Dissertations / Theses on the topic 'Cybercriminalité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cybercriminalité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Arnal, Jérôme. "Cybercriminalité et droit pénal." Montpellier 1, 2008. http://www.theses.fr/2008MON10044.
Full textSkaf, Faten. "La justice pénale face à la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.
Full textNowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
Aguilon, Alban. "Les modes de traitement de la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0067.
Full textCybercriminality evolved in the same way to the development of the new technologies of information and communication. The criminal law overhauled itself with some troubles, because this kind of delinquency use and create many new concepts. Cybercriminality transcends customary delinquency social manners as well as the borders, whereas applied law systems are based on the principles of national sovereignty, independence and territoriality. Others difficulties consist in the slowness of criminal law and the high confidentiality level insured by new technologies. Finally, the legal systems are ordinary applied to tangibles objects. About the internal law, it will be essential to rationalize the technical means and the cooperation between the protagonists, to perform the procedural dispositions and the judicial system efficiency. The international community cooperate actively, as attest many international agreements and the badly coordinated contribution of numerous specialized institutions. Moreover, private actors must collaborate and cooperate with institutional actors within a system which efficiently integrate paralegal modes of crime regulation
Beraud, Camille. "Les libertés individuelles confrontées à la cybercriminalité." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM1076.
Full textThe emergence of Internet beyond its innovative nature and its prerogatives led to the appearance of a new type of delinquency and new criminal profiles. Indeed if using Internet is now undeniably into the customs, Internet is also a vector of illegal activities. However cyberspace is a virtual land that knows no physical borders. Therefore cybercrime is a complex matter because it is transnational, highly mobile and really technical. It seems to appear as the modern scourge weighing on individual freedoms of users of digital networks
Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.
Full textBoos, Romain. "La lutte contre la cybercriminalité au regard de l’action des États." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0158/document.
Full textThe twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences
Ouchene, Nadir. "L’applicabilité de la loi pénale à l’endroit de la cybercriminalité dissimulée." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020077.
Full textThe "Deep web" is a part of the web which isn't referenced by usual search engines. According to Chris Sherman and Gary Price, these only refer to 3 to 10% of the pages. The rest which isn't accessible to regular web users consists in the "Deep Web" and more than one billion hidden datas remain. In a few cases, the documents are too heavy, or the databases are too complicated to have their contents indexed, but in other cases, individuals decide not to reference their websites in order to make the information private. We can consider this as the tip of the Internet. It hosts several black market types such as, drugs, weapons or human trafficking. On a judicial point of view, this topic is quite meaningful and raises a lot of questions. The main issue is to determine how to organise the repression on that medium. This leads us to think about the application of the law through different countries, how can the international law comprehend the phenomenon effectively. How the different states should coordinate their repressive measures and agree on the proper procedural rules to apply. We could ask ourselves rather regular law enforcements are relevant enough to allow an adequate repression, or if specific infractions should be created. So the topic deals with essential thoughts on the international law
Diarra, Rosalie. "Les lois pénales à l'épreuve de la cybercriminalité en Afrique de l'Ouest." Thesis, Paris 1, 2017. http://www.theses.fr/2017PA01D035.
Full textCybercrime evolves in a West African context, initially marked by a total absence of legislation capable of deterring cybercriminals. Faced with threats to their image, development and security, the States of the Economic Community of We African States (ECOWAS) subsequently adopted a Directive to encourage the setting up of national anti-Cybercrime legislation However, only a few states have enacted legislation to regulate cybercrimes. Therefore, there remain some Challenges wi regard to the adoption of anti-cybercrime legislations by ECOWAS member States. Other challenges are related to the training actors involved in the implementation of criminal laws and the modernization of methods in the search for evidence in cybercrime cases. Joint actions of ECOWAS member-states are preferred ways of fighting cybercrime in the West African region from the perspective of criminal Law
Iler, Betul. "Réflexions sur les politiques françaises et européennes de lutte contre la cybercriminalité." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTD029.
Full textGlobalization and technological progress constantly challenge the adaptation capacity of government policies. Cyberspace is a new freedom space and a new danger space giving birth to a new form of original crime called cybercrime. The regulation of this cross-border, fast and technical space, is not easy for States. The fight against cybercrime generates political, legal and technical problems. Cyberspace shows deficiencies of our current legal systems.The criminal law and criminal procedure’s adaptation to cybercrime should be done in Human rights’ respect. This balance between security and freedom is particularly hard in a virtual space. The legislator, the judge and the policeman are faced with the constant evolution of cybercrime methods requiring a coordinated and fast international judicial action. These requirements are difficult to achieve in a context of heterogeneity remains of judicial systems and no comprehensive and harmonized strategy has emerged. This fight raises questions about states sovereignty and requires rethinking current models
Gross, Denise. "L'ingénierie sociale : la prise en compte du facteur humain dans la cybercriminalité." Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAA007.
Full textThe digital revolution has encouraged the emergence of a new type of criminal activity : cyber-crime. This includes a vast array of activities and offences that often use social engineering techniques. These techniques are old and not widely understood, yet benefit from the increase of data available online and the use of firewalls and other security systems. They have been adapted to work with the Internet and digital technologies in order to exploit the “vulnerabilities” of human psychology. Social engineering targets the user, who often unconsciously, allows access to systems or data, making the user the weakest link in the cyber-security chain. Individuals, companies and governments are all facing the same challenge in trying to solve these issues, utilising current legal, financial, technological and social resources which seem to be insufficient. Far from being eradicated, fraudulent activities that use social engineering continue to increase in prevalence. The inefficiency of current judicial polices forces us to consider alternative strategies upstream. Being proactive, predicting early and reacting quickly to computer related crimes should be the priority of a more humanistic approach which is focused on prevention and cooperation. Although one can agree on the approach ; the challenge is to find out how to implement it
Chabaud, Laurent. "L'arme numérique : essai sur la dématérialisation des infractions pénales." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.
Full textThe development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
Bonnet, Typhaine. "La crise de la sanction face à la cybercriminalité : l'exemple du droit d'auteur." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/28340.
Full textThe violation of copyright in the digital era is a worldwilde curse. It constitutes a cybercrime putting in jeopardy the authors’ salary and, more largely, the entire economy of the industrial culture. In order to fight this kind of violation, the French legislator has created several criminal responsibilities. The Canadian legislator, for his part, has sporadically revising the Copyright Act, without modify the existing criminal proceedings. Even though the French and Canadian approaches are antagonistic, we will try to demonstrate the fact that those approaches have the same result: they are ineffective. According to the assumption, we will endeavor to submit solutions that allow the rectification of the ineffectiveness of the criminal enforcement of copyright law in the digital era.
Nlend, Cecile. "LA PROTECTION DU MINEUR DANS LE CYBER ESPACE." Phd thesis, universite de picardie Jules Verne, 2007. http://tel.archives-ouvertes.fr/tel-00432247.
Full textJaghdam, Ali. "Les conditions d’assurabilité de la cybercriminalité : Une approche économique du transfert des cyber-risques." Paris 9, 2008. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2008PA090062.
Full textThe insurance has always participated in the success of the global information infrastructure by the guarantees offered to hedge against risks arising from conventional computer-based risks. However, cyber-risks have several "non-conformities" to the traditional actuarial model mainly due to the interconnection of information systems. The main contribution of the thesis focuses on the identification of conditions that make cyber-risks insurable following a risk-transfer economic approach. The study of the dynamics of insurability from a stochastic modeling of supply and demand behaviors has identified two conditions for enlarging the scope of insurability: increasing policyholders’ aversion to cyber-risk, and reducing the likelihood of successful attacks. From these two conditions, we determined what could increase the first and reduce the second. One solution is to play better synergy between the state and insurance companies regarding compliance with the regulations or recommendations on cyber-risk prevention both by the potential insured as the suppliers of connectivity equipments and security services providers. From this research covering both theoretical and empirical aspects of our thesis, we were able to identify the conditions under which cyber-risks could have an insurance contract. This is of great importance when the survival of businesses in an economic environment "reconfigured" to an intensive usage but also essential of information networks
Tano-Bian, Anmonka Jeanine-Armelle. "La répression de la cybercriminalité dans les Etats de l’Union européenne et de l’Afrique de l’Ouest." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015PA05D005/document.
Full textEach party of the space, realized by the ground, maritime or air borders is desired by the nations which succeed in making it private grounds with the exception of a single component: the cyberspace. This place of exchanges and circulation of information freed itself from this cornering. It is what makes it real for the uses which it allows (sendings of messages, broadcasting) of real-time information, trainings and virtual (as far as the digital networks follow with difficulty localizable paths) in the point to generate difficulties as for its frame by the law. From then on, the cyberspace sets up itself as a space where it is easy to cultivate illegal activities considering the opportunities which it offers. The illegal activities marry forms pluridimensionnelles and complex which we group under the generic naming of cybercrime. Due to its nature and its subdivisions, the cybercrime is the object of reflections, studies, searches, implementations of politics and of actions in a national and international scale to reach in his eradication. The actions are led in way coordinated between States and institutions. The fight against this interplanetary phenomenon requires the mutualization of the efforts on behalf of the actors of telecommunications, computing, all the professional layers as well as her on behalf of the consumers under reserve that they are informed well about the risks connected for the cyberspace. The study compared by the systems of repression implemented in the European and West-African spaces will allow to understand better the exercise of the penal sovereign right in front of the cybercrime and the importance of collaborations between these two community spaces
Habhab, Mohamad Ahmad. "Le droit pénal libanais à l'épreuve de la cybercriminalité : la prise en compte de l'exemple français." Montpellier 1, 2009. http://www.theses.fr/2009MON10033.
Full textMeier, Marsella Carole. "L'effectivité du processus répressif dans le traitement de la cybercriminalité (enquête sur le système judiciaire français)." Paris 2, 2005. http://www.theses.fr/2005PA020021.
Full textChawki, Mohamed. "Le droit pénal à l'épreuve de la cybercriminalité : étude comparative de la politique criminelle face aux N.T.I.C." Lyon 3, 2006. http://www.theses.fr/2006LYO33024.
Full textGuichard, Patrice. "Menace sur l'ordinateur : piratage - techniques et solutions." Paris 8, 2001. http://www.theses.fr/2001PA083771.
Full textAt the end of the 20th century, the computer hacker myth is one of the most widespread and resilient myths of our modern world. In a high technology society with limitless invisible communication devices, the computer whizkid stereotype popularized by mass media is somewhat reassuring. Viruses, illegal intrusions, sabotage, theft: who don't know examples of criminal computer activities, being themselves victims or not? Secondary phenomenon or worldwide catastrophe, analyzing and quantifying it remains necessary to offer solutions at least to hold it back, if not to eradicate it. The complexity of systems, the heavy costs of hardware and softwares and the extension of application fields have caused computer science to become a key element in the strategies of companies, since any destruction or alteration of their data can compromise their competitiveness or their image, and cause often significant financial loss. Though more and more companies become aware of the risks and widely invest into means to protect themselves, the phenomenon of computer hacking is still poorly known and mastered by companies. It should be analyzed through a multidisciplinary (economic, social and technical) approach. Prevention and protection techniques are quickly evolving but companies remain vulnerable in many fields. Revealing computer-hacking techniques is what this thesis is intended to do, so that administrators can test them on their own networks, something that no tool can do in lieu of them
Tourny, Eve. "La lutte contre la criminalité informatique bancaire : approches de droit comparé et de droit international." Nice, 2011. http://www.theses.fr/2011NICE0014.
Full textChoi, Jong Ho. "Les comportements des internautes et l'évolution de la cybercriminalité : Etude comparée entre la France et la Corée du Sud." Montpellier 1, 2007. http://www.theses.fr/2007MON10059.
Full textFreyssinet, Eric. "Lutte contre les botnets : analyse et stratégie." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066390.
