To see the other types of publications on this topic, follow the link: Cybercrime.

Dissertations / Theses on the topic 'Cybercrime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cybercrime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.

Full text
Abstract:
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; warnings for known allergies to medicines such as penicillin are electronically erased from patients' charts; and laboratory records on HIV blood tests results are insidiously switched from negative to positive just before patients are to receive their results. (Marc D Goodman 'Why the police don't care about computer crime' (1997) 10 Harvard Journal of Law and Technology 465 at 466). Although this scenario is possible with current technology, unfortunately Lesotho would be powerless to act for lack of adequate laws to investigate and prosecute this conduct. Lesotho's current criminal laws can hardly be enforced against cybercrime, as they do not clearly prohibit the crime. Therefore, this paper argues that Lesotho must adopt a comprehensive legal structure to deter and prosecute cybercrime. It does this by examining international and national approaches to cybercrime, with a view to providing guidance for an effective framework capable of addressing this 'new' crime. Cybercrime is a major global challenge requiring coordinated international effort. In a networked world no island is an island; cybercrime penetrates all countries because of its ability to cross national boundaries. Further, this paper suggests a model law that is based on the first international treaty which plays a key role in combating cybercrime. Finally, it recognises that legislation alone cannot fight cybercrime; law enforcement must be equipped to implement the law, and private citizens must know about cybercrime and the need to protect themselves and their systems and networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID.
This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
APA, Harvard, Vancouver, ISO, and other styles
3

Lusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.

Full text
Abstract:
The central theme of this thesis is that cybercrime has matured into a large profitdriven industry. Hobby hackers still exist and hacktivists have attracted some attention in recent years, but a very significant component of contemporary cybercrime is now financially motivated. While its goods and services are usually illicit, the cybercrime industry operates according to the same broad principles of industrial organisation observed across numerous other contexts. But the development of this industry is somewhat puzzling. Ostensibly much cybercriminal cooperation takes place online. As a result, cybercriminals are often partnering with online criminals whose true identities are unknown to them. They also have no means of physical enforcement should deals go awry. Partnering with conventional criminals, who operate outside the protection of the state, already appears to present significant challenges for cooperation. The challenge of anonymity makes cooperation even more difficult and suggests that cybercriminals would often act alone, or in small groups. Instead a large successful industry has formed. This thesis first addresses the industrialisation of cybercrime. It then addresses this puzzle of how cybercriminals have overcome the challenges to cooperation to build an industry on such a scale.
APA, Harvard, Vancouver, ISO, and other styles
4

Mwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.

Full text
Abstract:
The Internet can be considered a double-edged sword because while offering a range of benefits, it provides criminals with the opportunity to extend their work to areas and places previously unimaginable. Therefore, all countries face the same challenges on how to fight cybercrime and how to effectively promote security to their citizens and organisations. In Jordan, cybercafes have become "culturally acceptable alternatives" and a haven for individuals wanting to engage in some form of deviant behaviour away from the prying eyes of society. The aim of this research is to examine the online behaviours of individuals living in two different cyberspaces (English and Non-English). The literature currently available has no such conducted research. Therefore, this research has attempted to address this significant gap in the research by examining the relationship between online behaviour and computer victimisation in two countries; the UK as an example of an English cyberspace in a developed country, and Jordan as a Non-English cyberspace in a developing country. This thesis, in addition, draws attention to the growIng numbers of cybercrime victims, and the techniques used by cyber criminals to victimise them. Understanding the trends of cybercrime and the strategies employed by cyber criminals in order to commit cybercrime will help us to identify the steps that needs be taken to prevent such criminal activities. This study investigates individuals who do or do not take precautions to guard themselves against cybercrime, and examines how their perception of law influences their actions towards incidents of cybercrime. In this study, 'guardianship' refers to actions or procedures that individuals take to ensure that any given computer is secure before they go online, and is linked to the awareness of risks associated with the use of the Internet that an individual may have. Environmental crime theories are popular because of their success in solving traditional crime; Life-style Routine Activity Theory (LRA T) is a good example of these traditional crime theories. The particular interest of this thesis is how to benefit from these crime theories in the fight against cybercrime victimisation. This study has assessed a new theoretical model derived from LRA T. This new conceptual model expands upon digital capable guardianship elements by adding the element of "Awareness", using statistical evidence to demonstrate its key significance in bringing about online harmony alongside the three pre-existing elements (Formal Social Control, Informal Social Control, and Target Hardening). The conceptual model and theoretical basis of this research suggests that it is not only computer-related Formal Social Control (FSC) aspects which can have an impact upon an individual's perception of online activities, but also posits that an individual's awareness can influence their online behaviours. The results of this research allows us to determine the effectiveness of both FSC and "Awareness" on the behaviours of individuals within the overall efforts of a society to fight cybercrime victimisation. This is an extension to the existing literature which typically focuses on technical perspectives to ensure computer security.
APA, Harvard, Vancouver, ISO, and other styles
6

Edwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.

Full text
Abstract:
This thesis presents the legal and technical challenges law enforcement investigators face when seeking digital evidence from a cloud-computing environment. It presents a series of solutions including an investigative methodology that obtains and presents such evidence in a legal and technically transparent manner. By gathering the opinions of international and domestic law enforcement investigators as well as major cloud service providers, the thesis critically examines the ability of law enforcement to hold the criminal community accountabe for criminal offences commoted across a multi-jurisdictional environment where the evidence is located within cloud computing storage.
APA, Harvard, Vancouver, ISO, and other styles
7

O'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.

Full text
Abstract:
This thesis examines the Council of Europe's Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of 'suppression' conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the 'suppressed' offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers have provided powerful tools for policing cybercrime, and the Convention has been innovative by developing mechanisms for facilitating networking interactions between law enforcement, and on most interpretations, even providing for directly contacting foreign service providers for data. The traditional limitations of enforcement jurisdiction are gradually being transformed, but the resulting difficulties for jurisdictional concurrency are not appreciated. Given the malleability of the concept of 'territoriality', and the flexibility afforded in international law in its interpretation, seizures of jurisdiction over many cybercrimes have sometimes been on the most tenuous of grounds. This results in a problem of concurrent jurisdiction on a scale previously unseen in the context of other transnational offences. It is often assumed that once substantive criminal harmonisation occurs, jurisdictional conflict between States dissipates, but I highlight three areas where concurrency is beginning to generate difficulties: investigatory and prosecutorial negotiations, cybercrime extraditions, and the law relating to ne bis in idem. I argue that these problems are only going to be exacerbated given the inroads that are being made in investigative powers and enforcement jurisdiction, coupled with the global reach of cybercrime which brings more and more States into play. I provide both the theoretical and practical case for more refined approaches towards the concept of territoriality, and consider some of the potential mechanisms for dealing with these uneasy bedfellows in the Cybercrime Convention.
APA, Harvard, Vancouver, ISO, and other styles
8

Roberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.

