To see the other types of publications on this topic, follow the link: Cybercrim.

Dissertations / Theses on the topic 'Cybercrim'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cybercrim.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Villavicencio, Terreros Felipe A. "Cybercrimes." IUS ET VERITAS, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/123541.

Full text
Abstract:
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom.<br>En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos infor
APA, Harvard, Vancouver, ISO, and other styles
2

Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.

Full text
Abstract:
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; wa
APA, Harvard, Vancouver, ISO, and other styles
3

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar br
APA, Harvard, Vancouver, ISO, and other styles
4

Lusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.

Full text
Abstract:
The central theme of this thesis is that cybercrime has matured into a large profitdriven industry. Hobby hackers still exist and hacktivists have attracted some attention in recent years, but a very significant component of contemporary cybercrime is now financially motivated. While its goods and services are usually illicit, the cybercrime industry operates according to the same broad principles of industrial organisation observed across numerous other contexts. But the development of this industry is somewhat puzzling. Ostensibly much cybercriminal cooperation takes place online. As a resul
APA, Harvard, Vancouver, ISO, and other styles
5

Mwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.

Full text
Abstract:
The Internet can be considered a double-edged sword because while offering a range of benefits, it provides criminals with the opportunity to extend their work to areas and places previously unimaginable. Therefore, all countries face the same challenges on how to fight cybercrime and how to effectively promote security to their citizens and organisations. In Jordan, cybercafes have become "culturally acceptable alternatives" and a haven for individuals wanting to engage in some form of deviant behaviour away from the prying eyes of society. The aim of this research is to examine the online be
APA, Harvard, Vancouver, ISO, and other styles
7

Edwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.

Full text
Abstract:
This thesis presents the legal and technical challenges law enforcement investigators face when seeking digital evidence from a cloud-computing environment. It presents a series of solutions including an investigative methodology that obtains and presents such evidence in a legal and technically transparent manner. By gathering the opinions of international and domestic law enforcement investigators as well as major cloud service providers, the thesis critically examines the ability of law enforcement to hold the criminal community accountabe for criminal offences commoted across a multi-ju
APA, Harvard, Vancouver, ISO, and other styles
8

O'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.

Full text
Abstract:
This thesis examines the Council of Europe's Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of 'suppression' conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the 'suppressed' offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers
APA, Harvard, Vancouver, ISO, and other styles
9

Roberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.

Full text
Abstract:
The Internet is now fundamental to the global economy. Growing from an experimental and research network in the late 1960's, it is now the foundation of a wide range of economic, infrastructure support, communication and information sharing activities. In doing so it has also provided a vehicle for cybercrime. Organised cybercrime and state-sponsored malicious cyber activity are predicted to become the predominant cyber threats over the next five to ten years. Corporate governance is playing an increasingly important role in ensuring compliance with the growing body of legislation and regulati
APA, Harvard, Vancouver, ISO, and other styles
10

Maahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.

Full text
Abstract:
Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework
APA, Harvard, Vancouver, ISO, and other styles
11

Moleko, Tsepo. "Assessing law enforcement's ability to fight cybercrime in South Africa." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11470.

Full text
Abstract:
Cybercrime is the use of technology to support or directly facilitate a criminal activity, with logon credentials being the main information asset targeted during a cybercrime. The one time passwords used by banks to protect their clients from cybercrime are also under attack by cybercriminals. The Internet has made it easy to commit cybercrime, with perpetrators experiencing virtually no risk with huge returns. Individual cybercrime cases are sometimes small in nature, which means that the police can be reluctant to commit the resources necessary to investigate every incident. There is a dist
APA, Harvard, Vancouver, ISO, and other styles
12

Matengu, Sinka. "Cybercrime awareness and reporting in the public sector in Botswana." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12044.

Full text
Abstract:
Includes abstract.<br>Includes bibliographical references.<br>Different authors have reported on the problem of cybercrime and other concepts that are associated with it. The studies looking at the area of ICT and cybercrime are examined and assessed to identify gaps that exist. Nevertheless, most of these studies focused more on developed countries, and did not emphasise on the public sector. Therefore, their findings might not be appropriately applicable to governments in developing countries especially within the Africa context. This study seeks to investigate factors that are necessary to
APA, Harvard, Vancouver, ISO, and other styles
13

Schultz, Charlotte Beverly. "Cybercrime : an analysis of the current legislation in South Africa." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Simion, Raluca <1978&gt. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/1/Raluca_Simion_tesi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Simion, Raluca <1978&gt. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Massa, Margherita. "Internet e minori: la repressione dei cybercrime a sfondo sessuale." Doctoral thesis, Università degli studi di Padova, 2010. http://hdl.handle.net/11577/3427026.

