Spelling suggestions: "subject:"cybercrime."" "subject:"cybercrimes.""
91 |
L'identité personnelle et les réseaux sociaux / Personal identity and social networksMahabir, Laetitia-Amanda 14 January 2014 (has links)
L'identité des personnes dans l'espace numérique n'est pas définissable d'une seule manière, et son mode d'expression est multiple. En effet, un individu peut disposer de plusieurs identités dans le numérique et jouer des rôles sociaux différents suivant les contextes sociaux auxquels il est confronté. Mais quels peuvent être les effets de l'usage de ces masques identitaires ? L'identité des personnes dans le cadre des réseaux sociaux renvoie au questionnement de soi, et des autres. Le versant individualiste et le versant communautaire de cette identité constituent la trame de la construction identitaire de l'utilisateur. Aussi, il apparaît que la richesse mais aussi la complexité des réseaux tiennent au fait que le droit confond individu et identité. Le droit repose en effet sur une conception essentialiste de l'identité, par laquelle chacun est acteur de sa propre trajectoire. Mais l'individu ne vit pas seul, il vit en groupe et il est saisi dans un réseau de relations sociales. Aussi, concevoir une identité personnelle en marge de la réalité numérique revient à distinguer la personne de la notion de présence en ligne qui est éminemment déclarative et performative. Cela amène à reconsidérer la place de l'identité dans l'espace numérique. Pour appréhender la question de la construction de l'identité personnelle dans les réseaux sociaux, il faudra aborder les différentes approches qui visent à assurer à chacun une identité qui soit conforme à ses désirs. Il sera également nécessaire d'adapter les mesures existantes à la réalité virtuelle, afin d'établir un régime de l'identité personnelle plus sécurisé et respectueux des droits de la personnalité de chaque utilisateur. / The identity of people in the digital space cannot be defined in one way. Its mode of expression is multiple. In fact, an individual can have several identities in the digital environment. It can also play different social roles according to social contexts that it faces. But what are effects of using identity masks ? The individual's identity within the social networks refers to the self-questioning, and others. The individualistic side and the community side of this identity are the foundation of the building of user's identity. Moreover, it appears that the wealth and the complexity of networks are the result of the confusion made by the law between individual and identity. In fact, the law is based on an essentialist conception of identity, by which each player has its own trajectory. But the individual does not live alone, he lives in a group and it is part of a network of social relations. The identity is made in the interaction of a claimed identity for oneself and assigned by others. Also, develop a personal identity on the fringes of the digital reality is to distinguish the person of the concept of online presence which is eminently declarative and performative.All this leads to reconsider the place of identity in the digital space. To understand the question of the construction of personal identity in social network, different approaches will be detailed. Those approaches are aimed to ensure everyone an identity according his wishes. Also, it will be necessary to adapt the existing measures to the virtual reality, in order to establish a more secure regime of personal identity, in respect of the rights of each user's personnality.
|
92 |
L’origine géographique en tant que facteur explicatif de la cyberdélinquanceCarignan, Mira 09 1900 (has links)
No description available.
|
93 |
Le droit de l'économie numérique en République Démocratique du Congo à la lumière des expériences européennes et Françaises / The law on digital economy in the Democratic Republic of Congo in the light of European and French experiencesNdukuma Adjayi, Kodjo 16 November 2017 (has links)
L'expansion des télécoms et la numérisation sont à la base de la révolution numérique. Leurs aspects sociétaux constituent une véritable source matérielle du droit face au commerce en ligne et à l'économie informationnelle. Le premier axe d'analyse a construit le modèle d'encadrement juridique réalisé à travers le temps pour le commerce en ligne européen et français. La réglementation a suivi l'évolution des techniques de communication à distance : téléachat (1989), contrats à distance (1997), fourniture des services financiers à distance (2002). Mais, la voie électronique a révolutionné les services de la société de l'information, dont la directive 2000/31/CE réglemente les aspects dès 2000. (1) Le deuxième axe appréhende l'évolution des politiques législatives sur les télécoms et les communications électroniques en Europe et en France. Le droit international du commerce a transplanté en Afrique (RDC) les standards juridiques de l'Europe des télécoms, grâce à la mondialisation des marchés, à la diffusion technologique, à l'internationalisation des réseaux et à la multinationalisation. (II) Ainsi, l'ordre juridique congolais a suivi le modèle de dérégulation. L'ouverture des droits de l'accès aux télécoms, jadis monopolistiques, a engagé la transformation des services publics dans l'économie de marché. Partout, le droit de la régulation a suscité des défis nouveaux pour la séparation des fonctions de régulation, d'exploitation et de réglementation. Aussi, la concurrence soulève le défi de l'autorégulation du marché par les forces économiques. (III)Au fil des innovations, la législation telle que pensée au départ en RDC n'est pas en mesure de régir les contingences de la révolution numérique, notamment : les données personnelles et la cybercriminalité. Des travaux de lege ferenda sont en cours depuis avril 2017 au parlement congolais, précisant la prospective de refondation du droit de l'économie numérique en RDC au vu des expériences comparées. (IV). / The expansion of telecoms and digitalization has fuelled the digital revolution. Their societal aspects represent a tangible source for legal dealings within the e-commerce and the information economy. The first line of inquiry establishes a model for the legal framework created over time for the European and French e-commerce. It demonstrates that legal adjustments narrowly followed the evolution of telecommunications methods : teleshopping (1989), remote contracts (1997), supplies for remote financial services (2002). However, the rise of this "electronic gateway" revolutionized the services of the Information Society, regulated since 2000 by the directive 2000/31/CE. (I)The second line of inquiry analyses the evolution of legislative policies on telecoms and electronic communications in Europe and in France. Because of the globalization of trade, the expansion of technological communications, the internationalization of networks and the growth of multinational firms, the international trade law transferred European legal standards of telecoms in Africa (DRC). (II) Congolese legislation, for instance, has followed the European model of deregulation. By opening rights of access to the telecoms sector, which was previously monopolistic, the country is undergoing the transformation of public services into the market economy. Everywhere, the regulation right creates new challenges for the separation of regulation, operation and control services. In addition, competition raises a new challenge regarding the self-regulation of trade by economic powers. (III) As innovations continue, the initial law of telecoms in RDC is unable to regulate the contingencies of the digital revolution, in particular in the areas of personal data and cybercrime. Since April 2017, the Congolese parliament is working.
