Spelling suggestions: "subject:"cybercrime."" "subject:"cybercrimes.""
111 |
La justice pénale face à la cybercriminalité / The criminal justice in the face of the cybercrimeSkaf, Faten 13 October 2017 (has links)
La justice pénale est aujourd’hui confrontée au numérique et le développement des données dématérialisées, dont la valeur patrimoniale ne cesse de s’accroître, lui pose des défis de nature idéologique, sociologique, économique, géopolitique et, bien évidemment juridique. Elle doit faire face à la cybercriminalité qui se joue du temps, de l’espace et des législations puisque les actes illicites se déroulent désormais dans le cyberespace. Mais, pour que le système de justice pénale puisse contribuer efficacement à la lutte contre la cybercriminalité, les États doivent pouvoir s’appuyer sur un ensemble de règles juridiques contre cette criminalité et des systèmes de justice pénale qui fonctionnent correctement, doivent avoir les capacités nécessaires pour démêler les affaires pénales qui peuvent être complexes et coopérer à la répression de la cybercriminalité au plan international / Nowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
|
112 |
L'exercice des droits et libertés fondamentaux sur l'Internet / The exercise of the fundamental rights and freedom on the internetQuilton, Arnaud 18 July 2014 (has links)
La pratique et les usages issus du cyberespace démontrent que l'imbrication entre ces deux sujets d'étude - l'internet d'une part et les droits fondamentaux d'autre part - est permanente : par sa nature transcendantale, le réseau des réseaux irradie tous les corps de la société et donc, directement ou indirectement, tous les droits et libertés fondamentaux, qu'ils soient politiques, économiques ou sociaux. Partant de ce postulat, il s'agit de déterminer le plus objectivement et précisément possible si l'internet impacte positivement ou négativement ce corpus de droits dits « suprêmes » : accroît-il leur protection et leur rayonnement ou, au contraire, participe-t-il à leur érosion, mettant ainsi en exergue une éventuelle incompatibilité d'un droit théorique confronté à une réalité dématérialisée ? La réponse à cette problématique, reposant largement sur une analyse scientifique quantitative, permettra d'établir qu'une majorité de droits et libertés fondamentaux est encensée voire sublimée par le net ; dans le même temps, une minorité de droits et libertés, jugés essentiels au sein de la hiérarchie des droits fondamentaux, pâtissent de cette rencontre. De facto, l'ambivalence de ce constat amènera naturellement à s'interroger sur l'opportunité pour la théorie des droits fondamentaux d'influer, par des principes en adéquation avec la nature technique du net, sur la construction et la pérennisation du cadre juridique d'un internet difficilement appréhendable par les branches « classiques » du droit. / The practice and customs from cyberspace demonstrates that the overlap between these two topics of study - internet on one hand and human rights on the other part - is permanent : by its very transcendental nature, the network of networks irradiates all the bodies of the society and therefore either directly or indirectly, all the basics Rights and Freedom, be they political, economic or social.Based on this premise, one has to identify with the most objective and accurate manner if the internet has a positive or negative impact on this body of law called « highest » : does that increases its protection and influence or, on the contrary, contributes to erosion, thus emphasizing the possible incompatibility of a theoretical right faced to a dematerialized reality? The answer to this problem, relying largely on a quantitative scientific analysis will establish that a majority of Fundamental Rights and Freedom is praised and even sublimated by the net ; at the same time, a minority of rights and freedoms, deemed to be essential within the hierarchy of basic rights, suffer from this meeting. De facto, the ambivalence of this finding will naturally lead to wonder whether it is appropriate that the theory of fundamental rights can affect, through principles in line with the technical nature of the net, the construction and sustainability of the legal framework of an internet hardly apprehandable within the « traditional » branches of the of law.
