Spelling suggestions: "subject:"cyber crime"" "subject:"cyber prime""
1 |
Cyber-Crime Fear and Victimization: An Analysis of a National SurveyAl-Shalan, Abdullah 13 May 2006 (has links)
The aim of this study was to investigate cyber-crime victimization among Internet users in the United States by: 1) assessing the factors that impact computer virus victimization; 2) assessing the factors that impact cyber-crime victimization; and 3) predicting fear of cyber-crime. Two domains in criminology were applied to the study of cyber-crime phenomenon: routine activity theory, and the fear of crime literature. Three independent models were developed to predict computer virus victimization, cyber-crime victimization, and fear of cyber-crime. Measures of routine activity theory applied to cyber-crime victimization include risk exposure, and suitable targets were created. A more reliable measure of fear of cyber-crime was created, and a measure of perceived seriousness of cyber-crime was created. The 2004 National Cyber Crime Victimization Survey dataset was used in this project. Logistic Regression and OLS Regression were utilized to predict computer virus victimization, cyber-crime victimization, and fear of cyber-crime.The findings of this study indicate that routine activity theory was a powerful predictor of computer virus victimization and cyber-crime victimization. That is, risk exposure and suitable targets helped determine the victimization. The study also found that cyber-crime victimization, gender, and perceived seriousness were predictive of fear of cyber-crime. Discussion of the findings and theoretical and policy implications were offered.
|
2 |
INFLUENCE OF ONLINE ROUTINE ACTIVITIES ON ONLINE PURCHASE FRAUD VICTIMIZATION : AN ANALYSIS OF THE SPECIAL EUROBAROMETER SURVEY 2018Deyhle, Eileen January 2022 (has links)
This paper uses Routine Activity Theory to examine online routine activities and individual level guardianship and the impact on online purchase fraud victimization across Europe. The findings suggest differences between the EU member states in online purchase fraud victimization. Moreover, it discovers that several online routine activities rise the victimization rate. However individual level guardianship has no great success in reducing victimization rates.
|
3 |
Digital forensics : an integrated approach for the investigation of cyber/computer related crimesHewling, Moniphia Orlease January 2013 (has links)
Digital forensics has become a predominant field in recent times and courts have had to deal with an influx of related cases over the past decade. As computer/cyber related criminal attacks become more predominant in today’s technologically driven society the need for and use of, digital evidence in courts has increased. There is the urgent need to hold perpetrators of such crimes accountable and successfully prosecuting them. The process used to acquire this digital evidence (to be used in cases in courts) is digital forensics. The procedures currently used in the digital forensic process were developed focusing on particular areas of the digital evidence acquisition process. This has resulted in very little regard being made for the core components of the digital forensics field, for example the legal and ethical along with other integral aspects of investigations as a whole. These core facets are important for a number of reasons including the fact that other forensic sciences have included them, and to survive as a true forensics discipline digital forensics must ensure that they are accounted for. This is because, digital forensics like other forensics disciplines must ensure that the evidence (digital evidence) produced from the process is able to withstand the rigors of a courtroom. Digital forensics is a new and developing field still in its infancy when compared to traditional forensics fields such as botany or anthropology. Over the years development in the field has been tool centered, being driven by commercial developers of the tools used in the digital investigative process. This, along with having no set standards to guide digital forensics practitioners operating in the field has led to issues regarding the reliability, verifiability and consistency of digital evidence when presented in court cases. Additionally some developers have neglected the fact that the mere mention of the word forensics suggests courts of law, and thus legal practitioners will be intimately involved. Such omissions have resulted in the digital evidence being acquired for use in various investigations facing major challenges when presented in a number of cases. Mitigation of such issues is possible with the development of a standard set of methodologies flexible enough to accommodate the intricacies of all fields to be considered when dealing with digital evidence. This thesis addresses issues regarding digital forensics frameworks, methods, methodologies and standards for acquiring digital evidence using the grounded theory approach. Data was gathered using literature surveys, questionnaires and interviews electronically. Collecting data using electronic means proved useful when there is need to collect data from different jurisdictions worldwide. Initial surveys indicated that there were no existing standards in place and that the terms models/frameworks and methodologies were used interchangeably to refer to methodologies. A framework and methodology have been developed to address the identified issues and represent the major contribution of this research. The dissertation outlines solutions to the identified issues and presents the 2IR Framework of standards which governs the 2IR Methodology supported by a mobile application and a curriculum of studies. These designs were developed using an integrated approach incorporating all four core facets of the digital forensics field. This research lays the foundation for a single integrated approach to digital forensics and can be further developed to ensure the robustness of process and procedures used by digital forensics practitioners worldwide.