|
94 |
Crimes cibernéticos na pós-modernidade: direitos fundamentais e a efetividade da investigação criminal de fraudes bancárias eletrônicas no BrasilAragão, David Farias de 27 March 2015 (has links)
Made available in DSpace on 2016-08-18T12:54:33Z (GMT). No. of bitstreams: 1
Dissertacao- DavidFariasAragao.pdf: 836029 bytes, checksum: 5f56186d51e1a0799b6f05257aff569b (MD5)
Previous issue date: 2015-03-27 / This study analyzes the criminal investigation of illicit committed in cyberspace, taking into account the context of post-modernity, especially the risk and information society and its impact on the Criminal Law and Criminal Procedure Law, where a strong sense of insecurity experienced in the face of the lack of control of dangers coming from social and technological advances and new conducts that endangers life in community. The aim is to trace the constitutional paradigm to develop a valid criminal investigation in order to reconcile the binomial warranty and efficiency in the exercise of this state activity, using the balancing technique to allow the coexistence of fundamental rights to liberty and the States duty to promote public safety. The network action for illicit behavior in a virtual environment has brought great difficulties to materialize it before the courts and assign responsibility in criminal context, requiring the use of special investigative techniques that sometimes clashes with fundamental rights. After the examination of some of these special investigation techniques that are being applied by the Union s Judicial Police in cases relating to electronic bank fraud, it was found which of those can be applied without preliminary judicial authorization or only after jurisdictional analysis to define in a concrete case the possibility of balancing the investigated person s fundamental right, in particular privacy, and others related to. / O presente trabalho tem por objetivo analisar a investigação criminal de ilícitos praticados no espaço cibernético levando em consideração o contexto da pós-modernidade, mormente a sociedade do risco e da informação e seus reflexos sobre o Direito Penal e Processual Penal, onde predomina uma forte sensação de insegurança experimentada pela sociedade em face da falta de controle dos perigos decorrentes dos avanços sociais e tecnológicos e das novas condutas lesivas ao convívio da coletividade. Busca-se traçar o paradigma constitucional para o desenvolvimento válido da investigação criminal de sorte a compatibilizar o binômio garantismo e eficiência no exercício dessa atividade estatal, utilizando-se da técnica do balanceamento para permitir a coexistência dos direitos fundamentais à liberdade e à privacidade em face do dever do Estado de promover a segurança pública. A atuação em rede para prática de crimes em ambiente virtual trouxe grandes dificuldades para demonstrar em juízo a materialização de ilícitos e atribuir responsabilidades em âmbito criminal, sendo necessária a utilização de técnicas investigativas especiais que por vezes se chocam com direitos fundamentais. Após o exame de algumas dessas técnicas especiais de apuração que estão sendo aplicadas pela Polícia Judiciária da União para os casos relativos às fraudes bancárias eletrônicas, verificou-se quais podem ser empregadas sem autorização judicial e quais apenas com a reserva de jurisdição para que se defina no caso concreto a possibilidade de relativização de direito fundamental do investigado.
|
95 |
Smarta enheter i hemmet : nytta eller risk för individen? / Smart devices at home : benefit or risk for the individual?Eliasson, Frida, Karlsson, Gabriella, Svanling, Agnes January 2017 (has links)
Teknikutvecklingen och digitaliseringen går fort framåt och har idag sträckt sig till det privatahemmet. Det smarta hemmet är en del av ett större fenomen som kallas Internet of Things(IoT). Enheterna inom IoT består av sensorer och datorer som kan kommunicera medvarandra och skapa ett situationsanpassat beteende. Idén med smarta hem handlar om attanvända sig av olika smarta enheter inom hemmet, som är uppkopplade till ett gemensamtnätverk. