• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 35
  • 17
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 120
  • 22
  • 21
  • 20
  • 19
  • 17
  • 16
  • 16
  • 16
  • 15
  • 15
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Kyberzločin a global governance kyberprostoru / Cybercrime and global governance of cyberspace

Šorf, Alexandr January 2015 (has links)
The main theme of the work is global governance of cyberspace. The objective of the thesis is to assess the threat of cybercrime to global governance of cyberspace. The first chapter helps to create a theoretical framework for the thesis through definition of the main concepts. Second chapter analyzes cybercrime. The goal is to better understand cybercrime as a whole, its different types and its process. The content of the third chapter is an analysis of the history of cybercrime as well as the international law of cyberspace (as a key component of global governance). The fourth chapter goes over the current state of the international law governing cyberspace. After that in the fifth chapter the thesis looks into specific problems of global governance in general and also in the cybernetics. Previous findings are then combined in the last chapter. It contains recommendations for the development of cyberspace global governance. These recommendations are then applied into a few models of cyberspace governance.
82

La réussite criminelle des participants à la fraude financière en ligne

Guillot, Mathieu 09 1900 (has links)
Le carding est un phénomène cybercriminel de par lequel des cyberdélinquants (appelés carders) vont compromettre et utiliser frauduleusement des données financières et bancaires. De nombreuses entités privées ou publiques ont mis en évidence l'importance des pertes monétaires occasionnées par ce nouveau type de criminalité. D'un point de vu criminologique, peu de recherches académiques se sont penchées sur l'ampleur de ce phénomène et plus particulièrement sur la réussite criminelle des carders. Pour combler ce manque de connaissances, ce projet de recherche a pour objectif de comprendre la réussite criminelle des carders en observant l'impact de leurs caractéristiques personnelles et sociales sur leurs revenus criminels. Les différentes variables mobilisées relatent entre autres les activités marchandes ou encore les caractéristiques sociodémographiques des carders interrogés. Pour ce faire, un sondage en ligné, hébergé sur Tor, a été mené. Au total, 49 sondages complets ont été collectés pour être analysés. En s'attelant à décrire les caractéristiques personnelles et sociales des carders, ce travail a été en mesure de mettre à jour les connaissances préalablement acquises sur les carders et de répondre à des manques de consensus sur certains pans des activités de ces cyberdélinquants. L'ensemble des résultats révèlent que peu de carders affichent une réussite criminelle élevée et qu'une minorité d'entre eux gagnent de forts revenus. La réussite crimnelle des carders s'explique par le fait de disposer de compétences spécialisées, de bénéficier d'une bonne expérience, d'utiliser des forums de discussion en ligne ou encore d'occuper des rôles centraux sur les lieux de convergence virtuels. Outre le fait d'apporter des réponses quant à ces prédicteurs sur la réussite criminelle des carders, ce projet de recherche permet de constater les apports et les faiblesses de l'utilisation d'un sondage pour collecter des données dans une écosystème cybercriminel. / Carding is a criminal phenomenon which consists of compromising financial data in order to do fraudulent transactions. Several private and public parties highlighted the size of the loss caused by this new form of criminality. From the criminological angle, little research is available in the size and scope of the phenomenon, particularly on the criminal achievement of this kind of online offenders (called carders). To fill this gap, this research project is aimed at understand the criminal achievement of carders by observing the impact of their personal and social characteristics on their criminal income. Theses variables relate among others to their market activities or their sociodemographic. To do so, an online survey, hosted on Tor, was conducted. A total of 49 completed surveys were collected to do our analysis. By describing these personal and social characteristics, this work has been able to update our knowledge about carders and to address gaps about certain part of what we known about carding. Overall, the results shown that few carders can claim a good criminal achievement and that a minority of them can earn large amounts of money. Experience, speciliazed skills, the use of online forums or play the role of broker explained the criminal achievement among carders.Apart from the fact that our study brings some answers about those predictors, this project highlights the strengths and weaknesses of using an online survey to collect data from a criminal ecosystem.
83

