Academic literature on the topic 'Cybercrime'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybercrime.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybercrime"
Billah, Muhammad Masum. "Sufficiency of Omani Laws to Suppress Cybercrimes in Light of the un Comprehensive Study on Cybercrimes." Arab Law Quarterly 32, no. 2 (January 25, 2018): 158–84. http://dx.doi.org/10.1163/15730255-12321010.
Full textEboibi, Felix E. "Cybercrime prosecutors and non-retroactivity of the nigerian cybercrimes act 2015." Revista Acadêmica Escola Superior do Ministério Público do Ceará 10, no. 1 (June 29, 2018): 237–51. http://dx.doi.org/10.54275/raesmpce.v10i1.135.
Full textIvaniuk, Viktoriia, and Serhiy Banakh. "Cryptocurrency-Related Cybercrimes in Ukraine." osteuropa recht 66, no. 1 (2020): 217–24. http://dx.doi.org/10.5771/0030-6444-2020-1-217.
Full textBabanina, Viktoria, Iryna Tkachenko, Olena Matiushenko, and Mykola Krutevych. "Cybercrime: History of formation, current state and ways of counteraction." Revista Amazonia Investiga 10, no. 38 (April 12, 2021): 113–22. http://dx.doi.org/10.34069/ai/2021.38.02.10.
Full textB, Ajoy P. "Effectiveness of Criminal Law in Tackling Cybercrime: A Critical Analysis." Scholars International Journal of Law, Crime and Justice 5, no. 2 (February 21, 2022): 74–79. http://dx.doi.org/10.36348/sijlcj.2022.v05i02.005.
Full textMcKoy, Coleman. "Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally." ABC Journal of Advanced Research 10, no. 2 (December 4, 2021): 159–74. http://dx.doi.org/10.18034/abcjar.v10i2.601.
Full textDumchykov, Mykhailo, Maryna Utkina, and Olha Bondarenko. "Cybercrime as a Threat to the National Security of the Baltic States and Ukraine: The Comparative Analysis." International Journal of Safety and Security Engineering 12, no. 4 (August 31, 2022): 481–90. http://dx.doi.org/10.18280/ijsse.120409.
Full textMurthy, A. S. N., Vishnuprasad Nagadevara, and Rahul De'. "Predictive Models in Cybercrime Investigation." International Journal of Information Systems in the Service Sector 2, no. 3 (July 2010): 1–12. http://dx.doi.org/10.4018/jisss.2010070101.
Full textCh, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, and Abdulrahman Al-Ahmari. "Computational System to Classify Cyber Crime Offenses using Machine Learning." Sustainability 12, no. 10 (May 16, 2020): 4087. http://dx.doi.org/10.3390/su12104087.
Full textVeresha, Roman. "Preventive measures against computer related crimes: approaching an individual." Informatologia 51, no. 3-4 (December 30, 2018): 189–99. http://dx.doi.org/10.32914/i.51.3-4.7.
Full textDissertations / Theses on the topic "Cybercrime"
Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.
Full textBrandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Full textThis thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
Lusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.
Full textMwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.
Full textAl-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.
Full textEdwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.
Full textO'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.
Full textRoberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.
Full textMaahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textBooks on the topic "Cybercrime"
Huber, Edith. Cybercrime. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-26150-4.
Full textOwen, Tim, and Jessica Marshall, eds. Rethinking Cybercrime. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55841-3.
Full textBandler, John, and Antonia Merzon. Cybercrime Investigations. First edition. | Boca Raton, FL : CRC Press/ Taylor & Francis Group, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003033523.
Full textBrewer, Russell, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, and David Maimon. Cybercrime Prevention. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31069-1.
Full textFerraro, Monique Mattei. Cybercrime: A casebook. Burlington, MA: Academic Press, 2007.
Find full textWeulen Kranenbarg, Marleen, and Rutger Leukfeldt, eds. Cybercrime in Context. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60527-8.
Full textKoops, Bert-Jaap, and Susan W. Brenner, eds. Cybercrime and Jurisdiction. The Hague: T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-467-7.
Full textBook chapters on the topic "Cybercrime"
Marcum, Catherine D., and George E. Higgins. "Cybercrime." In Handbooks of Sociology and Social Research, 459–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20779-3_23.
Full textHolt, Thomas J. "Cybercrime." In The Handbook of Measurement Issues in Criminology and Criminal Justice, 29–48. Hoboken, NJ: John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781118868799.ch2.
Full textNewman, Graeme R. "Cybercrime." In Handbooks of Sociology and Social Research, 551–84. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25.
Full textAlmanna, Ali. "Cybercrime." In Legal Translation between English and Arabic, 197–212. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-14838-5_11.
Full textBernik, Igor. "Cybercrime." In Cybercrime and Cyberwarfare, 1–56. Hoboken, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118898604.ch1.
Full textProtrka, Nikola. "Cybercrime." In Modern Police Leadership, 143–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63930-3_13.
Full textHuber, Edith. "Cybercrime." In Cybercrime, 21–29. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-26150-4_3.