Full text
Abstract:
The Internet is now fundamental to the global economy. Growing from an experimental and research network in the late 1960's, it is now the foundation of a wide range of economic, infrastructure support, communication and information sharing activities. In doing so it has also provided a vehicle for cybercrime. Organised cybercrime and state-sponsored malicious cyber activity are predicted to become the predominant cyber threats over the next five to ten years. Corporate governance is playing an increasingly important role in ensuring compliance with the growing body of legislation and regulation, protecting the interests of stakeholders. At the same time there is a divergence in organisational awareness, understanding, strategy and application between business objectives, risk management and good security practices. Organisations are finding increasing difficulty in managing the scope and extent of the cyber-threat environment, exacerbated by confusion over risk tools, approaches and requirements. This study provides a pragmatic and practical framework for organisational risk assessment, already proved over several years of use. This is supported by three national surveys which provide important data for sound risk identification and assessments. This survey data is organised through a Data Schema which is simple, rational and flexible enough to accommodate new technologies and types of cyber-attacks, as well as allowing for the decommissioning of technologies and the abandonment of attack methods. For many organisations this risk framework will be sufficient to meet their corporate governance and risk management requirements. For organisations wishing to refine their approach, a Bayesian model has also been developed, building on previous work, incorporating data from the surveys and, through the Data Schema, allowing the incorporation of probabilities and other evidence to enhance the risk assessment framework. Again this model is flexible, accommodating changes, growth and new technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Maahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.

Full text
Abstract:
Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework was systems thinking and action theory. Participants included 4 small manufacturing business owners in the midwestern region of the United States. Data were collected via face-to-face interviews with owners, company documentation, and observations. Member checking was used to help ensure data reliability and validity. Four themes emerged from the data analysis: organizational policies, IT structure, managerial strategies, and assessment and action. Through effective IT security and protocols, proactive managerial strategies, and continuous evaluation of the organization's system, the small business owner can sustain the business and protect it against potential cyberattacks on the organization's network. The findings of the study have implications for positive social change by informing managers regarding (a) the elimination or reduction of cybercrimes, (b) the protection of customers' information, and (c) the prevention of future breaches by implementing effective managerial strategies to protect individuals in society.
APA, Harvard, Vancouver, ISO, and other styles
10

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Moleko, Tsepo. "Assessing law enforcement's ability to fight cybercrime in South Africa." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11470.

Full text
Abstract:
Cybercrime is the use of technology to support or directly facilitate a criminal activity, with logon credentials being the main information asset targeted during a cybercrime. The one time passwords used by banks to protect their clients from cybercrime are also under attack by cybercriminals. The Internet has made it easy to commit cybercrime, with perpetrators experiencing virtually no risk with huge returns. Individual cybercrime cases are sometimes small in nature, which means that the police can be reluctant to commit the resources necessary to investigate every incident. There is a distinct lack of resources, skills, knowledge and training in relation to identifying, understanding and responding to the growing threat of cybercrime. This research addresses how to solve these issues in South Africa in order for cybercrime to be tackled effectively and for perpetrators to be prosecuted.
APA, Harvard, Vancouver, ISO, and other styles
12

Matengu, Sinka. "Cybercrime awareness and reporting in the public sector in Botswana." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12044.

Full text
Abstract:
Includes abstract.
Includes bibliographical references.
Different authors have reported on the problem of cybercrime and other concepts that are associated with it. The studies looking at the area of ICT and cybercrime are examined and assessed to identify gaps that exist. Nevertheless, most of these studies focused more on developed countries, and did not emphasise on the public sector. Therefore, their findings might not be appropriately applicable to governments in developing countries especially within the Africa context. This study seeks to investigate factors that are necessary to enable the Botswana public sector to properly report on cybercrime attacks. The ICT environment of Botswana government is explored to determine the extent of ICT utilisation in the public sector. Based on the literature survey, a research framework for reporting cybercrime for the Botswana public sector is formulated.
APA, Harvard, Vancouver, ISO, and other styles
13

Schultz, Charlotte Beverly. "Cybercrime : an analysis of the current legislation in South Africa." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Simion, Raluca <1978&gt. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/1/Raluca_Simion_tesi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Simion, Raluca <1978&gt. "Individual victims of cybercrime. A comparison between Italy and Romania." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/2050/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Massa, Margherita. "Internet e minori: la repressione dei cybercrime a sfondo sessuale." Doctoral thesis, Università degli studi di Padova, 2010. http://hdl.handle.net/11577/3427026.

