Listing 1 - 10 of 329 | << page >> |
Sort by
|
Choose an application
Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Computer security --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
This year s international conference focuses on the five themes of Privacy, Security, Forensic, Trust, and e Crime.
Computer security --- Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Computer security --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Computer crimes --- Investigation --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.
Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
This book explains Europol’s online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate. Since the global financial crisis, online sharing economy platforms have made a significant impact on use of under-utilized resources. People who have a car (Uber) or a spare room (Airbnb) began to share their under-used assets with others for extra income. The success achieved by these online platforms that enable efficient use of limited resources raised a new discussion on whether a similar governance model can be implemented by public administrations where public resources are insufficient. Cybercrime is one of these fields where most law enforcement agencies have not got enough resources to tackle these crimes. They need the human and technical resources of the private sector for a safer society. This book, for the first time, seeks the answers to this question. It examines the feasibility of online sharing economy platforms to enhance public-private partnerships to tackle cybercrime. The European Union Policing Agency, Europol, is the first police organization to adopt a similar model to interact with policing agencies and private industry. Drawing on extensive research, the book offers crucial insights for policymakers, researchers, and the public interested in new trends in sharing economy, innovative governance models, public-private partnerships, and cybercrime investigations.
Computer crimes. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Computer crimes --- Computers --- Access control --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computer crimes. --- Access control. --- Computer security
Choose an application
Computer crimes. --- Criminalité informatique --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Criminalité informatique
Listing 1 - 10 of 329 | << page >> |
Sort by
|