Full textBotnets, or networks of computers infected with malware and connected to a command and control system, is one of the main tools for criminal activities on the Internet today. They allow the development of a new type of crime: crime as a service (CaaS). They are a challenge for law enforcement. First by the importance of their impact on the security of networks and the commission of crimes on the Internet. Next, with regards to the extremely international dimension of their dissemination and therefore the enhanced difficulty in conducting investigations. Finally, through the large number of actors that may be involved (software developers, botnet masters, financial intermediaries, etc.). This thesis proposes a thorough study of botnets (components, operation, actors), the specificaion of a data collection method on botnet related activities and finally the technical and organizational arrangements in the fight against botnets; it concludes on proposals on the strategy for this fight. The work carried out has confirmed the relevance, for the effective study of botnets, of a model encompassing all their components, including infrastructure and actors. Besides an effort in providing definitions, the thesis describes a complete model of the life cycle of a botnet and offers methods for categorization of these objects. This work shows the need for a shared strategy which should include the detection elements, coordination between actors and the possibility or even the obligation for operators to implement mitigation measures
Gaber, Chrystel. "Sécurisation d’un système de transactions sur terminaux mobiles." Caen, 2013. https://theses.hal.science/tel-01009369.
Full textMobile-based transactions have driven growing attention for the past few years. This thesis focuses on mobile-based transaction systems which are managed by a mobile network operator. In such a context, transactions are carried out with electronic money emitted by the operator by the subscribers of the service only. This thesis addresses the problem of securing such services. We propose an architecture which achieves end-to-end security between the payment platform and the payment application in the mobile device. Is is based on a Secure Element (SE) and a Trusted Execution Environment. Several types of transactions were considered such as payments or transfers as well as different modes based on the connection availability of the various actors. The protocols proposed were formally verified. Their performances were also taken into account. Several classification algorithms were compared to be adapted to the fraud detection problem in mobile-based systems. To achieve this, the payment platform and the user's behavior were modeled to create a synthetic data generator. The latter is preliminarily validated in the thesis. The originality of this simulator is that it is based on data from an existing system
Solis, Arredondo Cynthia. "L'usurpation d'identité numérique sur Internet : Etude comparée des solutions françaises, mexicaines et nord-américaines." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS023/document.
Full textThe digital identity has become one of the most important immaterial values in everyday life, the personal and academic reputation, the professional profile, but even more than that, the freedom to be on the web without to be afraid of the usurpation of our identity is the inspiration of this thesis work. In the digital world, borders no longer exist, interactions with people around the world are becoming more common, e-commerce, social networks, online procedures, information exchange between countries and governments, and also personal relationships in mobile applications, this is also the reason for being a comparative law study between Mexican, French and American law. In the first part, we develop the elements of digital identity, the personal data included in the whole of this concept which is both misunderstood and therefore poorly protected but also very important in the development of the digital economy. The second part, understands the interpretations of digital identity in the field of criminal law administrative law and civil and commercial law. In particular, there are differences between the interpretation of the criminal law of identity as protected legal property; in comparison with interpretations of the administrative law that protects the digital identity as personal data, the implementation of international recognition of the right to the protection of personal data and becomes the regulation that defines the rules of their treatment, thus imposing sanctions on the unlawful treatment and on the other side the civil right which a party recognizes the right of the personality and the right to the personal image. The third part is dedicated to the study of digital identity as a source of evolution of the law, as well as to the attacks on all the elements that are part of this identity. Law is always behind innovation and yet, alongside the evolution of humanity, inventions, technology and development, there is the evolution of illicit acts and means of committing crimes in the world digital environment. Even though the phenomenon of identity theft is not new, it has overcome in the world in the last five years thanks to new technologies that allow to create, modify, alter, falsify, reproduce and disseminate personal data, photos and identifiers in a very fast and global way, which allows to sell in the deep web full of personal data for later to make different types of illegal use, including identity theft. As the new technology is used for the sophistication of illicit activities, there is a work of computer security companies to fight technically against attacks on information systems, networks and information, especially data breaches of personal data, so at the end of this part we do a study of digital tools created for this purpose
Freyssinet, Eric. "Lutte contre les botnets : analyse et stratégie." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066390/document.
Full textBotnets, or networks of computers infected with malware and connected to a command and control system, is one of the main tools for criminal activities on the Internet today. They allow the development of a new type of crime: crime as a service (CaaS). They are a challenge for law enforcement. First by the importance of their impact on the security of networks and the commission of crimes on the Internet. Next, with regards to the extremely international dimension of their dissemination and therefore the enhanced difficulty in conducting investigations. Finally, through the large number of actors that may be involved (software developers, botnet masters, financial intermediaries, etc.). This thesis proposes a thorough study of botnets (components, operation, actors), the specificaion of a data collection method on botnet related activities and finally the technical and organizational arrangements in the fight against botnets; it concludes on proposals on the strategy for this fight. The work carried out has confirmed the relevance, for the effective study of botnets, of a model encompassing all their components, including infrastructure and actors. Besides an effort in providing definitions, the thesis describes a complete model of the life cycle of a botnet and offers methods for categorization of these objects. This work shows the need for a shared strategy which should include the detection elements, coordination between actors and the possibility or even the obligation for operators to implement mitigation measures
Ghaibi, Dhia Moslem Abd Alameer. "La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international." Thesis, Lille, 2018. http://www.theses.fr/2018LIL2D013.
Full textThe security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity
Putigny, Herve. "Dynamiques socioculturelles et algorithmiques d'entrée dans une communauté cybercriminelles." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCH019.
Full textThe increasing generalization of conventional computer technologies and the emergence of the Internet of Things are probably founding principles of a new digital world order. The omnipresence, the interdependence of networks and the convergence of the components of cyberspace, catalyze the formation of social groups in an object such as the Internet and in particular in social media. The thesis will study in particular the birth of cybercriminal communities, as well as the rites and ties of affinity of the members of these societies. Beyond highlighting the elements of socio-cultural dynamics related to the creation of these digital spaces and their maintenance, the thesis will tend to show that there is a form of logic in the process of integration and the development of these virtual communities. cybercriminal
Barbu, Guillaume. "De la sécurité des platesformes JavaCardTM face aux attaques matérielles." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0037.
