Results 31 to 40 of about 20,944 (204)
Cross-border Access to E-Evidence: Framing the Evidence. CEPS in Liberty and Security in Europe No. 2020-02, February 2020 [PDF]
This paper aims at situating the policy discourse accompanying current European Union (EU) initiatives on facilitating access by public authorities to data held by private companies, including in scenarios regarded as crossing jurisdictional borders ...
Fuster, Gloria González +1 more
core
Pengembangan Framework Pelaporan Cyber Crime
In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable.
Daryono Daryono, Bambang Sugiantoro
doaj +1 more source
The problematic issues of using modern information and other technologies in the implementation of investigator’s and interrogator’s instructions by operational units are considered.
O. O. Zahumennyi
doaj +1 more source
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources
The Internet of Things (IoT) Forensic Investigation Process
The Internet of Things (IoT), a rapidly evolving network of connected devices, is expected to grow to an astounding 41.6 billion units by 2025. This exponential growth, while beneficial in terms of data collection and exchange, has also increased the ...
Mariam Al-Shaer +2 more
doaj +1 more source
Current security threats in the national and international context [PDF]
Research Question: What are the main security threats emphasized by national and international surveys? Motivation: The rapid growth of IT brings worldwide security issues (Takahashi et al., 2010; Benjamin et al., 2015). IT usage brings new challenges (e.
Cristea Lavinia Mihaela
doaj +1 more source
Cybercrime as an industry: examining the organisational structure of Chinese cybercrime
In an age of advancing information technology, widespread internet access has facilitated a rise in profit-driven cybercrime. Empirical research has found that cybercrime is now highly industrialised.
Qiaoyu Luo
doaj +1 more source
On the use of serious games technology to facilitate large-scale training in cybercrime response [PDF]
As technology becomes pervasive in everyday life, there are very few crimes that don’t have some ‘cyber’ element to them. The vast majority of crime now has some digital footprint; whether it’s from a CCTV camera, mobile phone or IoT device, there exists
Coull, Natalie +7 more
core
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
Cybercriminals exploit the opportunities provided by the information revolution and social media to communicate and conduct underground illicit activities, such as online fraudulence, cyber predation, cyberbullying, hacking, blackmailing, and drug ...
Farkhund Iqbal +4 more
doaj +1 more source
Cybersecurity: Analysis and Application of ProDiscover Forensic Toolkit
The world has in the recent past experienced rapid development in digital technology. However, as most organizations across the world continue to introduce digital technology into their operating system, issues of cybercrime have been on the rise and ...
Bandr Siraj Fakiha
doaj

