Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Computer crimes Computer crimes Computer networks.

Articles de revues sur le sujet « Computer crimes Computer crimes Computer networks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Computer crimes Computer crimes Computer networks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.

Texte intégral
Résumé :
Unfortunately, along with positive achievements, informatization also has negative manifestations, namely, the possibility of using computer technology to commit crimes. The world has long been talking about "cy-bercrime" about "computer crime," and chapter 16 of the Criminal Code of Ukraine deals with crimes in the use of computers, computer systems and networks, as well as telecommunications. Therefore, we can state that a unified approach to the definition of a concept does not exist. However, the introduction of certain norms into the law does not solve the problems. Problems arise with th
Styles APA, Harvard, Vancouver, ISO, etc.
2

М.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.

Texte intégral
Résumé :
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the m
Styles APA, Harvard, Vancouver, ISO, etc.
3

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Texte intégral
Résumé :
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
Styles APA, Harvard, Vancouver, ISO, etc.
4

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Texte intégral
Résumé :
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement,
Styles APA, Harvard, Vancouver, ISO, etc.
5

Futra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.

Texte intégral
Résumé :
Cyber ​​Crimeis a form of virtual crime by utilizing computer which connected to the internet network, and exploiting other devices or computers that is connected to the internet. Cybercrime was previously regulated in the regulation Number 36 Year 1999 concerning Telecommunications, however this regulation has not been able to accommodate virtual and computer crimes. To anticipate the development of information technology, regulation Number 19 Year 2016 concerning Amendments to regulation Number 11 of 2008 concerning Electronic Information and Transactions was issued. In Sawahlunto City in 20
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.

Texte intégral
Résumé :
<p class="a">By development of computer networks, computer -related crime spreading immoral that had negative impact on social systems including families and organizations and, more children were invaded by, the spread of computer crimes in the third world called cultural invasion.</p><p class="a">Committing dishonest acts in ignorance or belief that the right to intervene in the operation of computer systems or data entry, or data deletion, or the messages. those committed acts does not categorize in fraud documentary, if the aforementioned act intended to endamage business
Styles APA, Harvard, Vancouver, ISO, etc.
7

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Texte intégral
Résumé :
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of p
Styles APA, Harvard, Vancouver, ISO, etc.
8

Tkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.

Texte intégral
Résumé :
Actuality of surveillance the cyber-criminality problem and its impact upon a society is proved out by the rapid increase in a quantity of such crimes and material losses accordingly. The statistical analysis of their number increases and the caused losses is made in the process of cybercrimes studying. It’s revealed that besides the catastrophic number growth of such crimes, the relative size of losses is increased too. The analysis of the actual data for the nine years is made, on which basis the indicators’ table of the cyber-attacks number, the general losses and the indexes of their dynam
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ovalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.

Texte intégral
Résumé :
Computer crime and its evolution in Colombia, is relevant, the computer crimes described in Law 1273 of January 5, 2009 on the protection of information and data. Therefore, in the political constitution, article 15. All persons have the right to their personal and family privacy and their good name, and the State must respect them and enforce them, also, they have the right to know, update and rectify the information that they have been collected on them in databases and in archives of public and private entities. For this reason, cybercriminals, have specialized mainly in theft through compu
Styles APA, Harvard, Vancouver, ISO, etc.
10

Tariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.

Texte intégral
Résumé :
Crime is a bone of contention that can create a societal disturbance. Crime forecasting using time series is an efficient statistical tool for predicting rates of crime in many countries around the world. Crime data can be useful to determine the efficacy of crime prevention steps and the safety of cities and societies. However, it is a difficult task to predict the crime accurately because the number of crimes is increasing day by day. The objective of this study is to apply time series to predict the crime rate to facilitate practical crime prevention solutions. Machine learning can play an
Styles APA, Harvard, Vancouver, ISO, etc.
11

Ambika, Dr T., and Dr K. Senthilvel. "Cyber Crimes against the State: A Study on Cyber Terrorism in India." Webology 17, no. 2 (2020): 65–72. http://dx.doi.org/10.14704/web/v17i2/web17016.