|
4 |
Criminal Justice Responses to Emerging Computer Crime ProblemsSen, Osman N. 08 1900 (has links)
This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
|
5 |
Investigation of Computer CrimesErdonmez, Erhan 08 1900 (has links)
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
|
6 |
Anti-cyberlaundering regulation and controlLeslie, Daniel A. January 2010 (has links)
Magister Legum - LLM / This paper is inspired by the ills borne out of the internet. The internet has become a modern day tool for criminals seeking to conceal the proceeds derived from their crime, hence the problematic notion of cyberlaundering. This paper journeys through the world of cyberlaundering by looking into the structure of the crime in great depth. It explores various possibilities, and tries to hatch out viable solutions to the dilemma. / South Africa
|
7 |
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.Ozeren, Suleyman 08 1900 (has links)
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
|
8 |
“Now You See It. Now You Don't”- How Cryptocurrencies Enable Money LaunderingGonçalves, Maria January 2019 (has links)
Money laundering is a non-violent crime, however when successfully executed it has a negative impact on society, as it tends to support other illicit activities, including terrorism. As was the case for other financial crimes, the internet opened the door for new tools that enable criminals to launder their illicit profits. One of these tools is cryptocurrency.This paper takes the form of a literature review, in order to find the most relevant and important work within the research topic, and to identify central issues associated with laundering money through cryptocurrencies. It aims to explain the crypto-laundering process, methods and features that make cryptocurrencies tempting to criminals when searching tools to launder their illicit profits.The findings of this literature review demonstrate that cryptocurrencies have more characteristics that appeal to launderers than deters them. The results also show the existence of different methods that are employed in crypto-laundering and how it mirrors traditional money laundering stages, making evident that crypto-laundering is a real threat. Due to these results, it is essential that the criminological community delve into financial crimes perpetrated in the online environment.
|
9 |
Computer seizure as technique in forensic investigationNdara, Vuyani 19 March 2014 (has links)
The problem encountered by the researcher was that the South African Police Service Cyber-Crimes Unit is experiencing problems in seizing computer evidence. The following problems were identified by the researcher in practice: evidence is destroyed or lost because of mishandling by investigators; computer evidence is often not obtained or recognised, due to a lack of knowledge and skills on the part of investigators to properly seize computer evidence; difficulties to establish authenticity and initiate a chain of custody for the seized evidence; current training that is offered is unable to cover critical steps in the performance of seizing computer evidence; computer seizure as a technique requires specialised knowledge and continuous training, because the information technology industry is an ever-changing area.
An empirical research design, followed by a qualitative research approach, allowed the researcher to also obtain information from practice. A thorough literature study, complemented by interviews, was done to collect the required data for the research. Members of the South African Police Cyber-crime Unit and prosecutors dealing with cyber-crime cases were interviewed to obtain their input into, and experiences on, the topic.
The aim of the study was to explore the role of computers in the forensic investigation process, and to determine how computers can be seized without compromising evidence. The study therefore also aimed at creating an understanding and awareness about the slippery nature of computer evidence, and how it can find its way to the court of law without being compromised. The research has revealed that computer crime is different from common law or traditional crimes. It is complicated, and therefore only skilled and qualified forensic experts should be used to seize computer evidence, to ensure that the evidence is not compromised. Training of cyber-crime technicians has to be priority, in order to be successful in seizing computers. / Department of Criminology / M.Tech. (Forensic Investigation)
|
10 |
Computer seizure as technique in forensic investigationNdara, Vuyani 19 March 2014 (has links)
The problem encountered by the researcher was that the South African Police Service Cyber-Crimes Unit is experiencing problems in seizing computer evidence. The following problems were identified by the researcher in practice: evidence is destroyed or lost because of mishandling by investigators; computer evidence is often not obtained or recognised, due to a lack of knowledge and skills on the part of investigators to properly seize computer evidence; difficulties to establish authenticity and initiate a chain of custody for the seized evidence; current training that is offered is unable to cover critical steps in the performance of seizing computer evidence; computer seizure as a technique requires specialised knowledge and continuous training, because the information technology industry is an ever-changing area.
An empirical research design, followed by a qualitative research approach, allowed the researcher to also obtain information from practice. A thorough literature study, complemented by interviews, was done to collect the required data for the research. Members of the South African Police Cyber-crime Unit and prosecutors dealing with cyber-crime cases were interviewed to obtain their input into, and experiences on, the topic.
The aim of the study was to explore the role of computers in the forensic investigation process, and to determine how computers can be seized without compromising evidence. The study therefore also aimed at creating an understanding and awareness about the slippery nature of computer evidence, and how it can find its way to the court of law without being compromised. The research has revealed that computer crime is different from common law or traditional crimes. It is complicated, and therefore only skilled and qualified forensic experts should be used to seize computer evidence, to ensure that the evidence is not compromised. Training of cyber-crime technicians has to be priority, in order to be successful in seizing computers. / Department of Criminology / M.Tech. (Forensic Investigation)
|
Page generated in 0.0265 seconds