Full textSmart cards play a key role in various applications we use on a daily basis: payment, mobile communication, public transports, etc. In this context, the Java Card technology has evolved since its introduction in the mid-nineties to become nowadays the world leading smart card platform. In the context of Java Card, researches on security have revealed that the possibility of loading malicious applications represents a real threat. In the meantime, the scientific community has also paid interest to the security of embedded cryptography, revealing that theoretically strong cryptosystems can be easily broken if their implementation does not take into account certain physical properties of the underlying hardware device. In particular, a part of the published attacks relies on the attacker’s capacity to physically perturb the component during a cryptographic operation. These latter fault attacks have been rarely considered in the literature in the Java Card context. In this thesis, we study and evaluate the security of Java Cards against the combination of fault and software attacks in order to enhance it. First, we present various attack paths involving both hardware and software attacks and expose how these attacks allow to break various security mechanisms of Java Cards. In particular, our security analysis proves that the type-safety property, the control-flow integrity and the application isolation can be tampered with by the combination of adequate fault injections and malicious applications. Then, with regards to the goal of this thesis and the results of our security analysis, we present different approaches allowing to improve the resistance of Java Cards and Java Card applications against combined attacks. Thus we define several countermeasures against the attack we exposed as well as against some of the state-of-the-art attacks, always bearing in mind the strong constraints relative to smart cards
Thonnard, Olivier. "Vers un regroupement multicritères comme outil d'aide à l'attribution d'attaque dans le cyber-espace." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00006003.
Full textMany security experts have recently acknowledged the fact that the cyber-crime scene becomes increasingly organized and more consolidated. Even though there are some plausible indicators about the origins, causes, and consequences of these new malicious activities observed in the Internet, very few claims can be backed up by scientific evidence. In particular, many questions remain regarding the attribution of the attacks and the organization of cybercrime. The main contribution of this thesis consists in developing an analytical method to systematically address the problem of attack attribution in cyberspace. Our approach is based on a novel combination of a graph-based clustering technique with a data aggregation method inspired by multi-criteria decision analysis (MCDA). More specifically, we show that it is possible to analyze large-scale attack phenomena from separate viewpoints, revealing meaningful patterns with respect to various attack features. Secondly, we show how to sys tematically combine all those viewpoints such that the behavioral properties of attack phenomena are appropriately modeled in the aggregation process. Consequently, our global threat analysis method can attribute apparently different security events to a common root cause or phenomenon, based on the combination of all available evidence. Perhaps more importantly, our attack attribution technique can also emphasize the modus operandi of the attackers. This can help an analyst to get insights into how cybercriminals operate in the real-world, but also which strategies they are using
Maghrebi, Houssem. "Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0083.
Full textSide channel attacks take advantage of the fact that the power consumption of a cryptographic device depends on the internally used secret key. A very common countermeasure against side channel attacks is masking. It consists in splitting the sensitive variable of cryptographic algorithms into random shares (the masked data and the random mask) so that the knowledge on a subpart of the shares does not give information on the sensitive data itself. However, other attacks, such as higher-order side channel attacks, can defeat masking schemes. These attacks consist in combining the shares in order to cancel (at least partially) the effects of the mask. The overall goal of this thesis is to give a deep analysis of higher-order attacks and to improve the robustness of masking schemes.The first part of this thesis focuses on higher-order attacks. We propose three novel distinguishers. Theoretical and experimental results show the advantages of these attacks when applied to a masking countermeasure. The second part of this thesis is devoted to a formal security evaluation of hardware masking schemes. We propose a new side channel metric to jointly cover the attacks efficiency and the leakage estimation.In the last part, we propose three novel masking schemes remaining more efficient than the state-of-the-art masking. They remove (or at least reduce) the dependency between the leakage and the sensitive variable when the leakage function is known e.g. the Hamming weight or the Hamming distance leakage model). The new solutions have been evaluated within a security framework proving their excellent resistance against higher-order attacks
Billong, Billong Abel Henri. "La sécurisation du commerce électronique dans l'espace OHADA." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE3005.
Full textBesides the opportunity of a regulation on electronic commerce and its actors, the rules governing the construction process particularly interested observer. Regarding supervision of business law, the position of the common legislator OHADA is not indisputable. New methods to achieve commercial transactions in Africa have indeed revealed the fragility of its foundations. Thus, the balance inherent in the establishment of OHADA is increasingly threatened .The intervention of the common organization was actively expected in order to legally manage the consequences of using the Internet. Those expectations have not been actually entirely satisfied. Indeed, OHADA has not yet released any uniform act dedicated to e-commerce. This leads to the usage of the existing rules, still embryonic. This is the state initiatives whose legitimacy and effectiveness depend on the principles of OHADA. Although likely to fill gaps of the latter, they are nevertheless clearly insufficient. They do not make it possible to grasp all the changes and developments of practices inherent in dematerialization and ubiquity.Yet, as far as their vehicles namely the Internet, the emergence of online economic activity generates important security needs. The control of multiple security risks depends on the emergence of other standard-setting initiatives. The model building should reinforce the coherence of the process as well as the modernization of the rules concerned. In addition to French and community laws, despite the observed imperfections, processes and resulting rules represent a nourishing source of secure e-commerce model in OHADA
Ventéjoux, Aude. "Une lecture de la cyberviolence : la rencontre du sujet et du cyberespace dans les infractions à caractère sexuel envers mineurs réalisées sur Internet." Thesis, Rennes 2, 2019. http://www.theses.fr/2019REN20004/document.
Full textThe development of information and communication technologies was followed by the emergence of violent and/or offensive phenomena that exist on or thanks to the Internet. Is there a specificity to these behaviors of cyberviolence, which are rooted in what one calls cyberspace? This question will be answered partly thanks to psycho-criminological and cyberpsychological theories. This work takes a close look at sex offences against minors on the Internet. Thanks to the collected data, this work will offer a perspective on cyberviolence, with an interest in the relationship between the offender and the offence, the victim, and cyberspace. Cyberviolence arises from an encounter between a vulnerable subject and a cyberspace bearing opportunities. This encounter will thus be questioned, in order to understand the process and dynamics it stems from
Gastellier-Prevost, Sophie. "Vers une détection des attaques de phishing et pharming côté client." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0027.