Texte intégral
Résumé :
The computer and network are utilized each and every aspect of humans wherein the internet gives equal opportunities for every aspect of human development. As the client of the internet becomes progressively differing and the scope of online communication extends, there is development in the digital violations for example break of online agreements, execution of online torts and violations, and so forth. The development of computer technology has many times proved that individuals and some groups in the country are using computer technology to threaten international governments and citizens of
Styles APA, Harvard, Vancouver, ISO, etc.
12

Riadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.

Texte intégral
Résumé :
Rapid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime abuses Whatapps, one of the most popular Instant Messenger (IM) applications. WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique calledLive Forensics. Live forensics can be used w
Styles APA, Harvard, Vancouver, ISO, etc.
13

Padirayon, Lourdes M., Melvin S. Atayan, Jose Sherief Panelo, and Carlito R. Fagela, Jr. "Mining the crime data using naïve Bayes model." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1084. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1084-1092.

Texte intégral
Résumé :
<p>A massive number of documents on crime has been handled by police departments worldwide and today's criminals are becoming technologically elegant. One obstacle faced by law enforcement is the complexity of processing voluminous crime data. Approximately 439 crimes have been registered in sanchez mira municipality in the past seven years. Police officers have no clear view as to the pattern crimes in the municipality, peak hours, months of the commission and the location where the crimes are concentrated. The naïve Bayes modelis a classification algorithm using the Rapid miner auto mo
Styles APA, Harvard, Vancouver, ISO, etc.
14

Hu, Jing Fang, and Bu Sheng Li. "Research the Computer Forensics Based on Network." Advanced Materials Research 694-697 (May 2013): 2282–85. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2282.

Texte intégral
Résumé :
With the development of network technology, computer crimes occur from time to time. As a mean of active defense in network security aspect, network forensics have been widely studied and used. This thesis detailed introduces some network forensics techniques and methods, advances and analyzes how to design the network forensics system based on the techniques of intrusion tolerance, network monitor and so on.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Martínez-Mascorro, Guillermo A., José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes, and Hugo Terashima-Marín. "Criminal Intention Detection at Early Stages of Shoplifting Cases by Using 3D Convolutional Neural Networks." Computation 9, no. 2 (2021): 24. http://dx.doi.org/10.3390/computation9020024.

Texte intégral
Résumé :
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the information in real-time. Human sight has critical limitations. Among those limitations, visual focus is one of the most critical when dealing with surveillance. For example, in a surveillance room, a crime can occur in a different screen segment or on a distinct monitor, and the surveillance staff may overlook it. Our proposal focuses on shopli
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.

Texte intégral
Résumé :
Crimes that happen in the virtual environment created by digital technologies inflict considerable economic damage. Mercenary motives of criminals in the information society are giving rise to increasingly more and more sophisticated methods of abusing the trust of computer networks’ users. The harmonization of Russian legislation on counteracting cybercrimes with the legal standards of the Council of Europe is inevitable due to the trans-border character of crimes committed using information and telecommunication technologies, and to their high public danger. The methodology of researching cy
Styles APA, Harvard, Vancouver, ISO, etc.
17

Ku, Chih-Hao, and Gondy Leroy. "A crime reports analysis system to identify related crimes." Journal of the American Society for Information Science and Technology 62, no. 8 (2011): 1533–47. http://dx.doi.org/10.1002/asi.21552.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Arkhipova, E. A., and V. N. Dodonov. "International Legal Problems of Cooperation in the Detection, Investigation and Prevention of Crimes Committed Using Information and Telecommunication Networks and in the Field of Computer Information." Moscow Journal of International Law, no. 2 (November 19, 2020): 77–87. http://dx.doi.org/10.24833/0869-0049-2020-2-77-87.