Full text
Abstract:
The dissertation, which consists of four chapters, analyzes the important relationship between the minors and the Internet. In particular, it focuses on criminal protection of children against sexual cybercrimes. In the first chapter, a preliminary analysis of the nature of the Internet, its specific characteristics and its impact on law is conducted. The risks for children associated with the use of the Internet and the new technologies are also investigated. The second chapter is devoted to an overview of the regulation and key initiatives adopted both at the international and European Com
APA, Harvard, Vancouver, ISO, and other styles
17

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.

Full text
Abstract:
<p> Anonymizing Internet technologies present unique challenges to law enforcement and intelligence organizations. Tor is an anonymity technology that has received extensive media coverage after a virtual black market hidden by its network was seized by the FBI in 2013. Anonymizing technologies have legitimate purposes, and as states increasingly employ sophisticated Internet censorship and surveillance techniques, they are becoming increasingly relevant. This study examines the creation of the modern Internet, explores the drastic changes that have taken place, and takes an in-depth look at i
APA, Harvard, Vancouver, ISO, and other styles
19

Katerina, Rebecca Paraskeva. "Targeting the escalation of cybercrime in Greece. A systematic literature review." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25447.

Full text
Abstract:
Abstract:Cybercrime refers to any illegal use of technology, a computer, networked device or a network for criminal acts. It constitutes a rapidly evolving and complex phenomenon as the Internet is ruling on almost every sector of human activity. Innovation plays a highly significant role in the growth of an economy. However, every time there is an advancement in the field of technology, there is bound to be other adverse effects. Such is the case with criminology. In this end, the prevalence of cybercrime is alarmingly increasing, and there have been several attempts by the government and oth
APA, Harvard, Vancouver, ISO, and other styles
20

Gumbi, Dumisani. "Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29247.

Full text
Abstract:
As broadband infrastructure investments in developing nations intensify and barriers to accessing the internet diminish, the more they increasingly become the quintessential destination for cybercrime. For their lax cyber laws and general cybercrime illiteracy, developing nations such as South Africa, Kenya, and India have become the destination of choice for cybercriminal enterprises. The focus of this dissertation is to comparatively analyse South Africa’s ICT regulatory framework against those of developing and developed nations and to determine its effectiveness in addressing the threat po
APA, Harvard, Vancouver, ISO, and other styles
21

Yie, Andoh Ernest Nyame. "THEORETICAL AND LEGAL ASPECTS OF CYBERCRIMES IN GHANA." Thesis, Юриспруденція в сучасному інформаційному просторі: [Матеріали ІХ Міжнародної науково-практичної конференції, м. Київ, Національний авіаційний університет, 1 березня 2019 р.] Том 1. – Тернопіль: Вектор, 2019. – 394 с, 2019. http://er.nau.edu.ua/handle/NAU/38073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Balajanov, Elvin. "Responses to cybercrime in Azerbaijan, with special reference to the United Kingdom." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22942/.

Full text
Abstract:
The primary objective of this research is to explore and analyse policy and legal responses of Azerbaijan to cybercrime, provide detailed and insightful recommendations to enhance the effectiveness, efficiency and legality of Azerbaijani responses to cybercrime based on the existing experience and insights of the UK. It is contended that although the application of Information and Communication Technologies has been significantly encouraged in Azerbaijan effective and efficient control and prevention of cybercriminal activities had not been adequately assured. This thesis has, thus, focused on
APA, Harvard, Vancouver, ISO, and other styles
23

Connolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.

Full text
Abstract:
Yes<br>Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respon
APA, Harvard, Vancouver, ISO, and other styles
24

Кравченко, Є. В. "Організаційно-правові засади діяльності суб’єктів протидії кіберзлочинності". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72555.

