Results 61 to 70 of about 20,944 (204)

Legal aspects of fighting cyber crime in the European Union [PDF]

open access: yesOditor, 2023
The development of information technologies and the Internet and the commission of criminal acts in this new environment leads to the emergence of transnational, high-tech crime.
Bjelica-Vlajić Iris   +2 more
doaj  

SPECIFIC PROBLEMS UNDER INVESTIGATION FOR CYBERCRIMES

open access: yesEDUCATION, SCIENCE AND DIGITAL INNOVATIONS - SINERGY FOR PROFESSIONAL WAY 2021 Round table proceedings, 2022
The manuscript examines the specify problems when investigating cybercrime. Emphasis is placed on the problem of communication with anonymity, tracing back, attribution, non-discretion in digital evidence, as well as with differences in the legislation to separate the problem, to investigate cyber crimes.
openaire   +1 more source

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation

open access: yes, 2017
One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging ...
Afroz, Sadia   +7 more
core   +1 more source

The application and effectiveness of Hex editor Forensic in investigating cybercrime

open access: yesSocial Medicine, 2023
Information Technology usage and development has improved the efficiency and the flexibility of service provision among a number of institutions. While the process of computerization is taking place at a very high speed, the security surrounding the ...
Bandr Siraj Fakiha
doaj  

National plan to combat cybercrime [PDF]

open access: yes
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging

core  

FIGHTING THE CLASSICAL CRIME-SCENE ASSUMPTIONS. CRITICAL ASPECTS IN ESTABLISHING THE CRIME-SCENE PERIMETER IN COMPUTER-BASED EVIDENCE CASES [PDF]

open access: yesChallenges of the Knowledge Society, 2016
Physical-world forensic investigation has the luxury of being tied to the sciences governing the investigated space, hence some assumptions can be made with some degree of certainty when investigating a crime.
Cristina DRIGĂ, Svetlana PURICI
doaj  

Bitcoin Users Deanonimization Methods

open access: yesТруды Института системного программирования РАН, 2018
Bitcoin is the most popular cryptocurrency on the planet. It relies on strong cryptography and peer-to-peer network. Bitcoin is gaining more and more popularity in criminal society.
S. M. Avdoshin, A. V. Lazarenko
doaj   +1 more source

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things

open access: yesIEEE Access, 2017
Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment.
Arafat Al-Dhaqm   +6 more
doaj   +1 more source

U.S./European Summit on Missing & Exploited Children [PDF]

open access: yes, 2007
In October 2005, representatives from 20 countries, the United Nations, European-Union institutions, and the Council of Europe participated in the first-ever U.S./European Summit on Missing and Exploited Children.

core  

Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]

open access: yes, 2020
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core  

Home - About - Disclaimer - Privacy