Full textThe development of online transactions and "always-connected" broadband Internet access is a great improvement for Internet users, who can now benefit from easy access to many services, regardless of the time or their location. The main drawback of this new market place is to attract attackers looking for easy and rapid profits. One major threat is known as a phishing attack. By using website forgery to spoof the identity of a company that proposes financial services, phishing attacks trick Internet users into revealing confidential information (e.g. login, password, credit card number). Because most of the end-users check the legitimacy of a login website by looking at the visual aspect of the webpage displayed by the web browser - with no consideration for the visited URL or the presence and positioning of security components -, attackers capitalize on this weakness and design near-perfect copies of legitimate websites, displayed through a fraudulent URL. To attract as many victims as possible, most of the time phishing attacks are carried out through spam campaigns. One popular method for detecting phishing attacks is to integrate an anti-phishing protection into the web browser of the user (i.e. anti-phishing toolbar), which makes use of two kinds of classification methods : blacklists and heuristic tests. The first part of this thesis consists of a study of the effectiveness and the value of heuristics tests in differentiating legitimate from fraudulent websites. We conclude by identifying the decisive heuristics as well as discussing about their life span. In more sophisticated versions of phishing attacks - i.e. pharming attacks -, the threat is imperceptible to the user : the visited URL is the legitimate one and the visual aspect of the fake website is very similar to the original one. As a result, pharming attacks are particularly effective and difficult to detect. They are carried out by exploiting DNS vulnerabilities at the client-side, in the ISP (Internet Service Provider) network or at the server-side. While many efforts aim to address this problem in the ISP network and at the server-side, the client-side remains excessively exposed. In the second part of this thesis, we introduce two approaches - intended to be integrated into the client’s web browser - to detect pharming attacks at the client-side. These approaches combine both an IP address check and a webpage content analysis, performed using the information provided by multiple DNS servers. Their main difference lies in the method of retrieving the webpage which is used for the comparison. By performing two sets of experimentations, we validate our concept
Hennequin, Shirley. "La preuve numérique dans le procès pénal." Thesis, Aix-Marseille 3, 2011. http://www.theses.fr/2011AIX32063.
Full textAs a medium of the new society of information and communication and as a tool used both for work and play, digital technology has become ubiquitous. It has become man's virtual memory and represents a preferred field for investigation, an inexhaustible source of information. The principle of freedom of evidence in criminal law has allowed digital technology to play a major role : sometimes as evidence of infringement, of its author's imputability and/or identity, it has become inescapable. This general assessment is however limited, as it does not mean that any action can be taken anyhow, whatever the place or time ; digital evidence must indeed be searched for and collected within the rules governing it. Being subjected to the judge's inner conviction, the digital data will also have to offer guarantees of integrity and reliability before being considered as evidence on balance, these observations require that the general characteristics and expected role of digital evidence should be studied in order to examine how this new kind of evidence can be confronted with the system of evidence in criminal law
Mahabir, Laetitia-Amanda. "L'identité personnelle et les réseaux sociaux." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1015.
Full textThe identity of people in the digital space cannot be defined in one way. Its mode of expression is multiple. In fact, an individual can have several identities in the digital environment. It can also play different social roles according to social contexts that it faces. But what are effects of using identity masks ? The individual's identity within the social networks refers to the self-questioning, and others. The individualistic side and the community side of this identity are the foundation of the building of user's identity. Moreover, it appears that the wealth and the complexity of networks are the result of the confusion made by the law between individual and identity. In fact, the law is based on an essentialist conception of identity, by which each player has its own trajectory. But the individual does not live alone, he lives in a group and it is part of a network of social relations. The identity is made in the interaction of a claimed identity for oneself and assigned by others. Also, develop a personal identity on the fringes of the digital reality is to distinguish the person of the concept of online presence which is eminently declarative and performative.All this leads to reconsider the place of identity in the digital space. To understand the question of the construction of personal identity in social network, different approaches will be detailed. Those approaches are aimed to ensure everyone an identity according his wishes. Also, it will be necessary to adapt the existing measures to the virtual reality, in order to establish a more secure regime of personal identity, in respect of the rights of each user's personnality
Cortijo, Aragon Santiago José. "Sécurité pour des infrastructures critiques SCADA fondée sur des modèles graphiques probabilistes." Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS502.pdf.
Full textIn this thesis two new Bayesian-Network-based models are proposed: conditional truncated densities Bayesian networks (ctdBN) and conditional densities Bayesian networks (cdBN). They model joint probability distributions of systems combining discrete and continuous random variables. We analyze the complexity of exact inference for the proposed models, concluding that they are in the same order of the one for the classical Bayesian Network model. We also analyze the challenge of learning cdBNs, proposing a score function based in the BD score as well as a whole learning algorithm based on the structural EM algorithm, assuming the existence of discrete latent variables corresponding to each continuous variable. In addition, we proof theoretically that the cdBN and ctdBN models can approximate well any Lipschitz joint probability distribution, which shows the expressiveness of these models. Within the framework of the European project SCISSOR, whose goal is cyber-security, we use the cdBN model to describe the dynamics of a SCADA system and to diagnose anomalies in observations taken in real time, interpreting an anomaly as a potential threat to the integrity of the system
Ndukuma, Adjayi Kodjo. "Le droit de l'économie numérique en République Démocratique du Congo à la lumière des expériences européennes et Françaises." Thesis, Paris 1, 2017. http://www.theses.fr/2017PA01D085.