Full text
Abstract:
The dissertation, which consists of four chapters, analyzes the important relationship between the minors and the Internet. In particular, it focuses on criminal protection of children against sexual cybercrimes. In the first chapter, a preliminary analysis of the nature of the Internet, its specific characteristics and its impact on law is conducted. The risks for children associated with the use of the Internet and the new technologies are also investigated. The second chapter is devoted to an overview of the regulation and key initiatives adopted both at the international and European Community level (in particular in the context of the so-called “third pillar”) in order to protect children against all types of sexual abuse and exploitation, including those through the Internet. The 1989 Convention of New York on the Rights of the Child, the 2001 Convention on Cybercrime and the 2007 Convention on Children Protection against Sexual Abuse and Exploitation promoted by the European Council, the Council Framework Decision 2004/68/JHA, and the recent Proposal for a Council Framework Decision on Combating the Sexual Abuse, Sexual Exploitation of Children and Child Pornography that should repeal the Council Framework Decision 2004/68/JHA are some of the initiatives analyzed. The third chapter provides a detailed analysis of the political-criminal choices made by the Italian legislator on the matter of children protection against sexual exploitation perpetrated also through the Internet through the adoption of Laws 269/21998 and 38/2006. In particular, the chapter focused on the new crimes introduced in the Italian Penal Code among the crimes against the individual personality at Paragraphs 600-bis and subsequent, the main interpretative issues related to these, the sanctions, the overcoming of the territoriality principle in the prosecution of some of such crimes when committed abroad, the exacerbation of some process measures, and the further measures introduced by the legislator to protect children. A brief analysis is also provided on Law 48/2008, which has implemented in the Italian legal system the Budapest Convention on Cybercrime, and has partially updated the Italian Penal Code and Penal Procedure Code to the new technologies, without however introducing any change or provision in order to implement Paragraph 9 of the Convention (Offences related to child pornography). Indeed, the content of Paragraph 9 has been considered as already covered by Paragraphs 600-ter, 600-quater and 600-quater.1 and subsequent of the Italian Penal Code. The fourth and last chapter deals with the controversial issue of the rationales behind and limits of the providers’ criminal responsibility. The analysis starts with an overview on the categorization of the Internet service providers and their current obligations set forth by D. Lgs. 70/2003, Laws 269/1998 and 38/2006, Gentiloni Decree, and Law 48/2008. Then, the different opinions of the Doctrine on the feasibility of the assignment to providers of a criminal responsibility in particular for omission according to Paragraph 40, Section 2, of the Italian Penal Code and for concurrent action or omission according to Paragraphs 110 and subsequent of the Italian Penal Code for crimes committed by third parties using the technological platforms and services offered by the providers themselves are examined. Finally, a brief analysis of the orientations of Jurisprudence on the issue in Italy compared to the United States, Japan and other European countries is provided.
La tesi, che si articola in quattro capitoli, indaga il delicatissimo rapporto tra i minori e Internet, e, in particolare, la problematica della tutela penale dei minori dai c.d. “cybercrime” a sfondo sessuale. Nel primo capitolo si svolge un’analisi preliminare circa la natura e le peculiari caratteristiche di Internet e la sua influenza sul diritto, nonché circa i rischi che l’utilizzo della Rete può comportare per gli utenti minori d’età, i quali diventano sempre più spesso vittime di reati di sfruttamento sessuale perpetrati sfruttando le nuove tecnologie. Nel secondo capitolo si fornisce un quadro della normativa e delle principali iniziative adottate a livello internazionale e comunitario (in particolare nell’ambito del c.d. “terzo pilastro”) per promuovere la tutela dei fanciulli quali soggetti con esigenze peculiari e diverse rispetto a quelle degli adulti contro ogni forma di abuso e sfruttamento sessuale, anche via Internet. La fondamentale Convenzione di New York del 1989 sui diritti del fanciullo, le convenzioni sul cybercrime del 2001 e sulla protezione dei bambini contro lo sfruttamento e gli abusi sessuali del 2007 promosse dal Consiglio d’Europa, la Decisione quadro 2004/68/GAI e la recentissima proposta della Commissione di decisione quadro del Consiglio relativa alla lotta contro l’abuso e lo sfruttamento sessuale dei minori e la pedopornografia che dovrebbe abrogare la predetta Decisione quadro 2004/68/GAI sono alcuni dei provvedimenti esaminati. Nel terzo capitolo si svolge un’approfondita analisi delle scelte politico-criminali operate dal legislatore italiano con le Leggi 269/1998 e 38/2006 in materia di tutela dei minori dallo sfruttamento sessuale, anche via Internet. Nello specifico, si esaminano le nuove fattispecie incriminatrici introdotte tra i delitti contro la personalità individuale nel corpo del Codice penale agli artt. 600-bis e seguenti, le principali questioni interpretative sorte in relazione ad esse, il trattamento sanzionatorio, il superamento del principio di territorialità nella perseguibilità di alcuni di tali delitti quando commessi all’estero, l’inasprimento di alcuni istituti processuali e le ulteriori misure introdotte dal legislatore a tutela dei minori. Si procede inoltre ad una breve analisi della Legge 48/2008, che ha recepito nell’ordinamento italiano la Convenzione di Budapest sul cybercrime e che ha parzialmente aggiornato il Codice penale ed il Codice di procedura penale alle nuove tecnologie, senza tuttavia introdurre alcuna modifica o nuova previsione al fine di recepire l’art. 9 della Convenzione relativo alle “offences related to child pornography”, ritenendo quanto previsto da tale disposizione “coperto” – se non addirittura superato – dalla tutela approntata dagli artt. 600-ter, 600-quater e 600-quater.1 e seguenti del Codice penale. Il quarto ed ultimo capitolo tratta della controversa problematica del fondamento e dei limiti della responsabilità penale dei provider. L’analisi muove da un inquadramento della categoria degli operatori su Internet e dall’esame degli obblighi finora posti a carico degli stessi (dal D. Lgs. 70/2003, dalle Leggi 269/1998 e 38/2006, dal c.d. “decreto Gentiloni”, nonché dalla Legge 48/2008). Si procede, quindi, all’esame delle diverse opinioni dottrinali elaborate in merito alla percorribilità di un’attribuzione di responsabilità in particolare a titolo di omesso impedimento dell’evento ai sensi dell’art. 40 cpv., c.p., nonché a titolo di concorso, in forma commissiva od omissiva, ai sensi degli artt. 110 e seguenti, c.p. nei reati realizzati da terzi sfruttando le piattaforme tecnologiche ed i servizi messi a disposizione dai provider. Infine, si fornisce una breve disamina circa gli orientamenti giurisprudenziali formatisi in materia in Italia ed alcuni cenni di comparazione con riferimento all’esperienza giuridica statunitense, giapponese ed a quella di alcuni ordinamenti giuridici europei.
APA, Harvard, Vancouver, ISO, and other styles
17

Yetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.

Full text
Abstract:

Anonymizing Internet technologies present unique challenges to law enforcement and intelligence organizations. Tor is an anonymity technology that has received extensive media coverage after a virtual black market hidden by its network was seized by the FBI in 2013. Anonymizing technologies have legitimate purposes, and as states increasingly employ sophisticated Internet censorship and surveillance techniques, they are becoming increasingly relevant. This study examines the creation of the modern Internet, explores the drastic changes that have taken place, and takes an in-depth look at intended and unintended uses of anonymizing technologies.

APA, Harvard, Vancouver, ISO, and other styles
18

Katerina, Rebecca Paraskeva. "Targeting the escalation of cybercrime in Greece. A systematic literature review." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25447.

Full text
Abstract:
Abstract:Cybercrime refers to any illegal use of technology, a computer, networked device or a network for criminal acts. It constitutes a rapidly evolving and complex phenomenon as the Internet is ruling on almost every sector of human activity. Innovation plays a highly significant role in the growth of an economy. However, every time there is an advancement in the field of technology, there is bound to be other adverse effects. Such is the case with criminology. In this end, the prevalence of cybercrime is alarmingly increasing, and there have been several attempts by the government and other concerned agencies at stemming its escalation (Curtis et al., 2009). The following thesis shows the investigation of the rise of cybercrime in Greece. It is a systematic literature review available on this topic, aiming to explore areas such as the preparedness of the government in the fight against cybercrime, and the consideration that, in so doing, it is obligated to protect the rights of intellectual property as well as the protection of the rights to privacy of its citizens (Gobran, 2015). Of all the categories of information technology-related crimes, cybercrimes are the most common. The thesis also explores the conventions and laws employed by law enforcement in the efforts to counter the activities of cybercrime, including their effectiveness. It also establishes the different sectors and industries with the highest rates of cybercrime activities and the ways in which these sectors are fighting against these activities.
APA, Harvard, Vancouver, ISO, and other styles
19

Кравченко, Є. В. "Організаційно-правові засади діяльності суб’єктів протидії кіберзлочинності." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72555.

