Results 41 to 50 of about 20,944 (204)
COMMENT– Some Remarks on Ethiopia’s New Cybercrime Legislation
Ethiopia has been enacting various pieces of legislation, since recently, to regulate some aspects of the digital environment. The Cybercrime Proclamation of 2016 (Computer Crime Proclamation No.958/2016) is the most recent addition to the legal regime ...
Kinfe Micheal Yilma
doaj +1 more source
A crime 2.0: Cybercrime, e-talent, and institutions [PDF]
Cybercrime is typically profiled as a skill-intensive crime committed by educated, young criminals. This observation raises the controversial question of whether advanced knowledge and skills are a pull factor of cybercrime.
Cho, Seo-Young
core
Investigating methods for forensic analysis of social media data to support criminal investigations
Social media platforms have become a cornerstone of modern communication, and their impact on digital forensics has grown significantly. These platforms generate immense volumes of data that are invaluable for reconstructing events, identifying suspects,
Muhammad Arshad +4 more
doaj +1 more source
Preventing and Combating Cybercrimes: Case of Cybercrimes Investigation Unit of Tanzania Police
The study was conducted at the cybercrimes investigation unit of Tanzania Police Force. The study investigates the current situation of Tanzania Police Force on combating and preventing cybercrimes in Tanzania and examine the effect of the current legal framework governing them on preventing and combating cybercrime.
Edgar Rogart Massawe, Juma Ally Mshana
openaire +1 more source
Measuring digital crime investigation capacity to guide international crime prevention strategies
This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect
E. Casey, G. Gogolin, H. Hekim
core +1 more source
Crime scripting: A systematic review [PDF]
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core +1 more source
Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats +2 more
core +1 more source
On the complexity of collaborative cyber crime investigations [PDF]
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime.
Bednar, Peter, Hennell, C., Katos, V.
core +2 more sources
The rapid expansion of drones otherwise known as Unmanned Aerial Vehicles (UAVs), in critical sectors has increased their exposure to cyber threats such as GPS spoofing, command hijacking, and firmware tampering.
Usman Mistura Mohammed +10 more
doaj +1 more source
Actual situation of computer crime in the credit and financial sphere of Ukraine (modern aspects) [PDF]
The purpose of the article is to study computer crimes in the credit and financial sphere based on elements of forensic characteristics of crimes and analysis of the ways of their commission. The relevance of the study is due to the rapid increase in the
Olena Kofanova +4 more
doaj +1 more source