Full textThe expansion of telecoms and digitalization has fuelled the digital revolution. Their societal aspects represent a tangible source for legal dealings within the e-commerce and the information economy. The first line of inquiry establishes a model for the legal framework created over time for the European and French e-commerce. It demonstrates that legal adjustments narrowly followed the evolution of telecommunications methods : teleshopping (1989), remote contracts (1997), supplies for remote financial services (2002). However, the rise of this "electronic gateway" revolutionized the services of the Information Society, regulated since 2000 by the directive 2000/31/CE. (I)The second line of inquiry analyses the evolution of legislative policies on telecoms and electronic communications in Europe and in France. Because of the globalization of trade, the expansion of technological communications, the internationalization of networks and the growth of multinational firms, the international trade law transferred European legal standards of telecoms in Africa (DRC). (II) Congolese legislation, for instance, has followed the European model of deregulation. By opening rights of access to the telecoms sector, which was previously monopolistic, the country is undergoing the transformation of public services into the market economy. Everywhere, the regulation right creates new challenges for the separation of regulation, operation and control services. In addition, competition raises a new challenge regarding the self-regulation of trade by economic powers. (III) As innovations continue, the initial law of telecoms in RDC is unable to regulate the contingencies of the digital revolution, in particular in the areas of personal data and cybercrime. Since April 2017, the Congolese parliament is working
Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.
Full textThe incredible growth of the World Wide Web has allowed society to create new jobs, marketplaces, as well as new ways of sharing information and money. Unfortunately, however, the web also attracts miscreants who see it as a means of making money by abusing services and other people's property. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites, by observing that, while web attacks can be very complex in nature, they generally involve four main actors. These are the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies who scan the Internet trying to block malicious or compromised websites. In particular, we first analyze web attacks from a hosting provider's point of view, showing that, while simple and free security measures should allow to detect simple signs of compromise on customers' websites, most hosting providers fail to do so. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of their browsing habits. This allows us to understand if it would be feasible to build risk profiles for web users, similarly to what insurance companies do. Finally, we adopt the point of view of security companies and focus on finding an efficient solution to detecting web attacks that spread on compromised websites, and infect thousands of web users every day
Wagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL037N.
Full textInformation security communities are always talking about "attackers" but in reality very little is known about their skills.In the last decade the number of attacks has increased exponentially and honeypots were introduced in order to gather information about attackers. Honeypots come in different flavors with respect to their interaction potential. Choosing the best trade-off between attacker freedom and honeypot restrictions is challenging. In this dissertation, we address the issue ofself-adaptive honeypots that can change their behavior and lure attackers into revealing as much information as possible about themselves. Rather than being allowed simply to carry out attacks, attackers are challenged by strategic interference from adaptive honeypots. The observation of the attackers' reactions is particularly interesting and, using derivedmeasurable criteria, the attacker's skills and capabilities can be assessed by the honeypot operator. We formally model the interactions of attackers with a compromised system. The key idea is to leverage game-theoretic concepts to define the configuration and reciprocal actions of high-interaction honeypots. We have also leveraged reinforcement learningmachine learning in order to arrive at the best behavior when facing attackers. Our experimental results show that behavioral strategies are dependent on contextual parameters and can serve as advanced building blocks forintelligent honeypots
Alipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Full textOnline Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Marchal, Samuel. "Analyse du DNS et analyse sémantique pour la détection de l'hameçonnage." Electronic Thesis or Diss., Université de Lorraine, 2015. http://www.theses.fr/2015LORR0058.
Full textPhishing is a kind of modern swindles that targets electronic communications users and aims to persuade them to perform actions for a another’s benefit. Phishing attacks rely mostly on social engineering and that most phishing vectors leverage directing links represented by domain names and URLs, we introduce new solutions to cope with phishing. These solutions rely on the lexical and semantic analysis of the composition of domain names and URLs. Both of these resource pointers are created and obfuscated by phishers to trap their victims. Hence, we demonstrate in this document that phishing domain names and URLs present similarities in their lexical and semantic composition that are different form legitimate domain names and URLs composition. We use this characteristic to build models representing the composition of phishing URLs and domain names using machine learning techniques and natural language processing models. The built models are used for several applications such as the identification of phishing domain names and phishing URLs, the rating of phishing URLs and the prediction of domain names used in phishing attacks. All the introduced techniques are assessed on ground truth data and show their efficiency by meeting speed, coverage and reliability requirements. This document shows that the use of lexical and semantic analysis can be applied to domain names and URLs and that this application is relevant to detect phishing attacks
Do, Thanh-Toan. "Security analysis of image copy detection systems based on SIFT descriptors." Phd thesis, Rennes 1, 2012. http://www.theses.fr/2012REN1S080.
Full textContent-Based Image Retrieval Systems (CBIRS) are now commonly used as altering mechanism against the piracy of multimedia contents. These systems often use the SIFT local-feature description scheme as its robustness against a large spectrum of image distortions has been assessed. But none of these systems have addressed the piracy problem from a "security" perspective. This thesis checks whether CBIRS are secure : Can pirates mount violent attacks against CBIRS by carefully studying the technology they use ? First, we present the security flaws of the typical technology blocks used in state-of-the-art CBIRS. Then, we present very SIFT-specic attacks. The attacks are performed either during the keypoint detection step or during the keypoint description step. We also present a security-oriented Picture in Picture attack deluding CBIRS using post filtering geometric verifications. Experiments with a database made of 100,000 real world images confirm the effectiveness of proposed attacks
Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Full textThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Souvignet, Thomas. "L'expertise et la lutte contre la fraude monétique." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020091.
Full textEvery year, payment card fraud exceeds 1.5 billion euros in Europe. Organised crime groups are exploiting any vulnerability possible to take a piece of this lucrative activity. Even though the five principal entities in the payment card industry (cardholders, issuers,acceptors, acquirers and payment system providers) are implementing binding security measures through out standardized systems and networks, fraud continues to increase. Efforts by the state, industry collaboration, and individuals have been unsuccessful in decreasing criminal advances. Having analysed the elements of payment card fraud, this thesis proposes several actions (passive, reactive and proactive) to help improve the fight against this fraud. First, itis relevant to gain knowledge of the source of the card details and not to focus only on its reuse. Next, forensic assessment has to be improved, for example by developing an increased scientific understanding of the technology. Such an expertise should then be passed on to investigators through effective training and knowledge transfer. Investigations should also be made more dynamic with reactive operations conducted in concert by investigators and technicians. Finally, in an ideal proactive spirit, future investigations and assessments should be oriented and facilitated by studying and influencing current payment card technology developments
Quilton, Arnaud. "L'exercice des droits et libertés fondamentaux sur l'Internet." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1043.