Texte intégral
Résumé :
INTRODUCTION. Based on the analysis of international acts, as well as the practice of their application, the authors consider the international legal problems of interaction in the detection, investigation and prevention of crimes committed using information and telecommunication networks and in the field of computer information.MATERIALS AND METHODS. The materials for the study include the Agreement on cooperation of the CIS member States in the fight against crimes in the field of computer information of June 1, 2001, the Agreement on cooperation of the CIS member States in the fight against
Styles APA, Harvard, Vancouver, ISO, etc.
19

Plotnikova, T. V., and O. V. Kotelnikova. "The Phenomenon of Cybercrime in the 21st Century." Pravo: istoriya i sovremennost', no. 3(12) (2020): 141–50. http://dx.doi.org/10.17277/pravo.2020.03.pp.141-150.

Texte intégral
Résumé :
The spread and development of the “Internet” has erased the boundaries of communication and the dissemination of information. With the massive spread of computers, the world community is faced with such phenomena as illegal activities using a computer (and / or against computers), as well as this activity through the Internet. Many scientists and experts distinguish between cybercrime as a legal category and as a social phenomenon. The first is characterized by a specific unlawful act using a computer, computer network or the Internet. The qualification of these acts within the framework of cy
Styles APA, Harvard, Vancouver, ISO, etc.
20

Kotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.

Texte intégral
Résumé :
With rapid changes in technology and its increased use in different organizations, the cybercrime and digital forensics methods are also making advancement in new ways to tackle the latest trends in cyber crime. Cybercrime refers to any crime that involves a computer network or any public or private system. Cyber crime is emerging as a serious threat worldwide. The government organizations, police departments and various intelligence units of different countries have started to act accordingly. To control and investigate cybercrime, the investigators use various Digital forensics methods and m
Styles APA, Harvard, Vancouver, ISO, etc.
21

Gonov, Shamil Khasanovich, and Anton Vladimirovich Milovanov. "Topical questions of crime prevention in the Darknet." Полицейская и следственная деятельность, no. 1 (January 2021): 26–34. http://dx.doi.org/10.25136/2409-7810.2021.1.34560.

Texte intégral
Résumé :
The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mechanisms of crimes using information systems, and the technologies of information safety provision and deanonymization. The main task of the research is to develop the scientifically-grounded ideas aimed at the enhancement of the technique of analysis and assessment of crimes committed via information
Styles APA, Harvard, Vancouver, ISO, etc.
22

Solovyev, V. S., and M. N. Urda. "Importance of the Internet in Illegal Migration and Migration Crimes Determination." Actual Problems of Russian Law 1, no. 12 (2020): 114–22. http://dx.doi.org/10.17803/1994-1471.2019.109.12.114-122.

Texte intégral
Résumé :
The purpose of the paper is to identify the correlation between illegal migration, migration crimes and the use of the Internet resources. The content analysis of advertising sites, social networks in combination with other research methods has revealed that in the virtual space there is both active promotion of services facilitating illegal migration and a wide demand for them. Based on the results of the study, the authors develop the following proposals for improving measures to combat illegal migration in the global network. 1. A strategic direction for countering illegal migration should
Styles APA, Harvard, Vancouver, ISO, etc.
23

PANDELICĂ, Ioana-Lucia. "The Phenomenon of Cyber Crime." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 29–36. http://dx.doi.org/10.19107/ijisc.2020.01.04.

Texte intégral
Résumé :
With the rapid growth of computer and network systems in recent years, there has also been a corresponding increase in cyber-crime. Cyber crime takes many forms and has garnered much attention in the media, making information security a more urgent and important priority. With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Dronova, Olga Borisovna, Aleksey Aleksandrovich Kurin, Anna Pavlovna Alekseeva, Dmitriy Nikolaevich Sidorenko, and Svetlana Dmitrievna Guseva. "Information and analytical support for the detection and investigation of crimes." SHS Web of Conferences 108 (2021): 04010. http://dx.doi.org/10.1051/shsconf/202110804010.

