Dissertations / Theses on the topic 'Cybercrime'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cybercrime.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.
Full textBrandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Full textThis thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
Lusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.
Full textMwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.
Full textAl-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.
Full textEdwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.
Full textO'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.
Full textRoberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.
Full textMaahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textMoleko, Tsepo. "Assessing law enforcement's ability to fight cybercrime in South Africa." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11470.
Full textMatengu, Sinka. "Cybercrime awareness and reporting in the public sector in Botswana." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12044.
Full textIncludes bibliographical references.
Different authors have reported on the problem of cybercrime and other concepts that are associated with it. The studies looking at the area of ICT and cybercrime are examined and assessed to identify gaps that exist. Nevertheless, most of these studies focused more on developed countries, and did not emphasise on the public sector. Therefore, their findings might not be appropriately applicable to governments in developing countries especially within the Africa context. This study seeks to investigate factors that are necessary to enable the Botswana public sector to properly report on cybercrime attacks. The ICT environment of Botswana government is explored to determine the extent of ICT utilisation in the public sector. Based on the literature survey, a research framework for reporting cybercrime for the Botswana public sector is formulated.
Schultz, Charlotte Beverly. "Cybercrime : an analysis of the current legislation in South Africa." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60091.
Full textSimion, Raluca <1978>. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/1/Raluca_Simion_tesi.pdf.
Full textSimion, Raluca <1978>. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/.
Full textMassa, Margherita. "Internet e minori: la repressione dei cybercrime a sfondo sessuale." Doctoral thesis, Università degli studi di Padova, 2010. http://hdl.handle.net/11577/3427026.
Full textLa tesi, che si articola in quattro capitoli, indaga il delicatissimo rapporto tra i minori e Internet, e, in particolare, la problematica della tutela penale dei minori dai c.d. “cybercrime” a sfondo sessuale. Nel primo capitolo si svolge un’analisi preliminare circa la natura e le peculiari caratteristiche di Internet e la sua influenza sul diritto, nonché circa i rischi che l’utilizzo della Rete può comportare per gli utenti minori d’età, i quali diventano sempre più spesso vittime di reati di sfruttamento sessuale perpetrati sfruttando le nuove tecnologie. Nel secondo capitolo si fornisce un quadro della normativa e delle principali iniziative adottate a livello internazionale e comunitario (in particolare nell’ambito del c.d. “terzo pilastro”) per promuovere la tutela dei fanciulli quali soggetti con esigenze peculiari e diverse rispetto a quelle degli adulti contro ogni forma di abuso e sfruttamento sessuale, anche via Internet. La fondamentale Convenzione di New York del 1989 sui diritti del fanciullo, le convenzioni sul cybercrime del 2001 e sulla protezione dei bambini contro lo sfruttamento e gli abusi sessuali del 2007 promosse dal Consiglio d’Europa, la Decisione quadro 2004/68/GAI e la recentissima proposta della Commissione di decisione quadro del Consiglio relativa alla lotta contro l’abuso e lo sfruttamento sessuale dei minori e la pedopornografia che dovrebbe abrogare la predetta Decisione quadro 2004/68/GAI sono alcuni dei provvedimenti esaminati. Nel terzo capitolo si svolge un’approfondita analisi delle scelte politico-criminali operate dal legislatore italiano con le Leggi 269/1998 e 38/2006 in materia di tutela dei minori dallo sfruttamento sessuale, anche via Internet. Nello specifico, si esaminano le nuove fattispecie incriminatrici introdotte tra i delitti contro la personalità individuale nel corpo del Codice penale agli artt. 600-bis e seguenti, le principali questioni interpretative sorte in relazione ad esse, il trattamento sanzionatorio, il superamento del principio di territorialità nella perseguibilità di alcuni di tali delitti quando commessi all’estero, l’inasprimento di alcuni istituti processuali e le ulteriori misure introdotte dal legislatore a tutela dei minori. Si procede inoltre ad una breve analisi della Legge 48/2008, che ha recepito nell’ordinamento italiano la Convenzione di Budapest sul cybercrime e che ha parzialmente aggiornato il Codice penale ed il Codice di procedura penale alle nuove tecnologie, senza tuttavia introdurre alcuna modifica o nuova previsione al fine di recepire l’art. 9 della Convenzione relativo alle “offences related