Automatizovaná analýza a archivace dat z webu / Automated Web Analysis and Archivation

Kocman, Tomáš January 2019 (has links)
This thesis is focused on cybercrime, acquisition of evidence and development of a platform for retrieval, analysis and archiving web site data. The goal is to satisfy the investigators and security experts of the Czech police. The aim is to provide an open source platform that will be freely disseminable and in compliance with the requirements of legal institutions. The output of the thesis is two platform versions - full-fledged, fulfilling all the requirements set out in the diploma thesis and a light version for the police investigators of the Czech Republic.
84

Digital Vulnerability Awareness : In a “working from home” environment during COVID-19 / Medvetenhet om Digital Sårbarhet : I en “working from home” miljö under COVID-19

Jarlhem, Jonathan, Stigsson, Jakob January 2021 (has links)
Employees who have adapted to a "working from home" environment, due to the COVID-19 pandemic, rapidly face a lack of awareness regarding cybersecurity and cybercrimes. It is well established that the rate of employees hacked has increased dramatically due to the pandemic. This study aims to determine what has more impact on digital vulnerability awareness of cybersecurity and cybercrime. Specifically, it investigates from the perspectives of training and education, digital competence, being a victim, and how protection motivation plays a role in policy following. In this context, digital vulnerability is defined as the risk that individuals might put themselves into unknowingly through the lack of security when working from home, which leads to having incriminating information publicly disclosed and exploited by third parties. Digital competence refers to the extent of an individual's information technology skills. To test the hypothesis that training and education lead to higher digital vulnerability awareness, a set of interviews was conducted with various employees working from home from different industries, age groups, and countries. Furthermore, an online survey was distributed among online communities on Discord, Facebook and Instagram. The survey was meant to prove the points made by the participants of the interviews. The results showed a slight effect in the opposite direction than hypothesised: digital vulnerability awareness was associated with digital competence over training and education. These results suggest that employees who have higher digital competence are more likely to understand their digital vulnerability awareness, making it easier to identify cyber threats. On this basis, the concept of training and educating is not enough to prevent cybercrimes. To better prevent cybercrime, employees must be willing to learn and understand the threats and risks. / Medarbetare som har anpassat sig till en "working from home" miljö på grund av COVID-19 pandemin möter snabbt en bristande medvetenhet inom cybersäkerhet och cyberbrott. Det är väl etablerat att antalet medarbetare som blivit hackade har  kat drastiskt till följd av pandemin. Denna studien försöker forma förståelse om vad som har större inverkan på medvetenhet av digitalsårbarhet om cybersäkerhet och cyberbrott. I detta sammanhang definieras digitalsårbarhet som risken till att individer kan sätta sig själv omedvetet i osäkerhet när de arbetar hemifrån, vilket leder till att inkriminerande information offentliggörs och utnyttjas av tredje part. Digital kompetens avses att vara en individs informationstekniska färdigheter. För att kunna testa hypotesen, att utbildning leder till högre medvetenhet inom digitalsårbarhet, genomfördes intervjuer med anställda som jobbade hemifrån med bakgrund från olika industrier, land och åldersgrupper. Dessutom genomfördes också en online enkätundersökning som tog plats bland sociala medier platformer så som Discord, Facebook och Instagram. Resultaten visade en motsatt riktning i förhållande till hypotesen där medvetenhet om digitalsårbarhet var förknippad med digital kompetens över utblidning. Resultaten visar att anställda som har högre digital kompetens är mer benägna att förstå dess medvetenhet om digitalsårbarhet i vilket gör det lättare för de att identifiera cyberhot. Utifrån detta tyder studien på att utbildning inte är tillräckligt för att förhindra cyberbrott. För att bättre förebygga cyberbrott måste anställda vara villiga att lära sig och vilja förstå hoten och riskerna.
85

The Role Decentralised Non-Regulated Virtual Currencies Play in Facilitating Unlawful Financial Transactions.