Texte intégral
Résumé :
The effectiveness of law enforcement agencies is constantly monitored by the public, and its indicator is the safety of citizens, the ability to exercise their rights and freedoms. One of the strategic resources of the life of modern society is various information. Computer networks, geographical information systems, means of tactical forecasting of crimes, numerous integrated databases are already widely applied in the activities of the law enforcement agencies. Despite this, the main information resource for forensic purposes represented by the information arrays of the forensic registration
Styles APA, Harvard, Vancouver, ISO, etc.
25

Lydia Jane G. and Seetha Hari. "Crime Prediction Using Twitter Data." International Journal of e-Collaboration 17, no. 3 (2021): 62–74. http://dx.doi.org/10.4018/ijec.2021070104.

Texte intégral
Résumé :
As social media platforms are being increasingly used across the world, there are many prospects to using the data for prediction and analysis. In the Twitter platform, there are discussions about any events, passions, and many more topics. All these discussions are publicly available. This makes Twitter the ultimate source to use the data as an augmentation for the decision support systems. In this paper, the use of GPS tagged tweets for crime prediction is researched. The Twitter data is collected from Chicago and cleaned, and topic modelling is applied to the resultant set. Before topic mod
Styles APA, Harvard, Vancouver, ISO, etc.
26

Samoilenko, Olena, and Kateryna Titunina. "Internet fraud: technologies of performance, ways of counteraction and prevention." ScienceRise: Juridical Science, no. 2(16) (June 30, 2021): 65–70. http://dx.doi.org/10.15587/2523-4153.2021.235769.

Texte intégral
Résumé :
The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize th
Styles APA, Harvard, Vancouver, ISO, etc.
27

Zahoor, Rashida, and Naseem Razi. "Cyber-Crimes and Cyber Laws of Pakistan: An Overview." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 133–43. http://dx.doi.org/10.51872/prjah.vol2.iss2.43.

Texte intégral
Résumé :
Communications have become the most essential and quite an easy as well as fast because of technology advancement. Developing states are also getting the same blessings of computer networks and internet like the developed nations of the world. Besides, such the blessings and curses take place on account of communications in the modern technology. Cyberspace - is the medium of communication on computer networking that is not safe. Criminals use such the technology to commit crimes on cyberspace. Meanwhile the sensitive data and information are hacked to injure the person, organization, society
Styles APA, Harvard, Vancouver, ISO, etc.
28

Malov, Aleksandr A. "INTERNATIONAL LAW STANDARDS FOR OBTAINING OF ELECTRONIC EVIDENCE FROM FOREIGN JURISDICTIONS." International criminal law and international justice 1 (January 14, 2021): 19–23. http://dx.doi.org/10.18572/2071-1190-2021-1-19-23.

Texte intégral
Résumé :
The article discusses the features of the interaction of the competent criminal prosecution authorities with foreign jurisdictions and international legal standards for the execution of letter of request in order to obtain electronic evidence, as well as international initiatives and agreements aimed at combating crimes using computer networks.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Gerasimenko, N. I. "Specifics of using the Internet in the investigation of extremist crimes." Penitentiary Science 14, no. 3 (2020): 388–93. http://dx.doi.org/10.46741/2686-9764-2020-14-3-388-393.

Texte intégral
Résumé :
A fairly large number of criminal acts can be attributed to crimes of an extremist nature, but not all of them can be committed via the Internet. This type of crime has a number of characteristic features that must be established at the initial and subsequent stages of the investigation: 1) the situation in which the crimes were committed, including place and time. A feature of the place is the possibility of committing a crime by a person located anywhere in the world where there is Internet access. The specifics of time include the fact that a crime can be committed for a long time – from th
Styles APA, Harvard, Vancouver, ISO, etc.
30

Kagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.

Texte intégral
Résumé :
Purpose In a previous research, the authors proposed a security information service, called Personalized Real-time Information with Security Map (PRISM), which personalizes the incident information based on living area of individual users. The purpose of this paper is to extend PRISM to conduct sophisticated analysis of street crimes. The extended features enable to look back on past incident information and perform statistical analysis. Design/methodology/approach To analyze street crimes around living area in more detail, the authors add three new features to PRISM: showing a past heat map,
Styles APA, Harvard, Vancouver, ISO, etc.
31

Putri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.

