Results 211 to 220 of about 55,932 (227)
Some of the next articles are maybe not open access.
International Journal of Cyber Research and Education, 2021
This paper presents the nature, effects, and dynamics of cybercrime in Nigeria and its effects to economic development in the country. The paper is sourced for secondary data through, journals, periodicals and publications as well as obtained primary data from the field.
Paul Connor +3 more
+6 more sources
This paper presents the nature, effects, and dynamics of cybercrime in Nigeria and its effects to economic development in the country. The paper is sourced for secondary data through, journals, periodicals and publications as well as obtained primary data from the field.
Paul Connor +3 more
+6 more sources
Communications of the ACM, 2013
Symantec says $110 billion annually while McAfee says $1 trillion. Why can't anyone agree?
GrĂ¡inne Kirwan, Andrew Power
+4 more sources
Symantec says $110 billion annually while McAfee says $1 trillion. Why can't anyone agree?
GrĂ¡inne Kirwan, Andrew Power
+4 more sources
2020
Cybercrime is a computer-oriented crime where offences are committed against an individual person or group of persons with a criminal intention to harm the victim either physically or psychologically, directly or indirectly, using IT devices via internet.
Poongodi Thangamuthu +3 more
openaire +2 more sources
Cybercrime is a computer-oriented crime where offences are committed against an individual person or group of persons with a criminal intention to harm the victim either physically or psychologically, directly or indirectly, using IT devices via internet.
Poongodi Thangamuthu +3 more
openaire +2 more sources
2019
Il trattato offre una disamina completa e sistematica del diritto penale dell ...
Paul Connor +2 more
+7 more sources
Il trattato offre una disamina completa e sistematica del diritto penale dell ...
Paul Connor +2 more
+7 more sources
2017
This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For
openaire +2 more sources
This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For
openaire +2 more sources
2012
AbstractThis article begins by discussing cybercrime as an evolving technology-based crime construct. Cybercrime includes existing and emerging forms of criminality carried out with electronic IT devices and information systems. This is followed by examples and explanations of emerging IT-enabled abuse and crime and discussion of major types of ...
openaire +1 more source
AbstractThis article begins by discussing cybercrime as an evolving technology-based crime construct. Cybercrime includes existing and emerging forms of criminality carried out with electronic IT devices and information systems. This is followed by examples and explanations of emerging IT-enabled abuse and crime and discussion of major types of ...
openaire +1 more source
2018
Abstract As the Internet has grown, so has criminal activity that uses the internet as a tool, and cybercrime has become a significant threat to both government and private organizations and individuals. Focussing on the substantive criminalisation of cybercrime, this chapter briefly examines the nature of cybercrime and why it calls for
openaire +1 more source
Abstract As the Internet has grown, so has criminal activity that uses the internet as a tool, and cybercrime has become a significant threat to both government and private organizations and individuals. Focussing on the substantive criminalisation of cybercrime, this chapter briefly examines the nature of cybercrime and why it calls for
openaire +1 more source