Full text
Abstract:
Одним з досягнень науково-технічної думки людини стало впровадження в управлінський процес та інші сфери життя суспільства електронно-обчислювальної технiки, без якої зберiгання, обробка та використання величезної кількості найрізноманітнішої iнформації не було б можливим. Це досягнення принесло неоціненну користь у розвиток науки, техніки та інших галузей знань. Однак вигоди, якi можна отримати завдяки використанню цiєї технiки, стали використовуватися i в злочинних цілях. Так, з'явився новий вид злочинної діяльності - кіберзлочини - суспільно небезпечні наслiдки вiд вчинення яких не йшли в
APA, Harvard, Vancouver, ISO, and other styles
25

Кандюков, О. Г. "Правові засади діяльності кіберполіції в Україні та за кордоном: порівняльний аспект". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72466.

Full text
Abstract:
Залучення комп’ютерних технологій до все більшої кількості сфер діяльності держави, наближає Україну не тільки до світових стандартів та тенденцій, але й до їх негативних наслідків. Економіка, логістика та безпека країни все більше залежать від технічної інфраструктури та її захищеності. Для підвищення ефективності боротьби з кіберзлочинністю, Україна досить давно почала відповідні роботи, необхідні для створення власної стратегії кібербезпеки.<br>Привлечение компьютерных технологий все к большему количеству сфер деятельности государства, приближает Украину не только к мировым стандартам
APA, Harvard, Vancouver, ISO, and other styles
26

Konte, Maria. "Understanding and defending against internet infrastructures supporting cybecrime operations." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54424.

Full text
Abstract:
Today's cybercriminals must carefully manage their network resources to evade detection and maintain profitable businesses. For example, a rogue online enterprise has to have multiple technical and business components in place, to provide the necessary infrastructure to keep the business available. Often, cybercriminals in their effort to protect and maintain their valuable network resources (infrastructures), they manipulate two fundamental Internet protocols; the Domain Name System (DNS) and the Border Gateway Protocol (BGP). A popular countermeasure against cybercriminal infrastructur
APA, Harvard, Vancouver, ISO, and other styles
27

Wilson, Jacob. "Cryptocurrencies and Cybercrime: The Effects of Ransom Events on the Evolution of Bitcoin." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1787.

Full text
Abstract:
With the explosion of Bitcoin, various cryptocurrencies are beginning to garner incredible amounts of attention from speculators and institutional investors alike. Simultaneously, the rise in the number of occurrences of cyber ransom attacks has proven to be an increasingly relevant part of the conversation in the formative years of the Bitcoin ecosystem, as hackers demand payments be in the form of bitcoin. To test the relative impact of these different ransom events on the price of bitcoin, this paper conducts an event study to quantify the reaction by investors upon revelation of the news.
APA, Harvard, Vancouver, ISO, and other styles
28

Askerniya, Imran. "Investigation into reduction and/or prevention of cybercrime victimisation among the user individuals." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542285.

Full text
Abstract:
Much of today's information is stored in digital form in computers and information in the digital form is much more easily stored, duplicated and manipulated. Businesses have to use information effectively in order to remain competitive, and storing information in the digital form allows them to use information much more effectively. As most computers are always connected to the Internet, this gives to attacker an easy (unauthorised) access to the computer through the network. The contribution to knowledge that this research brings is the development of the models on reduction/ prevention of c
APA, Harvard, Vancouver, ISO, and other styles
29

Ibekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.

Full text
Abstract:
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effe
APA, Harvard, Vancouver, ISO, and other styles
30

Maria, Stam. ""HOW SAFE DO YOU FEEL OUT ALONE ONLINE?" FEAR OF CRIME AND CYBERCRIME: A SYSTEMATIC LITERATURE REVIEW." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25375.

Full text
Abstract:
Fear of crime is a well-explored field within criminology. Although inconsistencies exist, it is mostly defined as an emotional reaction to crime or aspects of crime. Consequences can affect society indirectly but are mainly on an individual level. For example, an individual can decide to avoid certain environments. One of these environments can be cyberspace, the internet, as individuals can experience fear of online criminal activity. This area of research has not been explored as much as fear of traditional crime. A systematic literature review is conducted to analyse the body of research t
APA, Harvard, Vancouver, ISO, and other styles
31

Dornseif, Maximillian. "Phänomenologie der IT-Delinquenz : Computerkriminalität, Datennetzkriminalität, Multimediakriminalität, Cybercrime, Cyberterror und Cyberwar in der Praxis /." [S.l. : s.n.], 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016234254&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mayland, Magnus. "A qualitative exploration of the challenges the Danish police face in dealing with cybercrime." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26483.

