Results 21 to 30 of about 20,944 (204)

Understanding policing of cybe-rcrime in South Africa: The phenomena, challenges and effective responses

open access: yesCogent Social Sciences, 2019
Cybercrime continues to be a detrimental problem in South Africa and continues to change in nature and sophistication. Innovations and technological advancements aimed at moving the world towards a digital age increase the risks of cybercrime ...
Siyanda Dlamini, Candice Mbambo
doaj   +1 more source

Issues of Establishing the Place of Fraud Carried Out Using Information Technologies: Forensic and Criminal Procedure Aspects

open access: yesСибирское юридическое обозрение, 2022
The Author considers some debatable issues of establishing the place of fraud committed using information technology. The result of the study is the conclusion that the current development of criminal procedure legislation does not allow to adequately ...
G. D. Badzgaradze
doaj   +1 more source

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

Some Remarks regarding the Criminalization and the Forensic Investigation of the Crime of Computer Forgery in the Romanian Legislation

open access: yesBulletin of the Transilvania University of Braşov: Series VII: Social Sciences, Law, 2021
The article presents and analyzes issues related to the criminalization of the offence of computer forgery, provided by the Article 325 of the Romanian Criminal Code, as well as issues related to the
Adrian Cristian Moise
doaj   +1 more source

Indagini informatiche e acquisizione della prova nel processo penale / Enquêtes informatiques et acquisition d’éléments de preuve dans le procès pénal / Computer investigation and acquisition of evidence in criminal proceedings [PDF]

open access: yesRivista di Criminologia, Vittimologia e Sicurezza, 2010
This article aims to examine the new regulations introduced by the Budapest Convention on Cybercrime and the Italian Ratification Law No. 48/2008. Attention is focused primarily on the impact on computer investigation and the acquisition of evidence in ...
Bravo Fabio
doaj  

Methodology of cybercrime investigation

open access: yesStudia Prawnoustrojowe, 2021
Cyberprzestępczość można określić jako jeden ze współczesnych rodzajów przestępstw, z którym bez wątpienia zajmuje się również kryminalistyka. Jej początki sięgają lat 60. i 70. ubiegłego wieku i jest to obecnie jeden z najszybciej rozwijających się rodzajów przestępstw, a jednocześnie bardzo wyrafinowana.
openaire   +2 more sources

Safety Science as a Source of Organizational Cyber Resilience in Incident Response

open access: yesIEEE Access
This paper presents a scoping review of how safety science is being applied in Incident Response (IR) to improve organisational cyber resilience.
Haula Sani Galadima   +3 more
doaj   +1 more source

Criminal Investigation and Criminal Intelligence: Example of Adaptation in the Prevention and Repression of Cybercrime

open access: yesRisks, 2020
In the context of the digitization of delinquent activities, perpetrated via the internet, the question of the most appropriate means of crime prevention and crime repression is once again being raised.
Barlatier Jerome
doaj   +1 more source

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +1 more source

Kasus Cybercrime di Indonesia [PDF]

open access: yes, 2011
At the beginning was found, Computer is a huge machine with limited ability, but in recent years after manyupgrade and update Computer become a popular machine which many ability, men become amused and addictwith It.
Arifah, D. A. (Dista)
core  

Home - About - Disclaimer - Privacy