Full textThe practice and customs from cyberspace demonstrates that the overlap between these two topics of study - internet on one hand and human rights on the other part - is permanent : by its very transcendental nature, the network of networks irradiates all the bodies of the society and therefore either directly or indirectly, all the basics Rights and Freedom, be they political, economic or social.Based on this premise, one has to identify with the most objective and accurate manner if the internet has a positive or negative impact on this body of law called « highest » : does that increases its protection and influence or, on the contrary, contributes to erosion, thus emphasizing the possible incompatibility of a theoretical right faced to a dematerialized reality? The answer to this problem, relying largely on a quantitative scientific analysis will establish that a majority of Fundamental Rights and Freedom is praised and even sublimated by the net ; at the same time, a minority of rights and freedoms, deemed to be essential within the hierarchy of basic rights, suffer from this meeting. De facto, the ambivalence of this finding will naturally lead to wonder whether it is appropriate that the theory of fundamental rights can affect, through principles in line with the technical nature of the net, the construction and sustainability of the legal framework of an internet hardly apprehandable within the « traditional » branches of the of law
Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe." Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Full textComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Della, Torre Laetitia. "Numérique humanitaire et protection des données : colonialité, souveraineté et dignité." Electronic Thesis or Diss., Compiègne, 2024. http://www.theses.fr/2024COMP2850.
Full textThe exploitation of data by multinationals, cyber-attacks, the proliferation of disinformation operations - today's digital environment is shaken by a growing number of tensions which do not spare humanitarian aid, especially as the sector has been digitalising its operations for the last ten years. NGOs have gradually adopted a series of digital tools, including data processing software, drones, biometric devices and conversational agents, blockchains and artificial intelligence. These organisations are therefore particularly vulnerable to the excesses of surveillance capitalism and the geopolitical tensions running through the digital space. The beneficiaries are the first victims. And this brings us to the following contradiction: humanitarians - actors committed to protecting the victims of crises - have adopted digital tools that can infringe on their privacy, or even put them in danger. The aim of this thesis is to attempt to understand the nature of this paradox, which requires us to examine the different dynamics and tensions that accompany the digitalisation of the humanitarian sector. First of all, the digitisation of humanitarian aid stems from the quantification of aid, which is itself linked to donors' demands to improve the accountability of NGOs and the traceability of funds. The digitisation of the humanitarian sector is also part of a more general move by the international aid community towards the private sector. This movement is accompanied by the spread of an innovation imperative and by a solution-oriented vision of new technologies. But for researchers such as Kristin Sandvik and Mirca Madianou, this innovation imperative is more akin to a form of "techno-colonialism". The dynamics of power resulting from colonial legacies contribute to the construction of beneficiaries as potential passive 'subjects' of experimentation, at the expense of respect for their privacy. The crises are also characterised by exceptional regimes that facilitate the experimentation of technologies in a context of suspension of the legal framework in force. However, this picture can be nuanced. On a more general scale, we are witnessing a movement to regulate innovation, reflected in a series of laws such as the Data Protection Regulation (RGPD), the Digital Markets Act, the Artificial Intelligence Act, etc. These laws also affect humanitarian aid. Part of our thesis is therefore devoted to the work of data protection officers working in humanitarian NGOs. Part of our thesis is therefore devoted to the work of data protection officers attached to humanitarian NGOs. But we will also see that the latter is based on a compliance approach that is not without its limits. We will then look at a second dynamic which is contributing to increasing the risks associated with the digitisation of the international solidarity sector. In short, it concerns the shrinking of humanitarian space, linked to the exercise of state sovereignty, and its translation into informational and digital space. Firstly, we will look at how data exchanges between NGOs and host countries are perceived and regulated. These exchanges can be seen as legitimate, but also as a risk factor, particularly if they are associated with forms of state violence and the criminalisation of aid beneficiaries. Secondly, we will take into account the fact that the digitisation of our societies also accompanies and reinforces a long-term phenomenon of recompositions of sovereignty. This phenomenon is also linked to the entry onto the scene of a series of non-state actors, obviously companies such as the GAFAMs, but also other more informal groups such as hackers. The involvement of cybercombatants in contemporary conflicts is part of a long movement to challenge the State's monopoly on violence as a result of the proliferation of intra-State conflicts - against terrorist groups, for example
Santos, Ademar Alves dos. "Cyberbullying, mídia e educação à luz do pensamento complexo." Universidade Nove de Julho, 2017. http://bibliotecatede.uninove.br/handle/tede/1715.
Full textMade available in DSpace on 2017-09-13T16:53:34Z (GMT). No. of bitstreams: 1 Ademar Alves dos Santos.pdf: 4852439 bytes, checksum: faf23580f879a88442fcddac5e2e8f80 (MD5) Previous issue date: 2017-05-30
This thesis aims to study the phenomenon of cyberbullying in the virtual electronic media. As a multidimensional phenomenon, cyberbullying is closely linked to the exponential growth of information and communication technology. The aggressive, intimidating, systematic and recurring behaviors typify this kind of bullying, which was previously restricted to physical, school and non-school spaces, and today transcends into cyberspace. The analyses of this thesis are based on the complex thinking, proposed by Edgar Morin. Therefore, the study was developed in a qualitative approach. By examining cyberbullying in the cyberspace, this research is also characterized by the use of the ethnographic methodology. The data and information obtained were analyzed in the light of three categories of Morin’s thought: interactivity, complexity and simplification. This interpretative procedure was carried out according to the assumptions of the content analysis defined by Bardin (2010), taking as a universe of research, discourses that involve the cyberbullying phenomenon published by three major Brazilian newspapers and by three virtual communities on Facebook. The study showed that, in the contents of the newspapers and virtual communities analyzed, by promoting a fragmented and sensationalist approach to cyberbullying, these information vehicles promote the construction of a reductionist and therefore partial view of this phenomenon, disregarding its biological, social, cultural and psychological dimensions, elements that make up the totality of this social event.