Texte intégral
Résumé :
Advances in information technology provides much convenience for human life, but even this progress simultaneously cause a variety of problems that are not easy to find a way out. One of the problems arising from the development of information technology, namely the birth of crimes that refers to activities undertaken in the virtual world using a computer or computer network technology, known as cybercrime (cybercrime). Crime cybercrime common daily life such Decency, Gambling, humiliation or defamation, extortion or threatening, Spreading false news, Abuse, Hacker, Cracker, falsification of d
Styles APA, Harvard, Vancouver, ISO, etc.
32

Gilmanov, Eduard, and Danila Kirpichnikov. "On the need to develop a methodology for investigating crimes in the field of digital information circulation." Current Issues of the State and Law, no. 14 (2020): 262–77. http://dx.doi.org/10.20310/2587-9340-2020-4-14-262-277.

Texte intégral
Résumé :
The relevance of the study is due to the transition of the processes of circulating information about the interaction of individuals into information and telecommunication devices, its systems and networks, which causes changes in the structure of crime, determines the emergence of new methods and ways of committing acts prohibited by criminal law. In accordance with the above, changes are also taking place in the sources for displaying trace information about a criminal event, which are used by information and tele-communication devices, its systems and networks with increasing frequency. The
Styles APA, Harvard, Vancouver, ISO, etc.
33

Borysova, L., P. Bilenchuk, M. Malii, and V. Vynohradova. "EXAMINATION AS A MEANS OF ESTABLISHING THE FACTS AND CIRCUMSTANCES OF COMMISSION OF TRANSNATIONAL COMPUTER CRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 230–39. http://dx.doi.org/10.33994/kndise.2020.65.22.

Texte intégral
Résumé :
The article is noted that investigators are not able to track all technological changes in the field of information technology and to study the traces of this type of crime, special attention is paid to the use of examination of computer systems and computer media (order of the Ministry of Justice of Ukraine dated 08.10.98, No. 53/5). During the examination, it is advisable to solve the following problems: – identification, that is the diagnosis of system processes and system behavior; system identification; multivariate analysis and reconstruction of the circumstances of the event place (by m
Styles APA, Harvard, Vancouver, ISO, etc.
34

Suryadi, Ahmad. "Responsiveness of Criminal Law to Skimming Crimes in The Era of Industrial Revolution 4.0 (Four Point Zero)." Jurnal Hukum Volkgeist 5, no. 2 (2021): 130–42. http://dx.doi.org/10.35326/volkgeist.v5i2.845.

Texte intégral
Résumé :
This study aims to: 1)Analyze and understand the responsiveness of criminal law in entering the era of industrial revolution 4.0 (four point zero), 2)Enforcement of criminal law in cyber crime, criminal acts in cyber crime, criminal responsibility of cyber crime perpetrators. This research is normative-empirical research which is basically a merger between normative legal approach with the addition of empirical elements as the implementation of normative law in its action on every legal event that occurs in society. The results of this study show that cyber crime is a special crime. Cyber Crim
Styles APA, Harvard, Vancouver, ISO, etc.
35

Olukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.

Texte intégral
Résumé :
AbstractInternet crime can be defined as unlawful acts using the computer as either a tool or a target or both. Internet networks are used positively to conduct businesses, manage industrial and governmental activities, engage in personal communications, and conduct research. Also, certain confidential information is stored or passed through the medium of the internet. Credit cards containing information of users are used as the major means of buying and selling on the internet. Information infrastructure has become a critical part of the backbone of global economies; therefore, it is imperati
Styles APA, Harvard, Vancouver, ISO, etc.
36

Khatun, Most Rokeya, Safial Islam Ayon, Md Rahat Hossain, and Md Jaber Alam. "Data mining technique to analyse and predict crime using crime categories and arrest records." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1052. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1052-1060.