to child pornography”, ritenendo quanto previsto da tale disposizione “coperto” – se non addirittura superato – dalla tutela approntata dagli artt. 600-ter, 600-quater e 600-quater.1 e seguenti del Codice penale. Il quarto ed ultimo capitolo tratta della controversa problematica del fondamento e dei limiti della responsabilità penale dei provider. L’analisi muove da un inquadramento della categoria degli operatori su Internet e dall’esame degli obblighi finora posti a carico degli stessi (dal D. Lgs. 70/2003, dalle Leggi 269/1998 e 38/2006, dal c.d. “decreto Gentiloni”, nonché dalla Legge 48/2008). Si procede, quindi, all’esame delle diverse opinioni dottrinali elaborate in merito alla percorribilità di un’attribuzione di responsabilità in particolare a titolo di omesso impedimento dell’evento ai sensi dell’art. 40 cpv., c.p., nonché a titolo di concorso, in forma commissiva od omissiva, ai sensi degli artt. 110 e seguenti, c.p. nei reati realizzati da terzi sfruttando le piattaforme tecnologiche ed i servizi messi a disposizione dai provider. Infine, si fornisce una breve disamina circa gli orientamenti giurisprudenziali formatisi in materia in Italia ed alcuni cenni di comparazione con riferimento all’esperienza giuridica statunitense, giapponese ed a quella di alcuni ordinamenti giuridici europei.
Yetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.
Full textAnonymizing Internet technologies present unique challenges to law enforcement and intelligence organizations. Tor is an anonymity technology that has received extensive media coverage after a virtual black market hidden by its network was seized by the FBI in 2013. Anonymizing technologies have legitimate purposes, and as states increasingly employ sophisticated Internet censorship and surveillance techniques, they are becoming increasingly relevant. This study examines the creation of the modern Internet, explores the drastic changes that have taken place, and takes an in-depth look at intended and unintended uses of anonymizing technologies.
Katerina, Rebecca Paraskeva. "Targeting the escalation of cybercrime in Greece. A systematic literature review." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25447.
Full textКравченко, Є. В. "Організаційно-правові засади діяльності суб’єктів протидії кіберзлочинності." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72555.
Full textОдним из достижений научно-технической мысли человека стало внедрение в управленческий процесс и другие сферы жизни общества электронно-вычислительной техники, без которой хранения, обработка и использование огромного количества самой разнообразной ИНФОРМАЦИИ не было бы возможным. Это достижение принесло неоценимую пользу в развитие науки, техники и других отраслей знаний. Однако выгоды, которые можно получить благодаря использованию этой техники, стали использоваться i в преступных целях. Так, появился новый вид преступной деятельности - киберпреступления - общественно опасные последствия от совершения которых не шли в сравнению со вредом от других преступлений.
One of the achievements of human scientific and technical thought was the introduction into the management process and other spheres of life of the society of electronic computing, without which it would not be possible to store, process and use a huge amount of the most diverse information. This achievement has brought invaluable benefits to the development of science, technology and other fields of knowledge. However, the benefits that can be gained through the use of this technique have become used for criminal purposes. Thus, a new type of criminal activity - cybercrime - was a socially dangerous consequence from which the commission did not go in comparison with the damage from other crimes.
Кандюков, О. Г. "Правові засади діяльності кіберполіції в Україні та за кордоном: порівняльний аспект." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72466.
Full textПривлечение компьютерных технологий все к большему количеству сфер деятельности государства, приближает Украину не только к мировым стандартам и тенденциям, но и к их негативных последствий. Экономика, логистика и безопасность страны все больше зависят от технической инфраструктуры и ее защищенности. Для повышения эффективности борьбы с киберпреступностью, Украина достаточно давно начала соответствующие работы, необходимые для создания собственной стратегии кибербезопасности.
Zaluchennya komp'nyuchnykh tehnologiyy to all bolshoy kіlkostі spheres dіyalnostі power, close to Ukraine not just to svitovyh standardіv that trends, ale yy to their negative naslkdv. Economy, logistic and security of the country are more and more stored up between technical infrastructure and infrastructure. For the efficiency of the fight against the government, Ukraine has long been in the throes of the robots that are necessary for the implementation of strategic strategies.
Gumbi, Dumisani. "Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29247.
Full textKonte, Maria. "Understanding and defending against internet infrastructures supporting cybecrime operations." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54424.