Cian, Healy, LI, ZHE January 2016 (has links)
As consumer payment services have been developed at a rapid rate in recent years, the introduction to the market of decentralised, non-regulated cryptocurrencies has enabled a significant increase in acts of criminality in the cyber environment. Efforts to combat and curb the continued growth of such illicit activities have included the development, implementation and enforcement of legislation and regulations by governing authorities on a global scale. For the purpose of this thesis, interviews were conducted with several industry experts and governmental officials specializing in the use of virtual currencies for illicit financial transactions, namely fraud, money laundering and tax evasion. While the extent to which decentralised, non-regulated payment services actually contributes to illicit financial transactions remains unclear, it can certainly be said that as the use of new and emerging virtual currencies increases, so too will acts of criminality in the cyber world.
86

The Effect of Police Organization on Computer Crime

Koksal, Tamer 20 July 2009 (has links)
No description available.
87

How cybercrime has evolved in Sweden over the last ten years : A literature review / Hur cyberbrottsligheten i Sverige har utvecklats de senaste tio åren

Tysk, Henrik January 2022 (has links)
The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of this development is due to society’s increased reliance on the internet and the backbone that supports it. This in turn increases the profitability of cybercrime. Cybercrime has a broad definition, but in essence cybercrime are crimes that are assisted by technology, often taking place on the internet. The true impact cybercrime has on society is difficult to assess, since it has both financial and social impact, depending on what type of crime has been committed. This thesis examines how cybercrime and the Swedish police’s ability to combat cybercrime is portrayed by Swedish news media, as well as which demographics of the Swedish population are the most susceptible to cybercrime over the last ten years. This was achieved by performing a literature review, where both newspaper articles and reports from various law enforcement agencies were examined. A total of 54 news articles and 21 reports from various law enforcement agencies were used in the study. The included material was analyzed and divided into categories using thematic coding, and the results showed that news media does not always give an accurate depiction of the cybercrime landscape in Sweden. Cybercrime reporting in news articles was often found to be over-dramatized and shallow, which may negatively influence the reader's ability to understand the risks of cybercrime. The law enforcement's ability to combat cybercrime is portrayed as underfunded and in need of personnel with the expertise necessary to curb cybercrime. Although efforts to bolster the government's ability to fight cybercrime have been made during the last ten years, work still remains for law enforcement to catch up and keep pace with cybercriminals.
88

<b>Analyzing the Nexus between Cyberaggression and Cybersecurity Insider Threat Dynamics</b>

Anirudh Vempati (16897563) 27 April 2024 (has links)
<p dir="ltr">In the modern, internet-connected world, online actions have a big impact. Organizational information system security is a complex issue, with both external attacks and internal vulnerabilities posing serious risks. Although there is ample evidence linking job discontent and stress in the context of insider threat prediction, the stress caused by a perceived lack of social support is mostly unstudied. This research seeks to address this gap by assessing how aggressive behaviors outside the workplace and the absence of offline social support can predict insider threat behaviors within organizations. Given the prevalence of insider threats, a comprehensive investigation into their motivations and actions is imperative. Understanding these dynamics can provide organizations with crucial insights to effectively manage this persistent risk. The widespread nature of insider threats calls for a thorough study into their roots, motives, and behaviors. By comprehensively analyzing these factors, companies can gain valuable insights into insider threats' dynamics and develop effective risk management strategies.</p><p dir="ltr">The study conducted a survey with 206 participants recruited through Amazon Mechanical Turk (MTurk), analyzing data using SPSS. The survey consisted of several questionnaires, including demographic information, insider threat traits, cyberaggressive behaviors, online and offline social support. The correlational analysis revealed significant variables related to insider threat characteristics. The results of the study suggested that Cyberbullying and Deception were significant predictors of Hacking and Identity Theft. Additionally, individuals displaying traits of Unwanted Contact and Online Harassment outside the workplace were more likely to exhibit insider threat behaviors within an organization. Notably, the lack of online social support was not found to be indicative of insider threats. However, the absence of offline social support was associated with an increased probability of individuals engaging in cybercrimes within organizational settings.</p><p dir="ltr">The findings suggest that organizations and information security policymakers should implement strategies to mitigate insider threats effectively. To manage insider threats, organizations should focus on behavioral cues, implement positive interventions and utilize technical monitoring to track online actions of insiders. Understanding the psychological, behavioral, and technical aspects of insider threats is crucial for early detection and prevention. Policymakers at companies should not only focus on traditional background checks related to criminal history but also consider psychological and behavioral factors to prevent insider threats effectively. By integrating these insights into policies and practices, companies can enhance their ability to mitigate potential insider threats effectively.</p><p dir="ltr">The present study augments the existing literature on insider threats and cyber aggression by examining the influence of stressors on employee behavior. Building upon prior research, this investigation delves into the nuanced impact of both offline and online social support systems on stress levels experienced by employees. It explores how the absence of adequate offline and online social support can exacerbate stress levels, consequently increasing the likelihood of insider threats and cyber aggression. In conclusion, the findings of this research contribute significantly to our understanding of the pivotal role of offline social support in mitigating workplace stress. Moreover, it underscores the importance of understanding individual online presence and background verification processes in evaluating potential risks within the workplace.</p>
89