Texte intégral
Résumé :
Generally, crimes influence organisations as it starts occurring frequently in society. Because of having many dimensions of crime data, it is difficult to mine the available information using off the shelf or statistical data analysis tools. Improving this process will aid the police as well as crime protection agencies to solve the crime rate in a faster period. Also, criminals can often be identified based on crime data. Data mining includes strategies at the convergence of machine learning and database frameworks. Using this concept, we can extract previously unknown useful information and
Styles APA, Harvard, Vancouver, ISO, etc.
37

Gribina, E., and E. Savchenko. "UK Revenue Service Best Practices for Fighting Tax Evasion." Auditor 7, no. 6 (2021): 41–45. http://dx.doi.org/10.12737/1998-0701-2021-7-6-41-45.

Texte intégral
Résumé :
Th e authors analyze the UK experience of the tax service, the tools used to combat tax evasion, and some of the trends that have been identifi ed. In particular, the role of specialized computer systems and social networks is noted as one of the main sources for fi nding the necessary information. Attention is also drawn to the tightening of the policy of the tax department and legislation in the fi eld of combating tax crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Rossinskaya, E. R., and A. I. Semikalenova. "Counterfeit Information and Computer Product as an Object of Forensic Research of Computer Tools and Systems." Lex Russica, no. 8 (August 25, 2020): 86–95. http://dx.doi.org/10.17803/1729-5920.2020.165.8.086-095.

Texte intégral
Résumé :
The paper considers the impact of global digitalization on the detection and investigation of crimes in the field of copyright and related rights violations based on the doctrine of criminalistic research of computer tools and systems, which is part of the private theory of information and computer support for criminalistic activities. It is noted that since the early 2000s, approaches to investigative tactics and forensic research of audio recordings, videos, and software have been considered in isolation from these types of objects. The development of information and computer technologies ha
Styles APA, Harvard, Vancouver, ISO, etc.
39

Shut, Oksana A. "Fraud in Social Networks and Ways to Implement." Herald of Omsk University. Series: Law 17, no. 4 (2020): 97–106. http://dx.doi.org/10.24147/1990-5173.2020.17(4).97-106.

Texte intégral
Résumé :
Introduction. The relevance of the article is due to the development of legal norms regulating relations in social networks, which has been delayed for years. The outdated regulatory framework does not cope with the regulation of relations in networks. Therefore, it is necessary to implement modern relations of an illegal nature that develop between users in social networks in the norms of the current Criminal Code, as well as to develop a classification of methods of fraud in social networks, and identify their features. Purpose. The purpose is to consider the features of legal regulation of
Styles APA, Harvard, Vancouver, ISO, etc.
40

Baird, Lindsay. "The Detection of Crimes and Errors and Omissions." EDPACS 29, no. 3 (2001): 1–8. http://dx.doi.org/10.1201/1079/43274.29.3.20010901/31729.1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Volinsky, Alexander Fomich, and Vladimir Antonovich Prorvich. "Features of Formation of Integrated Legal Foundation for Electronic Litigation on Crimesin the Sphere of Eco." Russian Journal of Legal Studies 6, no. 1 (2019): 149–58. http://dx.doi.org/10.17816/rjls18487.

Texte intégral
Résumé :
The development of the information society, various branches of the digital economy and new manifestations of crime put on the agenda the creation of an electronic litigation system with the use of modern information technologies to improve the quality documents in the courts. The relevant policy documents set out tasks and improve the quality of various types of legal proceedings, including the creation of electronic justice using artificial intelligence computer robots based on neural network algorithms. At the same time there is a high level of risks of introduction of fundamentally differe
Styles APA, Harvard, Vancouver, ISO, etc.
42

SONG, RONGGONG, LARRY KORBA, GEORGE YEE, and YING-CHIEH CHEN. "PROTECT VIRTUAL PROPERTY IN ONLINE GAMING SYSTEM." International Journal of Software Engineering and Knowledge Engineering 17, no. 04 (2007): 483–96. http://dx.doi.org/10.1142/s0218194007003367.