Full text
Abstract:
Cybercrimes have been rapidly increasing over the past decade becoming more sophisticated and increasing victimization, resulting in an increased load of the police in the effort to prevent and stop these crimes. This study explores the challenges the Danish police encounter facing cybercrime and their approach to preventing it. The data were collected through interviewing individuals on a managing level in two different departments dealing with cybercrime within the Danish police force. The data were analyzed thematically to identify key issues. The main challenges found being; the time frame
APA, Harvard, Vancouver, ISO, and other styles
33

Ozeren, Suleyman. "Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4847/.

Full text
Abstract:
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime
APA, Harvard, Vancouver, ISO, and other styles
34

Evoh, Peternwaike Nne Udo. "A systematic literature review on criminological research on the history of cybercrime focusing on type of crime and geographic origin of the perpetrators : Literature review on criminological research on the history of cybercrime." Thesis, Malmö universitet, Institutionen för kriminologi (KR), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-46088.

Full text
Abstract:
Abstract Cybercrime is a global phenomenon, that has existed since the advent of the internet. The wider population is affected with different types of crime that occur on the internet. The advancement of the internet continually brings about changes in the different types of cybercrime that are perpetrated on the internet and across the globe. Using historical criminology to provide evidence that explains the past and present phenomenon, this paper seeks to investigate the different types of crimes perpetrated on the internet with twenty one (21) peer reviewed publications. Time stamped from
APA, Harvard, Vancouver, ISO, and other styles
35

Morris, Sarah Louise Angela. "An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space." Thesis, Cranfield University, 2013. http://dspace.lib.cranfield.ac.uk/handle/1826/8034.

Full text
Abstract:
This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of thumbnail cache artefacts were created by researching the evidential constraints present in Forensic Computing. The criteria were used to evaluate the evidential value of live system thumbnail caches and thumbnail cache file fragments identified in unallocated space. Thumbnail caches can contain visual thumbnails and associated metadata which may be useful to an analyst during an investigation; the information stored in the cache
APA, Harvard, Vancouver, ISO, and other styles
36

YUCEDAL, BEHZAT. "VICTIMIZATION IN CYBERSPACE: AN APPLICATION OF ROUTINE ACTIVITY AND LIFESTYLE EXPOSURE THEORIES." Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1279290984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fissel, Erica R. "Victimization of the 21st Century: An Examination of Cyberstalking Victimization Using a Target Congruence Approach." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553613508435002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Eufrasio, Emília Teixeira Lima. "O cibercrime e a violação dos direitos fundamentais de natureza pessoal dos menores: o caso da CPLP." Master's thesis, [s.n.], 2015. http://hdl.handle.net/10284/4932.

Full text
Abstract:
Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Criminologia<br>A realidade contemporânea é marcada pela permanente presença da rede Internet na vida quotidiana. Apesar dos proveitos que esta realidade traz para o desenvolvimento individual e coletivo, a exploração desmedida da Internet e a exposição da vida íntima nesse meio cria um ambiente propício a prática de vários atos ilícitos. O presente estudo aborda a questão da violação dos direitos fundamentais de natureza pessoal do menor. Nesse trilhar, o presente trabalho almej
APA, Harvard, Vancouver, ISO, and other styles
39

Guerra, Chris. "Fundamental Demographics of Digital Piracy Offenders." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157573/.

Full text
Abstract:
Digital piracy is an emerging cybercrime subtype with overarching implications for administrators and researchers alike. Within this body of knowledge, it is unclear what individual-level factors are linked to digital piracy. Using a college-based sample, while focusing on gender, race, and age, this study identifies fundamental individual-level variables associated with digital piracy commission. After conducting multiple independent samples t-tests and a multivariate logistic regression, results found age and computer proficiency were significantly associated with the likelihood of engaging
APA, Harvard, Vancouver, ISO, and other styles
40

Riek, Markus [Verfasser], and Rainer [Akademischer Betreuer] Böhme. "Towards a robust quantification of the societal impacts of consumer-facing cybercrime / Markus Riek ; Betreuer: Rainer Böhme." Münster : Universitäts- und Landesbibliothek Münster, 2018. http://d-nb.info/1159955921/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Full text
Abstract:
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystrok
APA, Harvard, Vancouver, ISO, and other styles
42

Synnestvedt, Jensen Louise. "Terrorism or hacking? A law interpretation on the concept of cyber terrorism. : A legal dogmatic thesis with an empirical legal science methodology." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-25203.