Full text
Abstract:
Одним з досягнень науково-технічної думки людини стало впровадження в управлінський процес та інші сфери життя суспільства електронно-обчислювальної технiки, без якої зберiгання, обробка та використання величезної кількості найрізноманітнішої iнформації не було б можливим. Це досягнення принесло неоціненну користь у розвиток науки, техніки та інших галузей знань. Однак вигоди, якi можна отримати завдяки використанню цiєї технiки, стали використовуватися i в злочинних цілях. Так, з'явився новий вид злочинної діяльності - кіберзлочини - суспільно небезпечні наслiдки вiд вчинення яких не йшли в порiвняння зi шкодою вiд iнших злочинiв.
Одним из достижений научно-технической мысли человека стало внедрение в управленческий процесс и другие сферы жизни общества электронно-вычислительной техники, без которой хранения, обработка и использование огромного количества самой разнообразной ИНФОРМАЦИИ не было бы возможным. Это достижение принесло неоценимую пользу в развитие науки, техники и других отраслей знаний. Однако выгоды, которые можно получить благодаря использованию этой техники, стали использоваться i в преступных целях. Так, появился новый вид преступной деятельности - киберпреступления - общественно опасные последствия от совершения которых не шли в сравнению со вредом от других преступлений.
One of the achievements of human scientific and technical thought was the introduction into the management process and other spheres of life of the society of electronic computing, without which it would not be possible to store, process and use a huge amount of the most diverse information. This achievement has brought invaluable benefits to the development of science, technology and other fields of knowledge. However, the benefits that can be gained through the use of this technique have become used for criminal purposes. Thus, a new type of criminal activity - cybercrime - was a socially dangerous consequence from which the commission did not go in comparison with the damage from other crimes.
APA, Harvard, Vancouver, ISO, and other styles
20

Кандюков, О. Г. "Правові засади діяльності кіберполіції в Україні та за кордоном: порівняльний аспект." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72466.

Full text
Abstract:
Залучення комп’ютерних технологій до все більшої кількості сфер діяльності держави, наближає Україну не тільки до світових стандартів та тенденцій, але й до їх негативних наслідків. Економіка, логістика та безпека країни все більше залежать від технічної інфраструктури та її захищеності. Для підвищення ефективності боротьби з кіберзлочинністю, Україна досить давно почала відповідні роботи, необхідні для створення власної стратегії кібербезпеки.
Привлечение компьютерных технологий все к большему количеству сфер деятельности государства, приближает Украину не только к мировым стандартам и тенденциям, но и к их негативных последствий. Экономика, логистика и безопасность страны все больше зависят от технической инфраструктуры и ее защищенности. Для повышения эффективности борьбы с киберпреступностью, Украина достаточно давно начала соответствующие работы, необходимые для создания собственной стратегии кибербезопасности.
Zaluchennya komp'nyuchnykh tehnologiyy to all bolshoy kіlkostі spheres dіyalnostі power, close to Ukraine not just to svitovyh standardіv that trends, ale yy to their negative naslkdv. Economy, logistic and security of the country are more and more stored up between technical infrastructure and infrastructure. For the efficiency of the fight against the government, Ukraine has long been in the throes of the robots that are necessary for the implementation of strategic strategies.
APA, Harvard, Vancouver, ISO, and other styles
21

Gumbi, Dumisani. "Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29247.

Full text
Abstract:
As broadband infrastructure investments in developing nations intensify and barriers to accessing the internet diminish, the more they increasingly become the quintessential destination for cybercrime. For their lax cyber laws and general cybercrime illiteracy, developing nations such as South Africa, Kenya, and India have become the destination of choice for cybercriminal enterprises. The focus of this dissertation is to comparatively analyse South Africa’s ICT regulatory framework against those of developing and developed nations and to determine its effectiveness in addressing the threat posed by cybercrime. This dissertation hopes to contribute towards establishing a greater understanding and appreciation of the scourge of cybercrime by studying the frameworks, structures, and arrangements, installed to safeguard against the threat of cybercrime in both developing nations, namely Kenya and India, and developed nations, namely the United States of America and the United Kingdom. Some of the key challenges identified in the dissertation, arising from the analysis of South Africa’s cyber laws and policy framework, point to legislation that is out of date and in desperate need of revision, a lack of definitional clarity for cybercrime related terminology, jurisdiction limitations to investigate international cybercrimes, no harmonisation with international laws, standards, and a poor record of implementing strategy and policies. The dissertation concludes that the battle against cybercrime cannot be won without first understanding what cybercrime is. Developing a common understanding of cybercrime and related terminology, and recommends the revision of the necessary ICT strategies, policies, and regulatory frameworks. Concluding international cooperation and mutual assistance agreements to assist with transnational cybercrime investigations and prosecutions is paramount. Establishing cross-sector, intra-ministerial, public-private, and multinational partnerships is also vital to managing the threat of cybecrime. Lastly, this dissertation recommends the development of dedicated cybersecurity and cybercrime mechanisms for the prosecution and safeguarding of the nation’s critical information infrastructure, the mission critical information of corporates and the personal information of citizens against cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
22

Konte, Maria. "Understanding and defending against internet infrastructures supporting cybecrime operations." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54424.

Full text
Abstract:
Today's cybercriminals must carefully manage their network resources to evade detection and maintain profitable businesses. For example, a rogue online enterprise has to have multiple technical and business components in place, to provide the necessary infrastructure to keep the business available. Often, cybercriminals in their effort to protect and maintain their valuable network resources (infrastructures), they manipulate two fundamental Internet protocols; the Domain Name System (DNS) and the Border Gateway Protocol (BGP). A popular countermeasure against cybercriminal infrastructures are Autonomous Systems (AS) reputation systems. Past research efforts have developed several AS reputation systems that monitor the traffic for illicit activities. Unfortunately, these systems have severe limitations; (1) they cannot distinguish between malicious and legitimate but abused ASes, and thus it is not clear how to use them in practice, (2) require direct observation of malicious activity, from many different vantage points and for an extended period of time, thus delaying detection. This dissertation presents empirical studies and a system that help to counteract cybecriminal infrastructures. First, we perform empirical studies that help to advance our understanding, about how these infrastructures operate. We study two representative types of infrastructures: (1) fast-flux service networks which are infrastructures based on DNS manipulation, (b) malicious ASes (hubs of cybercriminal activities) which are infrastructures that are primarily based on BGP manipulation. Second, we build on our observations from these studies, and we design and implement, ASwatch; an AS reputation system that, unlike existing approaches, monitors exclusively the routing level behavior of ASes, to expose malicious ASes sooner. We build ASwatch based on the intuition that, in an attempt to evade possible detection and remediation efforts, malicious ASes exhibit agile routing behavior (e.g. short-lived routes, aggressive re-wiring). We evaluate ASwatch on known malicious ASes, and we compare its performance to a state of the art AS reputation system.
APA, Harvard, Vancouver, ISO, and other styles
23

Balajanov, Elvin. "Responses to cybercrime in Azerbaijan, with special reference to the United Kingdom." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22942/.