Cette thèse a pour objet d'étude le phénomène cyberbullying dans les médias électroniques virtuels. Comme phénomène multidimensionnel, le cyberbullying est étroitement lié à la croissance exponentielle de la technologie de l'information et de la communication. Les comportements agressifs, intimidateurs, systématiques et récurrents, caractérisent ce type de bullying qui, auparavant limité aux espaces présentiels, scolaires et non scolaires, transcende aujourd'hui au cyberespace. Les analyses de cette thèse se reposent sur la pensée complexe proposée par Edgar Morin. Par conséquent, l'étude est développée dans une approche qualitative. Lors de l'étude du Cyberbullying, dans le cyberespace, cette recherche se caractérise également par l'utilisation de la méthodologie ethnographique. Les données et les informations obtenues ont été analysées au regard de trois catégories de pensée "moriniano": Interactivité, Complexité et Simplification. Cette procédure interprétative a été réalisée en accord avec les présupposés de l'analyse de contenu définis par Bardin (2010), prenant en compte des discours impliquant le phénomène cyberbullying publiés par trois grands journaux brésiliens et trois communautés virtuelles de Facebook. L'étude a démontré que, dans les contenus des journaux ou des communautés virtuelles analysés, en promouvant une approche fragmentée et sensationnaliste du Cyberbullying, ces véhicules d'information favorisent la construction d'une vision réductionniste et, donc partielle de ce phénomène, sans tenir compte des dimensions biologiques, sociales, culturelles et psychologiques, éléments qui composent tout cet événement social.
Esta tesis tiene como objeto de estudio al fenómeno de acoso virtual (cyberbullying), en los medios electrónicos virtuales. Como fenómeno multidimensional el acoso cibernético (cyberbullying), está estrechamente vinculado con el crecimiento exponencial de las tecnologías de la información y de la comunicación. El comportamiento agresivo y la intimidación sistemática y recurrente, tipifican este tipo de agresión que anteriormente se encontraba restringida a los espacios del aula, escolares o no, que hoy trasciende al ciberespacio. Los análisis de esta tesis se fundamentan em el pensamiento complejo propuesto por Edgar Morin. Por tanto, el estudio se desarrolló mediante un enfoque cualitativo. Al examinar el acoso cibernético en el ciberespacio, esta investigación también se caracteriza por el uso de la metodología etnográfica. Los datos e informaciones obtenidas fueron analizados sobre la óptica de tres categorías del pensamento moriniano: la interactividad, la complejidad y la simplificación. Ese procedimiento interpretativo se realizo de acuerdo con las condiciones definidas por Bardin (2010), tomando como universo de investigación discursos que incluyen al fenómeno del cyberbullying publicados por tres grandes revistas brasileñas y por tres comunidades virtuales del Facebook. El estudio demostro que en los contenidos de las revistas y comunidades virtuales analizadas, al promover un abordaje fragmentado y sensacionalista del acoso cibernético esos vehículos de información promueven la construcción de una visión reducionista y por tanto parcial de ese fenómeno, sin considerar sus dimensiones biológicas, sociales, culturales y psicológicas, elementos que componen la totalidade de ese evento social.
Esta tese tem como objeto de estudo o fenômeno cyberbullying na mídia eletrônica virtual. Enquanto fenômeno multidimensional, o cyberbullying está intimamente ligado ao crescimento exponencial da tecnologia da informação e da comunicação. Os comportamentos agressivos, intimidatórios, sistemáticos e recorrentes tipificam esse tipo de bullying, que, antes, restrito aos espaços presenciais, escolares e não escolares, transcende, hoje, para o ciberespaço. As análises desta tese fundamentam-se no pensamento complexo, proposto por Edgar Morin. Para tanto, o estudo desenvolveu-se numa abordagem qualitativa. Ao examinar o cyberbullying, no ciberespaço, esta pesquisa caracteriza-se também pelo uso da metodologia etnográfica. Os dados e informações obtidos foram analisados à luz de três categorias do pensamento moriniano: interatividade, complexidade e simplificação. Esse procedimento interpretativo realizou-se de acordo com os pressupostos da análise de conteúdo definidos por Bardin (2010), tomando como universo de investigação discursos que envolvem o fenômeno cyberbullying publicados por três grandes jornais brasileiros e por três comunidades virtuais do Facebook. O estudo demonstrou que, nos conteúdos dos jornais e comunidades virtuais analisados, ao promover uma abordagem fragmentada e sensacionalista do cyberbullying, esses veículos de informação promovem a construção de uma visão reducionista e, portanto, parcial desse fenômeno, desconsiderando suas dimensões biológicas, sociais, culturais e psicológicas, elementos que compõem a totalidade desse evento social.
Coutu, Cameron. "La prévention de la cybercriminalité : résultats d’une enquête sur les effets perçus d’une campagne de prévention réalisée par une institution financière." Thèse, 2019. http://hdl.handle.net/1866/23715.
Full textThe purpose of this study was to evaluate the impact of a prevention campaign about cybercrimes that was run by a Canadian financial institution. More specifically, we examined how participants/clients perceived the financial institution’s initiative to inform them about cybercrimes. The study also explored whether or not the campaign had the desired effect, which was to reinforce their sense of security. This campaign took place on October 2018 and 1,452 adults (831 males and 521 females) participated in the online web survey. The results indicated that the prevention campaign had been positively perceived by most of the respondents (75%), especially among older individuals (55 y/o and over). Further analysis has shown no gender differences in participants’ responses. In general, participants felt that the campaign has increased their sense of safety; however, they also noted that the campaign lacked visibility and only a low percentage of individuals had seen it prior to the completion of the survey. Nonetheless, most participants have expressed an interest in receiving more information on cybercrime and how to take actions on protecting one’s self. In the future, it would be advisable to conduct targeted prevention campaigns in order to better achieve its objectives. Discussion also includes recommendations based on the results and the review of the literature.
Carignan, Mira. "L’origine géographique en tant que facteur explicatif de la cyberdélinquance." Thèse, 2015. http://hdl.handle.net/1866/12549.
Full text