Full text
Abstract:
Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration when discussing cyber-crime. When researching cybercrime and  it is important to first research the legal background as to the purpose of the creation of the internet, and to what extend state control is an issue in the matter of both cybercrime being carried out and the establishment of cyber activist groups. How shall the law be interpreted in the case of internet hacking and under what category do these fit, terrorists, cybercri
APA, Harvard, Vancouver, ISO, and other styles
43

Jung, Jeyong. "A study of cyber security management within South Korean businesses : an examination of risks and cybercrime involving industrial security." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/a-study-of-cyber-security-management-within-south-korean-businesses(4f6f8a10-c31a-4eec-b092-2b38ac8815d9).html.

Full text
Abstract:
This study aims to empirically explore and evaluate the current state of cyber security management for small and medium-sized businesses in South Korea. As academic discourse relating to the cyber security management of businesses is relatively new, there is a clear lack of literature relating to this discipline. This study, therefore, looks to address this issue by taking an exploratory approach to the subject. Based on various sources in the UK, this study used the UK’s cyber security framework as a conceptual model against which conditions in South Korea were examined. Drawing on a mixed me
APA, Harvard, Vancouver, ISO, and other styles
44

Jäger, Stefan [Verfasser], Eberhard [Gutachter] Zehendner, and Christian [Gutachter] Johner. "Gefährdungslage deutscher Arztpraxen (als Teil des Gesundheitswesens und der KMU) durch Cybercrime / Stefan Jäger ; Gutachter: Eberhard Zehendner, Christian Johner." Jena : Friedrich-Schiller-Universität Jena, 2020. http://d-nb.info/1219574104/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Putigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.

Full text
Abstract:
La généralisation croissante des technologies informatiques conventionnelles et l'émergence de l'internet des objets constituent probablement des principes fondateurs d'un nouvel ordre mondial numérique. L'omniprésence, l'interdépendance des réseaux et la convergence des composantes du cyberespace catalysent la formation de groupes sociaux dans un objet tel qu'Internet et en particulier dans les médias sociaux. Cette thèse étudiera en particulier la naissance de communautés cybercriminelles, ainsi que les rites et les liens d'affinité des membres de ces sociétés. Au-delà de mettre en exergue l
APA, Harvard, Vancouver, ISO, and other styles
46

Cian, Healy, and ZHE LI. "The Role Decentralised Non-Regulated Virtual Currencies Play in Facilitating Unlawful Financial Transactions." Thesis, KTH, Entreprenörskap och Innovation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188935.

Full text
Abstract:
As consumer payment services have been developed at a rapid rate in recent years, the introduction to the market of decentralised, non-regulated cryptocurrencies has enabled a significant increase in acts of criminality in the cyber environment. Efforts to combat and curb the continued growth of such illicit activities have included the development, implementation and enforcement of legislation and regulations by governing authorities on a global scale. For the purpose of this thesis, interviews were conducted with several industry experts and governmental officials specializing in the use of
APA, Harvard, Vancouver, ISO, and other styles
47

Reyns, Bradford W. "Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1273840781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Henson, Billy. "Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1313685865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Min-Cheng, Lin, and 林民程. "Problem Structuring of Cybercrime." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/17290482846400883347.

Full text
Abstract:
碩士<br>國立中興大學<br>公共行政及政策研究所<br>86<br>There are three major purposes of the present study: (1) to understandthe nature of cyberspace; (2) to investigate the social reality of cybercrime;and (3) to constructs some possile strategies for government to manage cybercrime. To achieve the research goals, the study took a multi-disciplinary approach to explore the subject. Our perspectives include legal theory, sociology of law, criminology, spacial theory, contemporary social philosophy and economics. Problem structuring in public policy was utilized as a methodology to developthe theoretical frame
APA, Harvard, Vancouver, ISO, and other styles
50

Iqbal, Farkhund. "Messaging Forensic Framework for Cybercrime Investigation." Thesis, 2011. http://spectrum.library.concordia.ca/7077/1/Iqbal_PhD_S2011.pdf.

Full text
Abstract:
Online predators, botmasters, and terrorists abuse the Internet and associated web technologies by conducting illegitimate activities such as bullying, phishing, and threatening. These activities often involve online messages between a criminal and a victim, or between criminals themselves. The forensic analysis of online messages to collect empirical evidence that can be used to prosecute cybercriminals in a court of law is one way to minimize most cybercrimes. The challenge is to develop innovative tools and techniques to precisely analyze large volumes of suspicious online messages. We deve
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!