|
113 |
Příležitost dělá zloděje: zkoumání praktického využití teorie příležitosti k trestné činnosti / The opportunity makes the thief: exploration of the practical using of the crime opportunity theoryZahradníčková, Kristýna January 2018 (has links)
The opportunity theory for crime is composed of three partial concepts. The first concept is the routine activity theory that works with a potential offender, a suitable target and a capable guardian. The opportunity for crime occurs in the moment when the offender faces the target while guardians are absent. The second concept, the rational choice perspective, is based on the idea that the offender considers benefit and risk stemming from the crime. The third concept is the crime pattern theory that focuses on the importance of time and space. This master thesis focuses on the usability of the opportunity theory for crime in the context of our current society. Although the opportunity theory for crime is nearly forty years old, this work shows that it is also applicable on cybercrime since some of the "classical" crimes moved from physical space to cyberspace. The potential offender and suitable target exist and behave similarly in cyberspace and in physical space. The difference between the two worlds is notable for the capable guardian, who does not occur randomly in the cyberspace but is embodied in the form of ever-present protection. The opportunity theory also claims that the opportunities are highly specific, they play role in causing all crime, they are influenced by technological...
|
114 |
Bezpečnost práce s elektronickými daty v průmyslových podnicích / Security of Work with Electronic Data in Industrial EnterprisesŽáčková, Eliška January 2013 (has links)
The aim of this thesis is not only to characterise the key terms related to this field, but also to analyse the possible solutions to the area in a particular industrial enterprise in the Czech Republic by means of a case study which is a reliable method of qualitative research. The thesis is divided into theoretical and practical part. In the theoretical part the terms such as information, electronic data, know-how, enterprise information systems, cybercrime, and cyberterrorism are defined. The practical part drawing on the theoretical part gives a thorough analysis of the initial state of an industrial enterprise in food industry. Furthermore, it deals with the implementation of the ECM (Enterprise Content Management) which is considered a possible solution to the security of work with electronic data in industrial enterprise.
|
115 |
L'ingénierie sociale : la prise en compte du facteur humain dans la cybercriminalité / Social engineering : the importance of the human factor in cybercrimeGross, Denise 08 July 2019 (has links)
La révolution numérique a favorisé l’apparition d’une nouvelle forme de criminalité : la cybercriminalité. Celle-ci recouvre un grand nombre de faits dont la plupart sont commis à l’aide de stratégies d’ingénierie sociale. Il s’agit d’un vieux phénomène, pourtant mal connu qui, encouragé par l’accroissement de données circulant sur Internet et par le développement de barrières techniques de sécurité, s’est adapté aux caractéristiques de l’univers virtuel pour une exploitation combinée des vulnérabilités « humaines » avec des outils numériques. L’ingénierie sociale transforme les utilisateurs qui deviennent, inconsciemment, facilitateurs des cyberattaques, au point d’être perçus comme le « maillon faible » de la cybersécurité. Les particuliers, les entreprises et les Etats sont tous confrontés au défi de trouver une réponse à ces atteintes. Cependant, les moyens juridiques, techniques, économiques et culturels mis en place semblent encore insuffisants. Loin d’être éradiquée, l’utilisation de l’ingénierie sociale à des fins illicites poursuit son essor. Face au manque d’efficacité de la politique criminelle actuelle, le travail en amont nous apparaît comme une piste à explorer. Savoir anticiper, détecter précocement et réagir promptement face à la délinquance informatique sont alors des questions prioritaires nécessitant une approche plus humaniste, axée sur la prévention et la coopération. Si nous sommes d’accord sur ce qu’il reste à faire, le défi est de trouver le« comment ». / The digital revolution has encouraged the emergence of a new type of criminal activity : cyber-crime. This includes a vast array of activities and offences that often use social engineering techniques. These techniques are old and not widely understood, yet benefit from the increase of data available online and the use of firewalls and other security systems. They have been adapted to work with the Internet and digital technologies in order to exploit the “vulnerabilities” of human psychology. Social engineering targets the user, who often unconsciously, allows access to systems or data, making the user the weakest link in the cyber-security chain. Individuals, companies and governments are all facing the same challenge in trying to solve these issues, utilising current legal, financial, technological and social resources which seem to be insufficient. Far from being eradicated, fraudulent activities that use social engineering continue to increase in prevalence. The inefficiency of current judicial polices forces us to consider alternative strategies upstream. Being proactive, predicting early and reacting quickly to computer related crimes should be the priority of a more humanistic approach which is focused on prevention and cooperation. Although one can agree on the approach ; the challenge is to find out how to implement it.