Full text
Abstract:
The primary objective of this research is to explore and analyse policy and legal responses of Azerbaijan to cybercrime, provide detailed and insightful recommendations to enhance the effectiveness, efficiency and legality of Azerbaijani responses to cybercrime based on the existing experience and insights of the UK. It is contended that although the application of Information and Communication Technologies has been significantly encouraged in Azerbaijan effective and efficient control and prevention of cybercriminal activities had not been adequately assured. This thesis has, thus, focused on finding out whether necessary institutions are in place, and whether national policies and laws are sufficient to address the challenges of cybercrime and are being implemented in accordance with national and international laws, standards and principles. Based on the research findings it is asserted that Azerbaijan has failed to respond appropriately to cybercrime due to the lack of both policy and legal frameworks as well as insufficient human, institutional and technological capacity and resources, and low levels of cooperation at the national and international levels. As one of the countries having encountered an increasing impact of threats from cybercrimes, Azerbaijan needs to enhance its capacity to control and prevent these threats more effectively and efficiently. Notwithstanding that the country has taken multiple measures to address the problem of cybercrime, these measures are not effectively coordinated and remain fragmented and incomplete. However, it has also become apparent that there is not a single solution to the problems posed by cybercrime, which Azerbaijan has failed to adopt. Cybercrime requires a holistic response: a combination of a strategy, policies and laws, extralegal measures, sufficient human, institutional and technological capacity and resources, as well as effective and efficient cooperation at the national and international levels.
APA, Harvard, Vancouver, ISO, and other styles
24

Connolly, Lena Y., and D. S. Wall. "The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures." Elsevier, 2019. http://hdl.handle.net/10454/17916.

Full text
Abstract:
Yes
Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management.
This work was supported by the Engineering and Physical Sciences Research Council and is part of the EMPHASIS (EconoMical, PsycHologicAl and Societal Impact of RanSomware) project [EP/P011721/1].
APA, Harvard, Vancouver, ISO, and other styles
25

Maria, Stam. ""HOW SAFE DO YOU FEEL OUT ALONE ONLINE?" FEAR OF CRIME AND CYBERCRIME: A SYSTEMATIC LITERATURE REVIEW." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25375.

Full text
Abstract:
Fear of crime is a well-explored field within criminology. Although inconsistencies exist, it is mostly defined as an emotional reaction to crime or aspects of crime. Consequences can affect society indirectly but are mainly on an individual level. For example, an individual can decide to avoid certain environments. One of these environments can be cyberspace, the internet, as individuals can experience fear of online criminal activity. This area of research has not been explored as much as fear of traditional crime. A systematic literature review is conducted to analyse the body of research that applies the concept fear of crime to cybercrime. With the purpose to assess the much-discussed concept fear of crime to a new subset of crimes within criminology, cybercrime. This review has shown that challenges and limitations from traditional fear of crime research are still present in fear of crime research of the online environment. Findings are in part in line with previously published studies on the subjects and provide a knowledge base for future research. The paper concludes that the online environment does not seem to stand on its own when it comes to feelings of fear, and that the broader context of an individual’s experiences should be considered.
APA, Harvard, Vancouver, ISO, and other styles
26

Wilson, Jacob. "Cryptocurrencies and Cybercrime: The Effects of Ransom Events on the Evolution of Bitcoin." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1787.

Full text
Abstract:
With the explosion of Bitcoin, various cryptocurrencies are beginning to garner incredible amounts of attention from speculators and institutional investors alike. Simultaneously, the rise in the number of occurrences of cyber ransom attacks has proven to be an increasingly relevant part of the conversation in the formative years of the Bitcoin ecosystem, as hackers demand payments be in the form of bitcoin. To test the relative impact of these different ransom events on the price of bitcoin, this paper conducts an event study to quantify the reaction by investors upon revelation of the news. In addition, it examines differences between Bitcoin and two other cryptocurrencies, Ethereum and Litecoin, to control for any liquidity effects of victims buying up large sums of bitcoin. The findings of the study indicate that following the ransom events there is a positive price reaction, supporting the claim that investors in Bitcoin generally perceive these events as good news. This could have a profound effect on the development and further adoption of cryptocurrencies, as regulators try to determine whether or not to intervene.
APA, Harvard, Vancouver, ISO, and other styles
27

Askerniya, Imran. "Investigation into reduction and/or prevention of cybercrime victimisation among the user individuals." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542285.

Full text
Abstract:
Much of today's information is stored in digital form in computers and information in the digital form is much more easily stored, duplicated and manipulated. Businesses have to use information effectively in order to remain competitive, and storing information in the digital form allows them to use information much more effectively. As most computers are always connected to the Internet, this gives to attacker an easy (unauthorised) access to the computer through the network. The contribution to knowledge that this research brings is the development of the models on reduction/ prevention of cybercrime as there are little mainstream research exist. The model is concentrates on the point of view of the victims, that is, what makes each victim vulnerable, and how the cybercrime prevention strategies should be adapted according to the unique characteristics of the victim. The aim of this research is to help minimise the victimisation of cybercrime in Russian cyber space. It is worth mentioning that there is no such model, exist. Therefore, this work has attempted to fill this significant gap in the research by proposing four-dimensional grid model. The model is based on the existing traditional crime prevention model and situational crime prevention theory. The grid model provides three preventive strategies: Education, Training, and Awareness. The model and these strategies were evaluated qualitatively and quantitatively by distributing questionnaires and interviewing the Moscow cybercrime experts
APA, Harvard, Vancouver, ISO, and other styles
28

Ibekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.

Full text
Abstract:
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime. This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011.
APA, Harvard, Vancouver, ISO, and other styles
29

Morris, Sarah Louise Angela. "An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space." Thesis, Cranfield University, 2013. http://dspace.lib.cranfield.ac.uk/handle/1826/8034.

Full text
Abstract:
This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of thumbnail cache artefacts were created by researching the evidential constraints present in Forensic Computing. The criteria were used to evaluate the evidential value of live system thumbnail caches and thumbnail cache file fragments identified in unallocated space. Thumbnail caches can contain visual thumbnails and associated metadata which may be useful to an analyst during an investigation; the information stored in the cache may provide information on the contents of files and any user or system behaviour which interacted with the file. There is a standard definition of the purpose of a thumbnail cache, but not the structure or implementation; this research has shown that this has led to some thumbnail caches storing a variety of other artefacts such as network place names. The growing interest in privacy and security has led to an increase in user’s attempting to remove evidence of their activities; information removed by the user may still be available in unallocated space. This research adapted popular methods for the identification of contiguous files to enable the identification of single cluster sized fragments in Windows 7, Ubuntu, and Kubuntu. Of the four methods tested, none were able to identify each of the classifications with no false positive results; this result led to the creation of a new approach which improved the identification of thumbnail cache file fragments. After the identification phase, further research was conducted into the reassembly of file fragments; this reassembly was based solely on the potential thumbnail cache file fragments and structural and syntactical information. In both the identification and reassembly phases of this research image only file fragments proved the most challenging resulting in a potential area of continued future research. Finally this research compared the evidential value of live system thumbnail caches with identified and reassembled fragments. It was determined that both types of thumbnail cache artefacts can provide unique information which may assist with a digital investigation. ii This research has produced a set of criteria for determining the evidential value of thumbnail cache artefacts; it has also identified the structure and related user and system behaviour of popular operating system thumbnail cache implementations. This research has also adapted contiguous file identification techniques to single fragment identification and has developed an improved method for thumbnail cache file fragment identification. Finally this research has produced a proof of concept software tool for the automated identification and reassembly of thumbnail cache file fragments.
APA, Harvard, Vancouver, ISO, and other styles
30

YUCEDAL, BEHZAT. "VICTIMIZATION IN CYBERSPACE: AN APPLICATION OF ROUTINE ACTIVITY AND LIFESTYLE EXPOSURE THEORIES." Kent State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=kent1279290984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fissel, Erica R. "Victimization of the 21st Century: An Examination of Cyberstalking Victimization Using a Target Congruence Approach." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553613508435002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dornseif, Maximillian. "Phänomenologie der IT-Delinquenz : Computerkriminalität, Datennetzkriminalität, Multimediakriminalität, Cybercrime, Cyberterror und Cyberwar in der Praxis /." [S.l. : s.n.], 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016234254&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mayland, Magnus. "A qualitative exploration of the challenges the Danish police face in dealing with cybercrime." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26483.

