Search results for "cybercrime"

showing 10 items of 11 documents

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Phenomena in the Cyber World

2015

This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.

CybercrimeRisk modelCyberwarfareComputer scienceCyberterrorismPerspective (graphical)Network-centric warfareComputer securitycomputer.software_genrecomputerComputingMilieux_MISCELLANEOUSInformation warfareCritical infrastructure
researchProduct

Noziedzīgi nodarījumi pret informācijas sistēmu drošību (kibernoziegumi)

2005

DatornoziegumiInformācijas sistēmu drošībaComputer crimeCybercrime:LAW/JURISPRUDENCE::Criminal law [Research Subject Categories]Noziedzīgi nodarījumi pret informācijas sistēmu drošībuHakeriVirtual crimeKriminālatbildībaComputers lawKiberterorismsPatvaļīga piekļuve datorsistēmaiKibernoziegumiData protection
researchProduct

Pornografía infantil: cambios en las formas de obtención y distribución

2017

RESUMEN: El objetivo de este estudio es sintetizar el conocimiento científico sobre los principales mecanismos empleados para la obtención y distribución de pornografía infantil a lo largo de la historia. Para ello, se ha realizado una búsqueda exhaustiva de los trabajos publicados hasta 2016, siendo seleccionados un total de 37. Los resultados obtenidos permiten diferenciar cuatro grandes etapas del tráfico de pornografía infantil (comercial, informatizada, Internet, oculta), en las que los consumidores han migrado hacia tecnologías que les resultan más atractivas y adecuadas para sus fines (Deep Web y redes p2p sin filtro). Sin embargo, un sistema descentralizado como Internet impide la a…

InternetComputer crimeCybercrimeCrime eletrônicoPornografia produção EspanhaViolência contra menor EspanhaCrime por computador EspanhaInternet aspectos jurídicos EspanhaCibercrimePornografia aplicação por computador EspanhaCrime virtualPedofilia EspanhaAbuso da informáticaRede mundial de computadoresCrime digitalDelito informáticoCorrupção de menores EspanhaPornografia infantilPornografia distribuição Espanha
researchProduct

Nuovi scenari nell'accesso transfrontaliero alla prova "elettronica"

2018

Il lavoro esamina le proposte presentate dalla Commissione europea in tema di prova elettronica, nonché le modifiche che si intendono apportare alla Convenzione di Budapest. L'ultima parte è dedicata alle possibili ricadute, sul versante europeo, del CLOUD Act.

service providerCLOUD ActSettore IUS/16 - Diritto Processuale PenaleCybercrime ConventionElectronic evidence
researchProduct

Patvaļīga piekļūšana automatizētai datu apstrādes sistēmai. Ar to radītais kaitējums un problemātika

2016

Darbā tiek apskatīts viens no bīstamākiem un neparedzamiem noziedzīgiem nodarījumiem kas tiek dvti par kibernoziegumiem. Šo noziedzīgo nodarījumu skaits un sarežģītība pieaug ar katru gadu. Latvijā var sastapt vairākus kibernozieguma veidus. Viens no izplatītākajim ir paltvaļīga peikļūšana automatizētai datu apstrādes sistēmai, par kuru paredzēta kriminālatbildība Krimināllikuma 241.pantā. Izmeklējot šāda veida noziedzīgus nodarījumus rodas problēmas, kā parezi kvalificēt noziedzīgo nodarījumu, kam jāpievērš uzmanība, lai izmeklēšanas gala rezultātā noziedzīgs nodarījums netiktu kvalificēts pēc cita krimināllikuma panta. Pastāvot šāda veida noziedzīgo nodarījumu izmeklēšanas problēmām, Latv…

kibernoziegumscybercrimepatvaļīga piekļūšana automatizētai datu apstrādes sistēmaikibertelpaunauthorized access to automatic data processing systemJuridiskā zinātne
researchProduct

Are we any good at protecting our societies and economies from the threat of economic crime and misconduct?

2019

PurposeThis paper aims to outline the Italian framework of rules against economic crime and to verify if Italian legislation provides for appropriate and effective measures according to own needs both at a national and European level.Design/methodology/approachThe paper uses a comparative approach by examining the European and Italian legal systems for finding analogies and differences between them.FindingsThe study has revealed the need of a greater international harmonisation of criminal laws and penalties as well as the transnationality of the economic crime cuts the chance of success of every national strategy, given that transnational criminals are encouraged by the awareness that thei…

International level050208 financeEconomic crimeTransnationalityCybercrimeEconomic policy05 social sciencesLaw enforcementEconomic crimeLegislationSettore IUS/02 - Diritto Privato Comparato050201 accountingMoney launderingCohesion (linguistics)Misconduct0502 economics and businessBusinessLawGeneral Economics Econometrics and FinanceJournal of Financial Crime
researchProduct

Profiles, motives and experiences of authors publishing in predatory journals: OMICS as a case study

2023

International audience; The paper aims to understand the context and drivers of researchers' decision to submit a manuscript to a predatory journal. Using OMICS as a case study and asking authors for their views, the paper presents their profile, motivations and publishing experiences. The methodology is based on a questionnaire sent by email to all authors of articles published in OMICS (+2200). The authors were asked about 1/ the factors that influenced their decision to submit their article, 2/ their publishing predatory journal. At the same time, it reveals some of the strategies used by OMICS to persuade authors to submit their papers. The findings will help to inform institutional pol…

predatory journals[SHS.INFO]Humanities and Social Sciences/Library and information sciencespublishing subculturecybercrimeOMICSpredatory publishingpredatory publishers[SHS.INFO] Humanities and Social Sciences/Library and information sciences
researchProduct

Undersea optical cable network and cyber threats

2019

Almost all services and most of the traditional services are totally dependent on the digital environment. Few users are aware of the revolutionary nature of modern technology. We use day-to-day real-time access to existing digital services in our home country or we use social media (Some) to communicate with friends locally or elsewhere in the world. We can communicate with them in real time with text messages or even through real-time video feed. People have the choice of millions of movies to watch anytime, anywhere. Modern communications connect data centers and data networks of different continents together, enabling real-time communications throughout the world. We can order different…

kyberrikollisuuscommunicationcontinentscybercrimehackerssubmarine cableshakkeritkyberturvallisuustieto- ja viestintärikoksetmerikaapelitviestintä
researchProduct

Fałszerstwo dokumentów ze szczególnym uwzględnieniem przestępczości internetowej jako wyzwanie dla organów państwa

2018

Celem niniejszego opracowania jest przedstawienie zagrożeń wynikających z fałszowania dokumentów, a szczególnie wykorzystania nowoczesnych technologii do tego niecnego procederu. Zaprezentowane zostały definicje dokumentu i fałszerstwa oraz podjęta została próba przedstawienia aktualnych kierunków rozwoju przestępczości w obszarze IT. Autorka zwróciła uwagę na problem sieci TOR (ang. The Onion Router), która stanowi obecnie największe zagrożenie dla bezpieczeństwa w zakresie autentyczności dokumentów. W artykule zwraca się także uwagę na konieczność przedsięwzięcia przez organy państwowe działań zmierzających do zapobiegania przestępczości związanej z wiarygodnością dokumentów.

TOR networksieć TORdocument forgingcybercrimecyberprzestępczośćfałszerstwo dokumentówPrzegląd Polsko-Polonijny
researchProduct