Results 21 to 30 of about 90,875 (224)
Cyber Espionage in National and Global Perspective: How Indonesia Deal with this issue?
Cyber Crime is the most frightening crime in today's technological developments. Attacks that do not know the target and time for a particular purpose. The privacy of a person or institution can be threatened by cyber crime.
Maharani Chandra Dewi
doaj +1 more source
ANALISIS TERHADAP CYBER CRIME DALAM KAITANNYA DENGAN ASAS TERRITORIALITAS
Cyberspace adalah media yang tidak mengenal batas, baik batas-batas wilayah maupun batas kenegaraan, sehubungan dengan dunia maya (Cyber Crime) tentunya akan menimbulkan masalah tersendiri, khususnya berkenaan dengan masalah yurisdiksi.
Ikhsan Yusda PP
doaj +1 more source
On the complexity of collaborative cyber crime investigations [PDF]
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime.
Bednar, Peter, Hennell, C., Katos, V.
core +2 more sources
Crime scripting: A systematic review [PDF]
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core +1 more source
THE PHENOMENON OF CYBER CRIMES WHICH IMPACT CHILDREN AS VICTIMS IN INDONESIA
The development of internet nowadays does not only give a positive impact but also gives a negative impact in the form of crime that targets everyone, including children.
Hardianto Djanggih
doaj +1 more source
Penanggulangan Cyber Crime melalui Penal Policy [PDF]
Perkembangan teknologi informasi dan komunikasi menyebabkan hubungan dunia menjadi tanpa batas dan menyebabkan Perubahan sosial, ekonomi, dan budaya secara signifikan berlangsung dengan demikian cepat.
Marwin, M. (Marwin)
core +2 more sources
Innovative professional skills competition to create a police practice talents
In order to better hold the pulse of The Times, practice the socialist core values, coagulation hearts meet force make preliminary police officers, public security colleges and universities of professional setting characteristics at the same time ...
QIN Yuhai, LIU Luyuan, GAO Haohang, LIU Shengqiao, DONG Han
doaj +1 more source
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
European standards in the field of combating cyber crime [PDF]
Cyber crime is a phenomenon which is often written and spoken about, ever since its inception, in theory, judicial and legislative practice of developed countries and international institutions.
Matijašević-Obradović Jelena
doaj +1 more source
Digital evidence search kit [PDF]
With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection ...
Chan, HW +6 more
core +1 more source