|
116 |
The Challenges Facing Law Enforcement In Live-Streamed Child Sexual Abuse CasesDaniel Dale Spencer III (16642371) 07 August 2023 (has links)
<p>The live streaming of child sexual abuse is a serious problem that demands urgent attention from law enforcement, legislature, and the platforms that it occurs on. While child sexual exploitation and abuse crimes have been occurring for decades, the growing number of internet users combined with the recent Covid-19 outbreak has shifted a lot of these crimes online. Crimes that occur over live streams are particularly difficult to investigate. Previous research has highlighted four main types of challenges associated with these types of cases: legislative, social, technical, and investigative. While studies have been conducted that explored these challenges individually, this study fills a research gap by exploring which of these challenges affect law enforcement personnel that work live-streamed child sexual abuse cases post-Covid-19. For this study, an anonymous online survey was sent out to law enforcement individuals and agencies nationwide. The survey was actively distributed for one month. Out of the 29 responses received, 13 participants qualified to take the survey and were asked about the challenges they faced working these types of cases and about any solutions to these challenges. After collecting the data, descriptive statistics identified the challenges, and a thematic analysis was conducted. Following a grounded theory process, the analysis identified five main themes that encompassed multiple types of challenges and solutions. These themes were: a lack of consensus, education, the role of application service providers and platforms, a need for better technology, and out-of-jurisdiction challenges. These themes explored in-depth the participants’ responses and further identified the challenges facing law enforcement that work live-streamed child sexual abuse cases, as well as any current solutions to these challenges. Two main challenges frequently mentioned by the participants were end-to-end encryption and anonymizing services, and one of the main solutions to many of the challenges was the education of parents, children, and legislators. For future research, the author recommends exploration of the following topics: the investigation of the factors that play strong roles in determining the time it takes to investigate live-streamed child sexual abuse cases, research related to how AI could assist law enforcement working these cases, further exploration of a framework for the education of parents and children about social media usage and the risks of live streaming, how social platforms can be used in many ways, and research that examines how often law enforcement encounters live-streamed child sexual abuse cases/whether these cases are common or not. </p>
|
