Spelling suggestions: "subject:"computer crimes."" "subject:"coomputer crimes.""
101 |
The psychological effects experienced by computer forensic examiners working with child pornographyWhelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
|
102 |
Criminal liability of Internet providers in Germany and other jurisdictionsFunk, Antje Elisabeth Margarete 12 1900 (has links)
Thesis (LLM)--Stellenbosch University, 2004 / ENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The
focus is on Germany, but the analysis is put in a wider, comparative context.
This is done with reference to South Africa, as well as Europe and the
American system. This thesis demonstrates and discusses the existing legal
norms to regulate Internet provider liability for illegal content on the Internet
and the international efforts to deal with this issue. In the introduction it is
shown how the Internet has given rise to a new form of global communication
and the accompanying legal problems. This is followed by an examination of
the different functions Internet providers have.
A survey of some of the important crimes affecting the Internet and also
some Internet-specific offences put the more general issue of liability in a
more specific context. Traditional and new forms of crimes are discussed.
This section is followed by an analysis of Internet provider liability under
German criminal law and Germany's Teleservices Act. From an international
criminal law perspective some international instruments, like the Cybercrime
Convention of the Council of Europe, is discussed. National legislation,
especially in the context of the European Union, must always be put in the
proper regional and international context.
The thesis concludes with some thoughts on alternative, or perhaps
complementary, methods to fight illegal and criminal conduct on the Internet.
This is done not as a critique of the responses to Internet crime, but rather to
strengthen the many hands trying to reduce Internet crime. / AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers.
Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende
konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA.
Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet
diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige
inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter
inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van
globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur
'n ondersoek na die verskillende funksies van Internet verskaffers.
'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer
algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van
misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet
diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die
terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale
instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek.
Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die
relevante regionale en internasionale konteks geplaas.
Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik
komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word
as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle
rolspelers in die stryd teen Internet misdaad se hande te sterk.
|
103 |
電腦犯罪若干問題研究 =Research into the some question of computer crime / Research into the some question of computer crime劉漢傑 January 2016 (has links)
University of Macau / Faculty of Law
|
104 |
Procedures for searching evidence in the investigation of computer-related crime in Bulawayo, ZimbabweNcube, Njabulo 11 1900 (has links)
Text in English / The continued advancement in myriad technological, societal and legal issues has affected the investigation of computer aided crimes. The investigators are confronted with tremendous impediments as the computer aided and traditional crime scenes differ. The study sought to analyse the procedures for searching evidence in the investigation of computer-related crime with the intention to improve admissibility of such evidence.
The researcher employed empirical design to reach conclusions based upon evidence collected from observations and real life experiences. This aided the researcher to obtain information through face-to-face interviews. The study was qualitative in approach as it consisted of a set of interpretive and material practices that make the real social world visible.
The training curriculum for investigators should include aspects of computer-related crime investigation, search and seizure of computer evidence. Search and collection of computer-related evidence should be done preferably by qualified forensic experts, so that evidence is accepted in court. / Police Practice / M. Tech. (Forensic Investigation)
|
105 |
The psychological effects experienced by computer forensic examiners working with child pornographyWhelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
|
106 |
Methodology and Model to Establish Cybersecurity for National Security in Africa using South Africa as a Case StudyVan Vuuren, Johanna Christina Jansen 05 1900 (has links)
PhD (Business Management) / Department of Business Management / See the attached abstract below
|
107 |
A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.Mohapi, Matrinta Josephine 06 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services.
This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutions‘ networks.
The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.
|
108 |
An analysis of disc carving techniquesMikus, Nicholas A. 03 1900 (has links)
Approved for public release, distribution is unlimited / Disc carving is an essential element of computer forensic analysis. However the high cost of commercial solutions coupled with the lack of availability of open source tools to perform disc analysis has become a hindrance to those performing analysis on UNIX computers. In addition even expensive commercial products offer only a fairly limited ability to "carve" for various files. In this thesis, an open source tool known as Foremost is modified in such a way as to address the need for such a carving tool in a UNIX environment. An implementation of various heuristics for recognizing file formats will be demonstrated as well as the ability to provide some file system specific support. As a result of these implementations a revision of Foremost will be provided that will be made available as an open source tool to aid analysts in their forensic investigations. / Civilian, Federal Cyber Corps
|
109 |
Liforac - A Model For Life Forensic Acquisition11 October 2010 (has links)
D.Phil.
|
110 |
暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime / Research on criminal law of dark network crime孫陸陽 January 2018 (has links)
University of Macau / Faculty of Law
|
Page generated in 0.0839 seconds