Texte intégral
Résumé :
Massively multiplayer role-playing gaming (MMORPG) has become a very popular entertainment in Asia. Along with the success of the massively multiplayer role-playing gaming industry in Asia, online gaming-related crimes have grown at an amazing rate. Most of the criminal cases are related to virtual properties since markets have developed for the virtual properties giving them real world values. There has been little research and resulting technologies for MMORPG virtual property protection. In order to reduce the crimes and protect online gaming systems, one potential solution is protecting th
Styles APA, Harvard, Vancouver, ISO, etc.
43

Stevanovic, Ivana. "Criminal acts related to the exploitation of child pornography through abuse of computer systems and networks: International and domestic criminal legislation framework." Temida 12, no. 3 (2009): 27–41. http://dx.doi.org/10.2298/tem0903027s.

Texte intégral
Résumé :
The paper points out the importance of newly adopted international norms and standards that State Parties should undertake to aim a more adequate protection of children from sexual exploitation especially a pornography exploitation. A specific section of this paper is dedicated to the overview of the domestic criminal legislation framework regarding the protection of children victims of crimes related to their exploitation in pornography through abuse of computer systems and networks, and considering the recent changes in the criminal legislation in the Republic of Serbia. In this paper the au
Styles APA, Harvard, Vancouver, ISO, etc.
44

Maimon, D., A. Kamerdze, M. Cukier, and B. Sobesto. "Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective." British Journal of Criminology 53, no. 2 (2013): 319–43. http://dx.doi.org/10.1093/bjc/azs067.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Stéphano Rufino Belezzi, Hugo. "AS NOVAS MODALIDADES DE CRIMES CIBERNÉTICOS: O CYBERBULLYING, VINGANÇA PORNOGRÁFICA E A INTERNET PROFUNDA (DEEP WEB)." Colloquium Socialis 2, Especial 2 (2018): 154–61. http://dx.doi.org/10.5747/cs.2018.v02.nesp2.s0271.

Texte intégral
Résumé :
This article will address the new modalities of cyberbullying such as cyberbullying, pornographic revenge and the deep internet known as the deep web, bringing its concepts and definitions to the present legal order, infraconstitutional legislation that deals with cyber crimes together with these new types, bringing insertions and changes in the legislation in force, the most common types of crimes currently committed by the Internet in reference to a considerable growth of cases of this type, where the need to establish a more adequate legislation will be taken into account. specific and appl
Styles APA, Harvard, Vancouver, ISO, etc.
46

Ефремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.

Texte intégral
Résumé :
The article is devoted to development of the USA legislation on the fight against terrorism. The author considered the objectives and tasks of the state in a particular historical period; analyzed the laws passed by the USA Congress aimed at combating home and international terrorism; identifies the main directions of the state policy of the USA in the field of counter-terrorism. The article covers the events after 11 September 2001 to the present. The author gives a brief overview of the events of 11 September 2001, discusses the Patriot Act and other laws, aimed at combating terrorism. The P
Styles APA, Harvard, Vancouver, ISO, etc.
47

Wahyono, Irawan Dwi, Djoko Saryono, Khoirudin Asfani, Muhammad Ashar, and Sunarti Sunarti. "Smart Online Courses Using Computational Intelligence." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (2020): 29. http://dx.doi.org/10.3991/ijim.v14i12.15601.

Texte intégral
Résumé :
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing incidence of computer network security crimes, the government and several organizations have taken precautions by providing training to students about computer network security. Some parties develop learning models that are suitable for students and find appropriate learning methods to produce professionals in the field of computer network security th
Styles APA, Harvard, Vancouver, ISO, etc.
48

Dumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.

Texte intégral
Résumé :
The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of ce
Styles APA, Harvard, Vancouver, ISO, etc.
49

Nurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.

Texte intégral
Résumé :
With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage
Styles APA, Harvard, Vancouver, ISO, etc.
50

Salhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.

Texte intégral
Résumé :
One of the most interesting fields nowadays is forensics. This field is based on the works of scientists who study evidence to help the police solve crimes. In the domain of computer science, the crimes within computer forensics are usually network attacks, and most attacks are over the email (the case of this study). Email has become a daily means of communication which is mainly accessible via internet. People receive thousands of emails in their inboxes and mail servers (in which people can find emails in those lists). The aim of this study is to secure email users by building an automatic
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!