Full text
Abstract:
Cybercrimes have been rapidly increasing over the past decade becoming more sophisticated and increasing victimization, resulting in an increased load of the police in the effort to prevent and stop these crimes. This study explores the challenges the Danish police encounter facing cybercrime and their approach to preventing it. The data were collected through interviewing individuals on a managing level in two different departments dealing with cybercrime within the Danish police force. The data were analyzed thematically to identify key issues. The main challenges found being; the time frame the police has to act upon in reference to the nature of the data, the culture that exists on the internet and distinguishing jokes from threats, the effortlessness of criminals justifying once actions, and the visible presence of the police on the internet. The primary focus of prevention to deal with some of these issues is moving towards creating a healthy network between the police and the private sector, in an effort to create a shared responsibility and a forum of which information can be shared to create a possible united front towards cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
34

Ozeren, Suleyman. "Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4847/.

Full text
Abstract:
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
35

Evoh, Peternwaike Nne Udo. "A systematic literature review on criminological research on the history of cybercrime focusing on type of crime and geographic origin of the perpetrators : Literature review on criminological research on the history of cybercrime." Thesis, Malmö universitet, Institutionen för kriminologi (KR), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-46088.

Full text
Abstract:
Abstract Cybercrime is a global phenomenon, that has existed since the advent of the internet. The wider population is affected with different types of crime that occur on the internet. The advancement of the internet continually brings about changes in the different types of cybercrime that are perpetrated on the internet and across the globe. Using historical criminology to provide evidence that explains the past and present phenomenon, this paper seeks to investigate the different types of crimes perpetrated on the internet with twenty one (21) peer reviewed publications. Time stamped from the year 1995 till the current date 2021 through a systematic process focusing on two variables on (crime and origin). The systematic process is aimed to answer two research questions on the different type of cyber crimes that has developed over time, and if the geographic origin of different categories of cyber crimes has changed over time. Communicating channels are the flood gate to cyber crimes perpetration, as different types of crime are centered within a geographic location and growing across geographic boundaries that are changing and developing crime type over time. More locations are developing through these channels as rapid advancement in technology are evolvin
APA, Harvard, Vancouver, ISO, and other styles
36

Eufrasio, Emília Teixeira Lima. "O cibercrime e a violação dos direitos fundamentais de natureza pessoal dos menores: o caso da CPLP." Master's thesis, [s.n.], 2015. http://hdl.handle.net/10284/4932.

Full text
Abstract:
Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Criminologia
A realidade contemporânea é marcada pela permanente presença da rede Internet na vida quotidiana. Apesar dos proveitos que esta realidade traz para o desenvolvimento individual e coletivo, a exploração desmedida da Internet e a exposição da vida íntima nesse meio cria um ambiente propício a prática de vários atos ilícitos. O presente estudo aborda a questão da violação dos direitos fundamentais de natureza pessoal do menor. Nesse trilhar, o presente trabalho almeja apresentar um estudo juscomparativista, com foco nos países lusófonos (i.e. os membros da Comunidade dos Países de Língua Portuguesa ou CPLP), com destaque para Brasil, Guiné-Bissau e Portugal. O objetivo do trabalho é um aprofundamento sobre as vias de aplicação, por parte dos Estados comparados, da Convenção internacional sobre os Direitos da Criança e, ainda, sobre a necessidade de averiguação da aplicação do Protocolo Facultativo à Convenção internacional sobre os Direitos da Criança, relativo à venda de crianças, exploração sexual e pornografia infantis. Foi utilizado inquérito por questionário como forma de colher informações acerca do conhecimento dos profissionais que lidam com vítimas de cibercrime e o tipo de crimes causados aos menores. Como amostra, optou-se por trabalhar com 13 participantes dos países de língua portuguesa, sendo o fato de serem residentes em países da CPLP o critério de inclusão na amostra. Após aplicação dos questionários e da análise quantitativa, observou-se um paradoxo: embora os profissionais que lidam com o cibercrime, in casu com vítimas menores, terem conhecimento do que é o cibercrime e os tipos penais que são praticados no ciberespaço, os mesmos desconhecem a existência de normas internas que disciplinam acerca desse tipo de crime e, o mais grave, não têm conhecimento da existência de políticas públicas voltadas ao combate do cibercrime. O que fazer, então, para proteger os menores? O propósito do presente estudo, além de apontar as carências legislativas em países da CPLP (quanto aos crimes praticados no ciberespaço) é fazer um chamado a adesão aos protocolos facultativos da Convenção dos Direitos da Criança, como instrumento à prevenção desse tipo de crime. The contemporary reality is marked by the permanent presence of the Internet in everyday life. Despite the income that this reality brings to the individual and collective development, the ravenous Internet exploitation and exposure of private life in between creates an environment conducive to the practice of various illicit acts. The present study addresses the question of the violation of the fundamental rights of a personal nature. In this line, this work aims to present a comparative legal study, with a focus on Portuguese-speaking countries (i.e. the members of the Community of Portuguese Speaking Countries or CPLP), with emphasis on Brazil, Guinea-Bissau and Portugal. The objective of this work is a deepening on the means of implementation, on the part of the States compared, of the International Convention on the Rights of the Child and on the need for clarification of the application of the Optional Protocol to the Convention on the Rights of the Child on the sale of children, sexual exploitation and child pornography. Survey was used as a way of gathering information about the knowledge of professionals who deal with victims of cybercrime and the type of crimes caused to minors. As a sample, we chose to work with 13 participantes from the Portuguese-speaking countries, and the fact that they are resident in the CPLP countries was the criterion for inclusion in the sample. After application of questionnaires and quantitative analysis, a paradox emerged: although the professionals dealing with cybercrime, in casu with minor victims, have knowledge of what is cybercrime and criminal types that are practiced in cyberspace, they are unaware of the existence of internal rules that govern this type of crime and, worse than that, are not aware of the existence of public policies aimed at fighting cybercrime. What to do, then, to protect minors? The purpose of this study, in addition to point the legislative shortcomings in CPLP countries (with regard to crimes committed in cyberspace) is to make a call to adhesion to the optional protocols of the Convention on the rights of the child as an instrument for the prevention of this type of crime. La réalité contemporaine est marquée par la présence permanente de l'Internet dans la vie quotidienne. Malgré les bénéfices que cette réalité apporte au développement individuel et collectif, l'exploitation sur Internet et l'exposition de la vie privée entre les crée un environnement propice à la pratique de divers actes illicites. La présente étude aborde la question de la violation des droits fondamentaux de nature personnelle. Dans cette voie, ce travail a pour but de présenter une étude de juscomparativiste, en mettant l'accent sur les pays de langue portugaise (c'est-à-dire les membres de la Communauté des pays de langue portugaise ou CPLP), en accentuant l’étude sur le Brésil, la Guiné-Bissau et le Portugal. L'objectif de ce travail est un approfondissement sur les moyens d'exécution, la part des États étudiés, de la Convention internationale relative aux droits de l'enfant et sur la nécessité d'une clarification de l'application du protocole facultatif à la Convention relative aux droits de l'enfant concernant la vente d'enfants, l’exploitation sexuelle et la pornographie infantile. Une enquête a été utilisé comme un moyen de recueillir des informations sur les connaissances des professionnels qui s'occupent des victimes de la cybercriminalité et le type de crimes causés aux mineurs. Comme échantillon, nous avons choisi de travailler avec 13 participants provenants des pays lusophones, et le fait qu'ils soient résidents dans les pays de la CPLP a constitué le critère d'inclusion dans l'échantillon. Après application des questionnaires et analyse quantitative, un paradoxe est apparu: bien que les professionnels traitant de la cybercriminalité, en l'espèce avec les victimes mineures, aient connaissance de ce qu’est la cybercriminalité et les types criminels qui sont pratiquées dans le cyberespace, ils ignorent l'existence de règles internes qui régissent ce type de crime et, ce qui est plus graves, ne sont pas au courant de l'existence de politiques publiques visant à lutter contre la cybercriminalité. Que faire, alors, pour protéger les mineurs? Le but de cette étude, en plus de pointer les lacunes de la législation dans les pays de la CPLP (en ce qui concerne les crimes commis dans le cyberespace) est d'effectuer un appel au respect des protocoles facultatifs de la Convention relative aux droits de l'enfant comme un instrument pour la prévention de ce type de crime.
APA, Harvard, Vancouver, ISO, and other styles
37