Full textClough, Jonathan. "Cybercrime." In Elgar Encyclopedia of Crime and Criminal Justice. Edward Elgar Publishing, 2024. http://dx.doi.org/10.4337/9781789902990.cybercrime.
Full textMurthy, A. S. N., Vishnuprasad Nagadevara, and Rahul De’. "Predictive Models in Cybercrime Investigation." In Advancing the Service Sector with Evolving Technologies, 166–77. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0044-7.ch011.
Full textFrunza, Marius-Christian. "Cybercrime." In Introduction to the Theories and Varieties of Modern Crime in Financial Markets, 207–20. Elsevier, 2016. http://dx.doi.org/10.1016/b978-0-12-801221-5.00015-4.
Full textConference papers on the topic "Cybercrime"
Alade, O. M., E. A. Amusan, O. T. Adedeji, and S. B. Adebayo. "Cybercrime and Underground Attack Technologies: Perspectives from the Nigerian Banking Sector." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p6.
Full textGhelerter, David, John Wilson, Noah Welch, and John-David Rusk. "Cybercrime in the Developing World." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.10.
Full textRajan, Amala V., Rejitha Ravikumar, and Mariam Al Shaer. "UAE cybercrime law and cybercrimes — An analysis." In 2017 International Conference on Cyber-Security and Protection of Digital Services (Cyber Security). IEEE, 2017. http://dx.doi.org/10.1109/cybersecpods.2017.8074858.
Full textYunitasari, Yessi, Latjuba S. T. T. Sofyana, and Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis." In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.
Full textNeufeld, Derrick J. "Understanding Cybercrime." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.417.
Full textSukhai, Nataliya B. "Hacking and cybercrime." In the 1st annual conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059553.
Full textChechulin, Andrey, and Maxim Gorda. "Cybercrime Investigation Model." In 2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2024. http://dx.doi.org/10.1109/comsnets59351.2024.10427215.
Full textFatkieva, Roza R., Anton S. Sudakov, and Danil O. Dedov. "Network Cybercrime Analysis." In 2024 XXVII International Conference on Soft Computing and Measurements (SCM). IEEE, 2024. http://dx.doi.org/10.1109/scm62608.2024.10554078.
Full textKorczynski, Maciej, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, and Cristian Hesselman. "Cybercrime After the Sunrise." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196494.3196548.
Full textJirovský, Václav, Andrej Pastorek, Max Mühlhäuser, and Andrea Tundis. "Cybercrime and Organized Crime." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233288.
Full textReports on the topic "Cybercrime"
Thomas, Douglas. Cybercrime losses:. Gaithersburg, MD: National Institute of Standards and Technology, April 2020. http://dx.doi.org/10.6028/nist.ams.100-32.
Full textChargualaf, Jr, and Joseph. Terrorism and Cybercrime. Fort Belvoir, VA: Defense Technical Information Center, May 2008. http://dx.doi.org/10.21236/ada488040.
Full textAntonova, Gergana, Niya Prisadashka, Radoslav Dimitrov, Ioan Yonkov, Daniel Radev, Hristo Pavlov, Mario Mladenov, and Ilian Grigorov. Cybercrime Strategy (modeling example). Procon, 2023. http://dx.doi.org/10.11610/it4sec.0149.
Full textGarcía Zaballos, Antonio, and Félix González Herranz. From Cybersecurity to Cybercrime: A Framework for Analysis and Implementation. Inter-American Development Bank, September 2013. http://dx.doi.org/10.18235/0009138.
Full textSaalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Crossover and Its Escalatory Risks for Europe. Stockholm International Peace Research Institute, September 2023. http://dx.doi.org/10.55163/siep1930.
Full textKeefer, Philip, Dino Caprirolo, Heather Sutton, José Antonio Mejía-Guerra, Ted Leggett, Iván Torre, James Andrew Lewis, Laura Jaitman, and Rogelio Granguillhome Ochoa. The Costs of Crime and Violence: New Evidence and Insights in Latin America and the Caribbean (Executive Summary). Inter-American Development Bank, February 2017. http://dx.doi.org/10.18235/0006383.
Full textAhmed, Zahid Shahab, Ihsan Yilmaz, Shahram Akbarzadeh, and Galib Bashirov. Digital Authoritarianism and Activism for Digital Rights in Pakistan. European Center for Populism Studies (ECPS), July 2023. http://dx.doi.org/10.55271/rp0042.
Full textAlmorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, January 2024. http://dx.doi.org/10.26735/orro4624.
Full textCong, Lin William, Campbell Harvey, Daniel Rabetti, and Zong-Yu Wu. An Anatomy of Crypto-Enabled Cybercrimes. Cambridge, MA: National Bureau of Economic Research, January 2023. http://dx.doi.org/10.3386/w30834.
Full textHakmeh, Joyce, Emily Taylor, Allison Peters, and Sophia Ignatidou. The COVID-19 pandemic and trends in technology. Royal Institute of International Affairs, February 2021. http://dx.doi.org/10.55317/9781784134365.
Full text