117 |
由社會法律理論的發展探討校園網路規範-從功能結構理論出發陳蕾琪 Unknown Date (has links)
二十一世紀是個資訊快速傳遞與蓬勃發展的世紀,在網際網路的推波助瀾下,使人類在資訊的掌握與應用上更為便利與快速。舉凡資料檢索、電子商務、視訊會議、大眾傳播、線上遊戲、電子化政府,無不受到資訊社會深刻的影響;但在另一方面,網際網路也成了各種犯罪行為的溫床,諸如網路垃圾郵件、網路色情、網路智慧財產、資訊隱私權、駭客入侵、網路咖啡店的不當經營等等,不但影響現實社會秩序,更直接衝擊資訊社會未來的發展。
因此,層出不窮的網路問題使法律的立法與執行成了關注的焦點,這可以從近幾年的法律修正即可窺之,例如著作權法以及刑法的針對網際網路而做的相關修正,但是這些法律真能遏止這些行為的成長趨勢嗎?我們從歷年的司法案件調查中,可以發現答案是否定的。換句話說,法律並未如預期般的發揮它的功能,而且似乎也無法單獨依靠法律來解決所有問題,那麼是不是有其他諸如教育或是科技工具的應用可以配合呢?因此,本研究將把焦點集中在校園網路,來探索校園學術網路規範實際狀況,並且從法律社會學的理論做為研究路徑,探討目前校園資訊教育落實的情況,這樣的探討包括從法律社會學的視角,以及從現實社會實際狀況的觀察;並進一步反思校園學術網路規範產生現實與理想的落差因素。最後則提出其他面向的思考,做為未來校園資訊教育實施的建議,依序說明如後:
第一章 緒論
就本文之研究背景、動機與目的與研究方法加以說明。
第二章 校園網路規範相關研究
分別就目前網路法律教育、校園學術網路之管理、網路犯罪現況以及法律規範實行狀況加以分析。
第三章 校園網路規範之相關問題—從法律社會學的功能結構理論來觀察
首先說明法律社會學理論的研究主軸,並且就傳統法學研究與法律社會學研究、法律社會學派與其他法學派加以比較;其後介紹法律社會學理論的歷史脈絡,以此開始觀察功能結構理論。透過結構面、功能面以及法律功能的理解,進一步省思功能結構理論在個人價值觀以及法律文化的觀察。
第四章 從法律文化觀察校園學術網路規範
透過對功能結構理論的理解以及反思,本章從個人主觀利益的考量以及法律文化的角度來觀察校園網路環境。亦即從個人對法律主觀的需求來了解法律的目的,並且透過對歷史發展上法律文化的理解,近一步推展至網路時代的法律文化,並且延伸至校園網路的法律文化;其後並觀察校園網路社會默許的規則,以及提出社會學上新治理觀與對話機制的建立,透過對話溝通以及批判思考理論的應用,除了能夠帶動所有參與者間互動反思的機會,還能有效解決糾紛。
第五章 結論
綜合本文之研究心得,指出現行網路規範缺乏對個人主觀利益的衡量,以及校園學術網路法律文化的觀察,使得規範所能發揮的空間有限。在另一方面,透過對站規或版規的形成,以及網路所塑造出的複數主體交錯環境,產生一種新的自我驅動、自我維生的機制,反而能夠務實地解決彼此的問題。除此之外,透過一來一往的溝通對話,進而使得學生自己培養理性的思辯能力。因為透過參與者的意見交流,除了引發主體的自我省覺之外,更能據此建立一個全新的思考方向。在這樣一個「解構」與「建構」的過程,學生的批判思考、教師的批判思考、校方的批判思考都將引發出來,並透過「公開討論」的方式,充分展現交流的目的,使得規範得以發揮整合的功能,期能供立法省思及校園實務之參考。
|
118 |
網路恐怖主義與美國防治政策 / Cyberterrorism and the U.S. Prevention Policies黃書賢, Huang, Shu Hsien Unknown Date (has links)
網路恐怖主義(Cyberterrorism)為「網際網路」(Internet)與「恐怖主義」(terrorism)相互結合之產物,指恐怖份子為求引發嚴重破壞,並造成平民死傷,透過網際網路入侵國家關鍵基礎設施(critical infrastructures),並以之要脅政府或人民完成其政治性、宗教性或社會性目標。至2012年7月為止,對於網路恐怖主義相關議題之討論雖已持續約30年之久,然而各界對於網路恐怖主義之「定義」及「威脅性」兩項基本問題,仍然眾說紛紜,無法取得一致共識,而全球各地缺乏網路恐怖攻擊之實際案例之情況,亦使爭辯益加激烈。
在美國政府方面,經過2001年911事件的重大衝擊,其對於恐怖主義相關議題之敏感程度已大幅提高,並陸續制定多項反恐政策。美國是當前國際反恐行動的領導者,既為軍事與科技大國,同時也是諸多國際恐怖組織策劃攻擊之主要目標,有鑑於此,美國政府致力於防治網路恐怖主義,保護國內關鍵基礎設施不受侵襲,以維持社會安定及國家安全,其因應方式足以成為世界各國制定類似政策之重要參考對象。
本論文經由探討網路恐怖主義之基本意涵,比較「網路恐怖主義」、「網路犯罪」及「網路戰爭」三個概念之間的差異,嘗試針對網路恐怖主義形成明確之界定;接著綜整各界針對網路恐怖主義威脅性之爭論,以了解網路恐怖主義之真實威脅程度;最後觀察美國自柯林頓(Clinton)政府至今,有關防治網路恐怖主義政策之一系列發展、美國政府如何評估網路恐怖主義之威脅,以及在當前的政策架構之下,為保護國內關鍵基礎設施,其相對應之具體措施為何,試圖對於其整體政策建立客觀評價。 / Cyberterrorism, the convergence of “Internet” and “terrorism,” refers to the specific terrorist activities that were intended to cause massive destruction and casualties, proceeded by intruding the supervisory control and data acquisition (SCADA) systems of national critical infrastructures via the Internet. Even though the discussion of the related issues of Cyberterrorism has continued for nearly 30 years now, neither the definition nor the evaluation of potential threat concerning Cyberterrorism has been settled. No consensus has been achieved. Furthermore, the lack of actual cases of Cyberterrorism attack around the world makes the debates even more intense.