Full textBalajanov, Elvin. "Responses to cybercrime in Azerbaijan, with special reference to the United Kingdom." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22942/.
Full textConnolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.
Full textYear in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management.
This work was supported by the Engineering and Physical Sciences Research Council and is part of the EMPHASIS (EconoMical, PsycHologicAl and Societal Impact of RanSomware) project [EP/P011721/1].
Maria, Stam. ""HOW SAFE DO YOU FEEL OUT ALONE ONLINE?" FEAR OF CRIME AND CYBERCRIME: A SYSTEMATIC LITERATURE REVIEW." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25375.
Full textWilson, Jacob. "Cryptocurrencies and Cybercrime: The Effects of Ransom Events on the Evolution of Bitcoin." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1787.
Full textAskerniya, Imran. "Investigation into reduction and/or prevention of cybercrime victimisation among the user individuals." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542285.
Full textIbekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.
Full textMorris, Sarah Louise Angela. "An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space." Thesis, Cranfield University, 2013. http://dspace.lib.cranfield.ac.uk/handle/1826/8034.
Full textYUCEDAL, BEHZAT. "VICTIMIZATION IN CYBERSPACE: AN APPLICATION OF ROUTINE ACTIVITY AND LIFESTYLE EXPOSURE THEORIES." Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1279290984.
Full textFissel, Erica R. "Victimization of the 21st Century: An Examination of Cyberstalking Victimization Using a Target Congruence Approach." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553613508435002.
Full textDornseif, Maximillian. "Phänomenologie der IT-Delinquenz : Computerkriminalität, Datennetzkriminalität, Multimediakriminalität, Cybercrime, Cyberterror und Cyberwar in der Praxis /." [S.l. : s.n.], 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016234254&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textMayland, Magnus. "A qualitative exploration of the challenges the Danish police face in dealing with cybercrime." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26483.
Full textOzeren, Suleyman. "Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4847/.
Full textEvoh, Peternwaike Nne Udo. "A systematic literature review on criminological research on the history of cybercrime focusing on type of crime and geographic origin of the perpetrators : Literature review on criminological research on the history of cybercrime." Thesis, Malmö universitet, Institutionen för kriminologi (KR), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-46088.
Full textEufrasio, Emília Teixeira Lima. "O cibercrime e a violação dos direitos fundamentais de natureza pessoal dos menores: o caso da CPLP." Master's thesis, [s.n.], 2015. http://hdl.handle.net/10284/4932.
Full textA realidade contemporânea é marcada pela permanente presença da rede Internet na vida quotidiana. Apesar dos proveitos que esta realidade traz para o desenvolvimento individual e coletivo, a exploração desmedida da Internet e a exposição da vida íntima nesse meio cria um ambiente propício a prática de vários atos ilícitos. O presente estudo aborda a questão da violação dos direitos fundamentais de natureza pessoal do menor. Nesse trilhar, o presente trabalho almeja apresentar um estudo juscomparativista, com foco nos países lusófonos (i.e. os membros da Comunidade dos Países de Língua Portuguesa ou CPLP), com destaque para Brasil, Guiné-Bissau e Portugal. O objetivo do trabalho é um aprofundamento sobre as vias de aplicação, por parte dos Estados comparados, da Convenção internacional sobre os Direitos da Criança e, ainda, sobre a necessidade de averiguação da aplicação do Protocolo Facultativo à Convenção internacional sobre os Direitos da Criança, relativo à venda de crianças, exploração sexual e pornografia infantis. Foi utilizado inquérito por questionário como forma de colher informações acerca do conhecimento dos profissionais que lidam com vítimas de cibercrime e o tipo de crimes causados aos menores. Como amostra, optou-se por trabalhar com 13 participantes dos países de língua portuguesa, sendo o fato de serem residentes em países da CPLP o critério de inclusão na amostra. Após aplicação dos questionários e da análise quantitativa, observou-se um paradoxo: embora os profissionais que lidam com o cibercrime, in casu com vítimas menores, terem conhecimento do que é o cibercrime e os tipos penais que são praticados no ciberespaço, os mesmos desconhecem a existência de normas internas que disciplinam acerca desse tipo de crime e, o mais grave, não têm conhecimento da existência de políticas públicas voltadas ao combate do cibercrime. O que fazer, então, para proteger os menores? O propósito do presente estudo, além de apontar as carências legislativas em países