Legal aspects of fighting cyber crime in the European Union [PDF]
The development of information technologies and the Internet and the commission of criminal acts in this new environment leads to the emergence of transnational, high-tech crime.
Bjelica-Vlajić Iris +2 more
doaj
SPECIFIC PROBLEMS UNDER INVESTIGATION FOR CYBERCRIMES
The manuscript examines the specify problems when investigating cybercrime. Emphasis is placed on the problem of communication with anonymity, tracing back, attribution, non-discretion in digital evidence, as well as with differences in the legislation to separate the problem, to investigate cyber crimes.
openaire +1 more source
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation
One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging ...
Afroz, Sadia +7 more
core +1 more source
The application and effectiveness of Hex editor Forensic in investigating cybercrime
Information Technology usage and development has improved the efficiency and the flexibility of service provision among a number of institutions. While the process of computerization is taking place at a very high speed, the security surrounding the ...
Bandr Siraj Fakiha
doaj
National plan to combat cybercrime [PDF]
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging
core
FIGHTING THE CLASSICAL CRIME-SCENE ASSUMPTIONS. CRITICAL ASPECTS IN ESTABLISHING THE CRIME-SCENE PERIMETER IN COMPUTER-BASED EVIDENCE CASES [PDF]
Physical-world forensic investigation has the luxury of being tied to the sciences governing the investigated space, hence some assumptions can be made with some degree of certainty when investigating a crime.
Cristina DRIGĂ, Svetlana PURICI
doaj
Bitcoin Users Deanonimization Methods
Bitcoin is the most popular cryptocurrency on the planet. It relies on strong cryptography and peer-to-peer network. Bitcoin is gaining more and more popularity in criminal society.
S. M. Avdoshin, A. V. Lazarenko
doaj +1 more source
CDBFIP: Common Database Forensic Investigation Processes for Internet of Things
Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment.
Arafat Al-Dhaqm +6 more
doaj +1 more source
U.S./European Summit on Missing & Exploited Children [PDF]
In October 2005, representatives from 20 countries, the United Nations, European-Union institutions, and the Council of Europe participated in the first-ever U.S./European Summit on Missing and Exploited Children.
core
Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core