After the significant impact of September 11, 2001, the U.S. government has substantially raised the degree of sensitivity of the issues related to terrorism and developed a number of counter-terrorism policies. As the leader of the Global War on Terror and the greatest Power in the world, the U.S. is also the main target of many terrorist groups. With its military and scientific capabilities, the practices of the U.S. government on preventing Cyberterrorism, protecting its domestic critical infrastructures from intrusion, and maintaining social stability and national security would be excellent examples to other nations for the development of their own policies.
To clarify the explicit definition of Cyberterrorism, this research refined the basic meaning of Cyberterrorism and distinguished differences among three related concepts: Cyberterrorism, Cybercrime, and Cyberwar. Moreover, this research sought to induct major arguments brought up by scholars in many intense debates on the extent of Cyberterrorism threat. Last but not least, by observing development of the U.S. related policy frameworks, how the U.S. government evaluates the extent of Cyberterrorism threat, and the corresponding measures for protecting the U.S. domestic critical infrastructures, this research presented an objective assessment on the U.S. overall counter-Cyberterrorism policies.
|
119 |
A historical-legal analysis of search and seizure of electronic records for the prosecution of financial crimes in South AfricaPoyo, Unathi 30 September 2020 (has links)
Crime has been around since the beginning of time. In an evolving society, and the methodology of crime also changes. The methodology of combating and preventing crime should aim to match the speed at which crime occurs. Criminal procedure deals with the powers of the police to investigate crimes.1 The Criminal Procedure Act 51 of 1977 (CPA) contains the principles of search and seizure in chapter 2. The promulgation of the CPA was during a period where the computer was a new phenomenon. At this time, it was inconceivable that technology would ever advance and become so ubiquitous, to the point that technology would infiltrate every aspect of our lives, and laws. There has since been many developments in our law, especially a new Constitutional dispensation.2 There have been developments and technological advancements that have had a direct and indirect bearing on the CPA. People use technology to communicate, transact, and unfortunately, to commit crime. These developments require there to be amendments in the CPA. There has been no specific amendments relating to search and seizure which are of significance in addressing technological advances. It is recommended that the amendments to the CPA include definitions and guidelines for procedural aspects of collection of electronic evidence. / Criminal and Procedural Law / LL. M. (Criminal and Procedural Law)
|
120 |
Determination of system and processes employed by the property industry to manage information ethics in Gauteng South AfricaMoropane, Itumeleng Vanessa 10 1900 (has links)
The South African property sector is characterised by property practitioner firms
that fail to comply with the Estate Agency Affairs Board (EAAB) code of conduct
and firms having inefficient systems which are unable to combat hacking and
cybercrime in the sector. Although property practitioner firms have systems and
processes in place, there are still instances of unethical behaviour. Failure to
prevent client personal information from being leaked is still a major problem in
the sector, this issue can be addressed by demonstrating due diligence with
respect to safeguarding sensitive information. The accuracy of information is also
a problem in the sector and requires firms to resort to analysing collected data
before capturing it, in order to maintain accuracy. The sector encounter illegal
access to systems including breaking the password protected websites and
password protection on a computer system.
The objectives for this study were to investigate the extent to which firms enforce
Information Ethics (IE), explore the systems and processes put in place by firms
to enforce IE and to explore the challenges experienced by the firms in the
Gauteng province when enforcing IE. The study was qualitative in nature and indepth interviews were conducted to gather information from five managers and
five employees within the firm situated in Gauteng province.
The study found that these property practitioner firms enforce IE to a certain
extent. These firms use (22) systems and processes to enforce IE and
experienced (5) challenges during the enforcement of IE. The study concludes
that these property practitioner firms enforce IE using different systems and
processes and experience challenges during enforcement. The list of IE
enforcement systems and processes and challenges identified in this study will
assist policy makers in compiling IE policies. The findings will also assist firms in
IE enforcement and reduction of IE enforcement challenges. / Business Management / M. Com. (Business Management)
|
Page generated in 0.0501 seconds