da CPLP (quanto aos crimes praticados no ciberespaço) é fazer um chamado a adesão aos protocolos facultativos da Convenção dos Direitos da Criança, como instrumento à prevenção desse tipo de crime. The contemporary reality is marked by the permanent presence of the Internet in everyday life. Despite the income that this reality brings to the individual and collective development, the ravenous Internet exploitation and exposure of private life in between creates an environment conducive to the practice of various illicit acts. The present study addresses the question of the violation of the fundamental rights of a personal nature. In this line, this work aims to present a comparative legal study, with a focus on Portuguese-speaking countries (i.e. the members of the Community of Portuguese Speaking Countries or CPLP), with emphasis on Brazil, Guinea-Bissau and Portugal. The objective of this work is a deepening on the means of implementation, on the part of the States compared, of the International Convention on the Rights of the Child and on the need for clarification of the application of the Optional Protocol to the Convention on the Rights of the Child on the sale of children, sexual exploitation and child pornography. Survey was used as a way of gathering information about the knowledge of professionals who deal with victims of cybercrime and the type of crimes caused to minors. As a sample, we chose to work with 13 participantes from the Portuguese-speaking countries, and the fact that they are resident in the CPLP countries was the criterion for inclusion in the sample. After application of questionnaires and quantitative analysis, a paradox emerged: although the professionals dealing with cybercrime, in casu with minor victims, have knowledge of what is cybercrime and criminal types that are practiced in cyberspace, they are unaware of the existence of internal rules that govern this type of crime and, worse than that, are not aware of the existence of public policies aimed at fighting cybercrime. What to do, then, to protect minors? The purpose of this study, in addition to point the legislative shortcomings in CPLP countries (with regard to crimes committed in cyberspace) is to make a call to adhesion to the optional protocols of the Convention on the rights of the child as an instrument for the prevention of this type of crime. La réalité contemporaine est marquée par la présence permanente de l'Internet dans la vie quotidienne. Malgré les bénéfices que cette réalité apporte au développement individuel et collectif, l'exploitation sur Internet et l'exposition de la vie privée entre les crée un environnement propice à la pratique de divers actes illicites. La présente étude aborde la question de la violation des droits fondamentaux de nature personnelle. Dans cette voie, ce travail a pour but de présenter une étude de juscomparativiste, en mettant l'accent sur les pays de langue portugaise (c'est-à-dire les membres de la Communauté des pays de langue portugaise ou CPLP), en accentuant l’étude sur le Brésil, la Guiné-Bissau et le Portugal. L'objectif de ce travail est un approfondissement sur les moyens d'exécution, la part des États étudiés, de la Convention internationale relative aux droits de l'enfant et sur la nécessité d'une clarification de l'application du protocole facultatif à la Convention relative aux droits de l'enfant concernant la vente d'enfants, l’exploitation sexuelle et la pornographie infantile. Une enquête a été utilisé comme un moyen de recueillir des informations sur les connaissances des professionnels qui s'occupent des victimes de la cybercriminalité et le type de crimes causés aux mineurs. Comme échantillon, nous avons choisi de travailler avec 13 participants provenants des pays lusophones, et le fait qu'ils soient résidents dans les pays de la CPLP a constitué le critère d'inclusion dans l'échantillon. Après application des questionnaires et analyse quantitative, un paradoxe est apparu: bien que les professionnels traitant de la cybercriminalité, en l'espèce avec les victimes mineures, aient connaissance de ce qu’est la cybercriminalité et les types criminels qui sont pratiquées dans le cyberespace, ils ignorent l'existence de règles internes qui régissent ce type de crime et, ce qui est plus graves, ne sont pas au courant de l'existence de politiques publiques visant à lutter contre la cybercriminalité. Que faire, alors, pour protéger les mineurs? Le but de cette étude, en plus de pointer les lacunes de la législation dans les pays de la CPLP (en ce qui concerne les crimes commis dans le cyberespace) est d'effectuer un appel au respect des protocoles facultatifs de la Convention relative aux droits de l'enfant comme un instrument pour la prévention de ce type de crime.
Guerra, Chris. "Fundamental Demographics of Digital Piracy Offenders." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157573/.
