Results 111 to 120 of about 90,875 (224)
Indicators of School Crime and Safety: 2013 [PDF]
A joint effort by the Bureau of Justice Statistics and National Center for Education Statistics, this annual report examines crime occurring in schools and colleges. This report presents data on crime at school from the perspectives of students, teachers,
Amy Rathbun +3 more
core
Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core +1 more source
Cyber Crime Awareness: Internet Knowledge Dan E-commerce Use Pada UMKM Di Kabupaten Bantul YOGYAKARTA [PDF]
This research aimed to test the effect of internet knowledge and e-commerce use both partially and simultaneously using multiple linear regression analysis.
Ardiyanto, F. (Faizal) +2 more
core
6G-Enabled AI–Driven Technology for Real-Time Ecosystem Monitoring and Analysis in Mining Regions
For effective management of the ecological balance of natural resources, it is crucial to conduct real-time environmental monitoring in the context of mining activities.
Meijing Zhang +4 more
doaj +1 more source
Cybercrime is advancing at a shocking pace, following indistinguishable dynamic from the inescapable entrance of PC innovation and correspondence into all kinds of different backgrounds. While society is concocting and developing, in the meantime, lawbreakers are sending an amazing flexibility keeping in mind the end goal to get the best advantage from
openaire +2 more sources
The Role of the Sub Directorate of Cyber Crime, Ditreskrimsus in Investigating Crime of Cyber Crime
Cybercrime This is understandable given the inherent characteristics of cybercrime, which are cross national boundaries. Indonesia has established a regulation on cyber crime in the Law on Electronic Information and Transactions (UU ITE). This writing aims to identify and analyze the roles and constraints of the sub-directorate for cyber crime in the ...
openaire +2 more sources
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core
Needs Assessment Survey Result for Alaska State Victim Assistance Academy [PDF]
State Victim Assistance Academies (SVAA’s) offer coursework and training in victimology, victims’ rights, and victim services in order to meet the needs of victim service providers and allied professionals (Office for Victims of Crime).
Rosay, André B., Victims for Justice
core