Guerra, Chris. "Fundamental Demographics of Digital Piracy Offenders." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157573/.

Full text
Abstract:
Digital piracy is an emerging cybercrime subtype with overarching implications for administrators and researchers alike. Within this body of knowledge, it is unclear what individual-level factors are linked to digital piracy. Using a college-based sample, while focusing on gender, race, and age, this study identifies fundamental individual-level variables associated with digital piracy commission. After conducting multiple independent samples t-tests and a multivariate logistic regression, results found age and computer proficiency were significantly associated with the likelihood of engaging in digital piracy. These findings can help establish the foundational characteristics of digital pirates. By shifting the focus back to basic individual factors, universities can identify preventive efforts and researchers can better understand who engages in digital piracy.
APA, Harvard, Vancouver, ISO, and other styles
38

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Full text
Abstract:
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid detection. The results of a series of bivariate cross-tabulations show that encountering a standard legal threat or ambiguous threat increase the early use of reconnaissance commands; however, these findings were not pronounced enough to gain statistical significance. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.
APA, Harvard, Vancouver, ISO, and other styles
39

Synnestvedt, Jensen Louise. "Terrorism or hacking? A law interpretation on the concept of cyber terrorism. : A legal dogmatic thesis with an empirical legal science methodology." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-25203.

Full text
Abstract:
Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration when discussing cyber-crime. When researching cybercrime and  it is important to first research the legal background as to the purpose of the creation of the internet, and to what extend state control is an issue in the matter of both cybercrime being carried out and the establishment of cyber activist groups. How shall the law be interpreted in the case of internet hacking and under what category do these fit, terrorists, cybercriminals or hackers.
APA, Harvard, Vancouver, ISO, and other styles
40

Riek, Markus [Verfasser], and Rainer [Akademischer Betreuer] Böhme. "Towards a robust quantification of the societal impacts of consumer-facing cybercrime / Markus Riek ; Betreuer: Rainer Böhme." Münster : Universitäts- und Landesbibliothek Münster, 2018. http://d-nb.info/1159955921/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Putigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.

Full text
Abstract:
La généralisation croissante des technologies informatiques conventionnelles et l'émergence de l'internet des objets constituent probablement des principes fondateurs d'un nouvel ordre mondial numérique. L'omniprésence, l'interdépendance des réseaux et la convergence des composantes du cyberespace catalysent la formation de groupes sociaux dans un objet tel qu'Internet et en particulier dans les médias sociaux. Cette thèse étudiera en particulier la naissance de communautés cybercriminelles, ainsi que les rites et les liens d'affinité des membres de ces sociétés. Au-delà de mettre en exergue les éléments de dynamiques socioculturelles liés à la création de ces espaces numériques et leur maintien, la thèse tendra à démontrer qu'il existe une forme de logique dans le processus d'intégration et le développement de ces communautés virtuelles cybercriminelles
The increasing generalization of conventional computer technologies and the emergence of the Internet of Things are probably founding principles of a new digital world order. The omnipresence, the interdependence of networks and the convergence of the components of cyberspace, catalyze the formation of social groups in an object such as the Internet and in particular in social media. The thesis will study in particular the birth of cybercriminal communities, as well as the rites and ties of affinity of the members of these societies. Beyond highlighting the elements of socio-cultural dynamics related to the creation of these digital spaces and their maintenance, the thesis will tend to show that there is a form of logic in the process of integration and the development of these virtual communities. cybercriminal
APA, Harvard, Vancouver, ISO, and other styles
42

Cian, Healy, and ZHE LI. "The Role Decentralised Non-Regulated Virtual Currencies Play in Facilitating Unlawful Financial Transactions." Thesis, KTH, Entreprenörskap och Innovation, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188935.

Full text
Abstract:
As consumer payment services have been developed at a rapid rate in recent years, the introduction to the market of decentralised, non-regulated cryptocurrencies has enabled a significant increase in acts of criminality in the cyber environment. Efforts to combat and curb the continued growth of such illicit activities have included the development, implementation and enforcement of legislation and regulations by governing authorities on a global scale. For the purpose of this thesis, interviews were conducted with several industry experts and governmental officials specializing in the use of virtual currencies for illicit financial transactions, namely fraud, money laundering and tax evasion. While the extent to which decentralised, non-regulated payment services actually contributes to illicit financial transactions remains unclear, it can certainly be said that as the use of new and emerging virtual currencies increases, so too will acts of criminality in the cyber world.
APA, Harvard, Vancouver, ISO, and other styles
43

Reyns, Bradford W. "Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1273840781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Henson, Billy. "Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1313685865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jung, Jeyong. "A study of cyber security management within South Korean businesses : an examination of risks and cybercrime involving industrial security." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/a-study-of-cyber-security-management-within-south-korean-businesses(4f6f8a10-c31a-4eec-b092-2b38ac8815d9).html.