Full textHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Full textSynnestvedt, Jensen Louise. "Terrorism or hacking? A law interpretation on the concept of cyber terrorism. : A legal dogmatic thesis with an empirical legal science methodology." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-25203.
Full textRiek, Markus [Verfasser], and Rainer [Akademischer Betreuer] Böhme. "Towards a robust quantification of the societal impacts of consumer-facing cybercrime / Markus Riek ; Betreuer: Rainer Böhme." Münster : Universitäts- und Landesbibliothek Münster, 2018. http://d-nb.info/1159955921/34.
Full textPutigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.
Full textThe increasing generalization of conventional computer technologies and the emergence of the Internet of Things are probably founding principles of a new digital world order. The omnipresence, the interdependence of networks and the convergence of the components of cyberspace, catalyze the formation of social groups in an object such as the Internet and in particular in social media. The thesis will study in particular the birth of cybercriminal communities, as well as the rites and ties of affinity of the members of these societies. Beyond highlighting the elements of socio-cultural dynamics related to the creation of these digital spaces and their maintenance, the thesis will tend to show that there is a form of logic in the process of integration and the development of these virtual communities. cybercriminal
Cian, Healy, and ZHE LI. "The Role Decentralised Non-Regulated Virtual Currencies Play in Facilitating Unlawful Financial Transactions." Thesis, KTH, Entreprenörskap och Innovation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188935.
Full textReyns, Bradford W. "Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1273840781.
Full textHenson, Billy. "Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1313685865.
Full textJung, Jeyong. "A study of cyber security management within South Korean businesses : an examination of risks and cybercrime involving industrial security." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/a-study-of-cyber-security-management-within-south-korean-businesses(4f6f8a10-c31a-4eec-b092-2b38ac8815d9).html.
Full textJäger, Stefan [Verfasser], Eberhard [Gutachter] Zehendner, and Christian [Gutachter] Johner. "Gefährdungslage deutscher Arztpraxen (als Teil des Gesundheitswesens und der KMU) durch Cybercrime / Stefan Jäger ; Gutachter: Eberhard Zehendner, Christian Johner." Jena : Friedrich-Schiller-Universität Jena, 2020. http://d-nb.info/1219574104/34.
Full textHruška, Tomáš. "Podvod a audit." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-201708.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textMin-Cheng, Lin, and 林民程. "Problem Structuring of Cybercrime." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/17290482846400883347.
Full text國立中興大學
公共行政及政策研究所
86
There are three major purposes of the present study: (1) to understandthe nature of cyberspace; (2) to investigate the social reality of cybercrime;and (3) to constructs some possile strategies for government to manage cybercrime. To achieve the research goals, the study took a multi-disciplinary approach to explore the subject. Our perspectives include legal theory, sociology of law, criminology, spacial theory, contemporary social philosophy and economics. Problem structuring in public policy was utilized as a methodology to developthe theoretical framework and hyptheses for the research. An empirical analysis was then designed to further examine the researchhypotheses. In the empirical analysis, cyberspace was classified into three categories based on the nature of its accessibility: public, specified and private spaces. Among the five target groups (legislators'' assistants, judges,consumers in fast food restaurants, colleges students, and internet users), the research found that their attitudes towards the 19 selected deviant or deviant-to-be behaviors in cyberspace varied. For instance, legislators'' assistantsand judges had lower tolerance than internet useers to most of the behaviors.However, no matter which group one belonged to, people tended to have lessagreement for "mala prohibita" behaviors than "mala in se" behaviors. The results also indicated that regardless of the nature of deviant behabior,deviant behaviors occurring in specified cyberspace were more likely to activate debates than those in public and private cyberspaces. At last, this research reviewed the laws and regulations in Taiwan relatedto cybercrime in general and the 19 selected behavior in specific. Along with the empirical findings and legal literature review, the present studyproposed a multi-dimensional model of structuring the problem of cybercrime. We argue that strategies for government to managing cybercrime would be more appropriate and feasible if the public consensus and the nature of cyberspaceare both taken into a serous consideration when constructing the problem ofcybercrime. The policy implication was further discussed in detail at the end of the study.
Iqbal, Farkhund. "Messaging Forensic Framework for Cybercrime Investigation." Thesis, 2011. http://spectrum.library.concordia.ca/7077/1/Iqbal_PhD_S2011.pdf.
Full text