cybercrime, Cyberterror und Cyberwar in der Praxis /." [S.l. : s.n.], 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016234254&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textMayland, Magnus. "A qualitative exploration of the challenges the Danish police face in dealing with cybercrime." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26483.
Full textOzeren, Suleyman. "Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4847/.
Full textEvoh, Peternwaike Nne Udo. "A systematic literature review on criminological research on the history of cybercrime focusing on type of crime and geographic origin of the perpetrators : Literature review on criminological research on the history of cybercrime." Thesis, Malmö universitet, Institutionen för kriminologi (KR), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-46088.
Full textMorris, Sarah Louise Angela. "An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space." Thesis, Cranfield University, 2013. http://dspace.lib.cranfield.ac.uk/handle/1826/8034.
Full textYUCEDAL, BEHZAT. "VICTIMIZATION IN CYBERSPACE: AN APPLICATION OF ROUTINE ACTIVITY AND LIFESTYLE EXPOSURE THEORIES." Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1279290984.
Full textFissel, Erica R. "Victimization of the 21st Century: An Examination of Cyberstalking Victimization Using a Target Congruence Approach." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553613508435002.
Full textEufrasio, Emília Teixeira Lima. "O cibercrime e a violação dos direitos fundamentais de natureza pessoal dos menores: o caso da CPLP." Master's thesis, [s.n.], 2015. http://hdl.handle.net/10284/4932.
Full textGuerra, Chris. "Fundamental Demographics of Digital Piracy Offenders." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157573/.
Full textRiek, Markus [Verfasser], and Rainer [Akademischer Betreuer] Böhme. "Towards a robust quantification of the societal impacts of consumer-facing cybercrime / Markus Riek ; Betreuer: Rainer Böhme." Münster : Universitäts- und Landesbibliothek Münster, 2018. http://d-nb.info/1159955921/34.
Full textHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Full textSynnestvedt, Jensen Louise. "Terrorism or hacking? A law interpretation on the concept of cyber terrorism. : A legal dogmatic thesis with an empirical legal science methodology." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-25203.
Full textJung, Jeyong. "A study of cyber security management within South Korean businesses : an examination of risks and cybercrime involving industrial security." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/a-study-of-cyber-security-management-within-south-korean-businesses(4f6f8a10-c31a-4eec-b092-2b38ac8815d9).html.
Full textJäger, Stefan [Verfasser], Eberhard [Gutachter] Zehendner, and Christian [Gutachter] Johner. "Gefährdungslage deutscher Arztpraxen (als Teil des Gesundheitswesens und der KMU) durch Cybercrime / Stefan Jäger ; Gutachter: Eberhard Zehendner, Christian Johner." Jena : Friedrich-Schiller-Universität Jena, 2020. http://d-nb.info/1219574104/34.
Full textPutigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.
Full textCian, Healy, and ZHE LI. "The Role Decentralised Non-Regulated Virtual Currencies Play in Facilitating Unlawful Financial Transactions." Thesis, KTH, Entreprenörskap och Innovation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188935.
Full textReyns, Bradford W. "Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1273840781.
Full textHenson, Billy. "Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1313685865.
Full textMin-Cheng, Lin, and 林民程. "Problem Structuring of Cybercrime." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/17290482846400883347.
Full textIqbal, Farkhund. "Messaging Forensic Framework for Cybercrime Investigation." Thesis, 2011. http://spectrum.library.concordia.ca/7077/1/Iqbal_PhD_S2011.pdf.
Full text