A HERMENEUTIC EXPLORATION OF THE INVESTIGATION OF CYBER-RELATED SEXUAL CRIMES AGAINST CHILDREN : PROFILING AS A METHOD IN THE INVESTIGATION OF CYBERCRIME

Hansen Lie, Isabella January 2024 (has links)
Recent research has highlighted the potential benefits of implementing criminal profiling in police investigations, to improve the efficacy of the identification of suspects. Due to the continuous increase in digital sexual offenses law enforcements are experiencing overwhelming amounts of cybercrime, necessitating a re-evaluation of investigative methods and resources. This thesis explores my preconception, that profiling of online offenders can strengthen and improve investigative methods, as well as potentially aid preventative methods, when dealing with cybercrime against children. Through two semi-structured expert interviews and research literature, this thesis aims to explore if the implementation of criminal profiling can increase efficacy in police investigative methods. The results indicate that the Trinity-approach to profiling enablesinvestigators to categorise the characteristics and patterns of offenders and victims, allowing for more effective and targeted strategies against online offenders. This ultimately enables law enforcement to better address cybercrime against children and to protect this vulnerable population. The thesis also acknowledges methodological limitations, due to a small sample size of interviews. This is, however, justified with the use of an in-depth case study method, emphasising the focus of gaining deeper insights, while also establishingthe validity of the results due to the hermeneutic approach.
90

Sexuálně motivovaná kybernetická kriminalita / Sexually motivated cybercrime

Kryštof, František January 2016 (has links)
1 Thesis title, keywords and abstract Thesis title: Sexually motivated cybercrime Keywords: cybercrime, virtual child pornography, sexting, pornographic performances, cyber grooming, sexual solicitation of children This master thesis deals with the issue of cybercrime against persons more specifically with sexually motivated crimes. The thesis is divided into five separate chapters. The first chapter deals with cybercrime in general, its taxonomy and the necessary terminology, it also describes some of the criminogenic factors of cybercrime relevant for the issue. The second chapter presents the most important applicable international legal instruments. The third chapter describes the issue of illicit pornography especially child pornography. For the subsequent chapters the author's own taxonomy was used and they overlap in part. The fourth chapter explores the phenomenon of sexting and the use of web cameras for sexual purposes as a consensual activity. In the fifth chapter the misuse of these activities for the purposes of child grooming, extortion and commercial sexual exploitation of children is examined. The chapters three to fine represent the core of the thesis and are outlined as follows: First, the criminological aspects are analyzed. Then some general thoughts on legal regulation of the given...

Page generated in 0.04 seconds