Full text
Abstract:
This study aims to empirically explore and evaluate the current state of cyber security management for small and medium-sized businesses in South Korea. As academic discourse relating to the cyber security management of businesses is relatively new, there is a clear lack of literature relating to this discipline. This study, therefore, looks to address this issue by taking an exploratory approach to the subject. Based on various sources in the UK, this study used the UK’s cyber security framework as a conceptual model against which conditions in South Korea were examined. Drawing on a mixed methods approach, this study employed three research methods: documentary research, quantitative questionnaires, and qualitative interviews. In the quantitative phase, current situations of the businesses in relation to cyber security were assessed and differences by business sectors and sizes were identified. In the qualitative phase, five themes were identified. Findings from the quantitative and qualitative research were triangulated with the existing literature, including the qualitative results describing the empirical field of enquiry, to present a holistic picture of cyber security management of South Korean businesses. It was revealed that small and medium-sized businesses did not have a structural mechanism to prevent or mitigate risks at the pre-breach stage. Rather, they focused on responses at the post-breach stage. This finding demonstrated that small and medium-sized businesses were not prepared for the risks and threats from a preventative point of view. In addition, management of cyber security in businesses was not an isolated mechanism, but affected by external influences and initiatives. However, small and medium-sized businesses relied more upon private organisations than public organisations, which indicates that there was an insufficient role of public sector organisations in protecting small and medium-sized businesses. In conclusion, this research has proposed an integrated cyber security risk management model. The framework was based on the argument that cyber security management relates to three elements: risk assessment, organisational behaviours and external factors. It is here that the biggest gains can be made if businesses manage cyber security in a holistic manner and if national leadership is strengthened in the Korean cyber security governance. This empirical research has made a contribution to knowledge in relevant studies by presenting a comprehensive landscape of cyber security management of businesses.
APA, Harvard, Vancouver, ISO, and other styles
46

Jäger, Stefan [Verfasser], Eberhard [Gutachter] Zehendner, and Christian [Gutachter] Johner. "Gefährdungslage deutscher Arztpraxen (als Teil des Gesundheitswesens und der KMU) durch Cybercrime / Stefan Jäger ; Gutachter: Eberhard Zehendner, Christian Johner." Jena : Friedrich-Schiller-Universität Jena, 2020. http://d-nb.info/1219574104/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hruška, Tomáš. "Podvod a audit." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-201708.

Full text
Abstract:
The aim of this Master´s Thesis is to introduce fraudulent schemes within organizations and suggest possible actions to prevent this unjust behaviour that negatively affects not only organizations themselves, but also society as a whole. Audit, which is described in the first chapter, plays a major part in preventing fraud. The evolution of audit is described there as well as its main divisions consisting of external, internal and forensic audit, which is important for the investigation of fraud. Second chapter describes fraud as itself, dividing it into external and, more common, internal fraud, which is divided into corruption, asset misappropriations and financial statement fraud. This chapter also contains cybercrime, which is increasingly relevant nowadays. Detailed fraud statistics put together profile of the typical fraudster. Third chapter describes some real fraud cases within business practice. It contains four fraud cases, namely those in companies Enron, Toshiba, Target and Czech corruption scandal concerning former politician David Rath.
APA, Harvard, Vancouver, ISO, and other styles
48

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middlesex County, Massachusetts. The data collection process involved open-ended online questionnaires, semistructured face-to-face interviews, and review of company documents. Based on methodological triangulation of the data sources and inductive analysis, 3 emergent themes identified are policy, training, and technology. Key findings include having a specific goal and tactical approach when creating small business cybersecurity strategies and arming employees with cybersecurity training to increase their awareness of security compliance. Recommendations include small business use of cloud computing to remove the burden of protecting data on their own, thus making it unnecessary to house corporate servers. The study has implications for positive social change because small business leaders may apply the findings to decrease personal information leakage, resulting from data breaches, which affects the livelihood of individuals or companies if disclosure of their data occurs.
APA, Harvard, Vancouver, ISO, and other styles
49

Min-Cheng, Lin, and 林民程. "Problem Structuring of Cybercrime." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/17290482846400883347.

Full text
Abstract:
碩士
國立中興大學
公共行政及政策研究所
86
There are three major purposes of the present study: (1) to understandthe nature of cyberspace; (2) to investigate the social reality of cybercrime;and (3) to constructs some possile strategies for government to manage cybercrime. To achieve the research goals, the study took a multi-disciplinary approach to explore the subject. Our perspectives include legal theory, sociology of law, criminology, spacial theory, contemporary social philosophy and economics. Problem structuring in public policy was utilized as a methodology to developthe theoretical framework and hyptheses for the research. An empirical analysis was then designed to further examine the researchhypotheses. In the empirical analysis, cyberspace was classified into three categories based on the nature of its accessibility: public, specified and private spaces. Among the five target groups (legislators'' assistants, judges,consumers in fast food restaurants, colleges students, and internet users), the research found that their attitudes towards the 19 selected deviant or deviant-to-be behaviors in cyberspace varied. For instance, legislators'' assistantsand judges had lower tolerance than internet useers to most of the behaviors.However, no matter which group one belonged to, people tended to have lessagreement for "mala prohibita" behaviors than "mala in se" behaviors. The results also indicated that regardless of the nature of deviant behabior,deviant behaviors occurring in specified cyberspace were more likely to activate debates than those in public and private cyberspaces. At last, this research reviewed the laws and regulations in Taiwan relatedto cybercrime in general and the 19 selected behavior in specific. Along with the empirical findings and legal literature review, the present studyproposed a multi-dimensional model of structuring the problem of cybercrime. We argue that strategies for government to managing cybercrime would be more appropriate and feasible if the public consensus and the nature of cyberspaceare both taken into a serous consideration when constructing the problem ofcybercrime. The policy implication was further discussed in detail at the end of the study.
APA, Harvard, Vancouver, ISO, and other styles
50

Iqbal, Farkhund. "Messaging Forensic Framework for Cybercrime Investigation." Thesis, 2011. http://spectrum.library.concordia.ca/7077/1/Iqbal_PhD_S2011.pdf.

Full text
Abstract:
Online predators, botmasters, and terrorists abuse the Internet and associated web technologies by conducting illegitimate activities such as bullying, phishing, and threatening. These activities often involve online messages between a criminal and a victim, or between criminals themselves. The forensic analysis of online messages to collect empirical evidence that can be used to prosecute cybercriminals in a court of law is one way to minimize most cybercrimes. The challenge is to develop innovative tools and techniques to precisely analyze large volumes of suspicious online messages. We develop a forensic analysis framework to help an investigator analyze the textual content of online messages with two main objectives. First, we apply our novel authorship analysis techniques for collecting patterns of authorial attributes to address the problem of anonymity in online communication. Second, we apply the proposed knowledge discovery and semantic anal ysis techniques for identifying criminal networks and their illegal activities. The focus of the framework is to collect creditable, intuitive, and interpretable evidence for both technical and non-technical professional experts including law enforcement personnel and jury members. To evaluate our proposed methods, we share our collaborative work with a local law enforcement agency. The experimental result on real-life data suggests that the presented forensic analysis framework is effective for cybercrime investigation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography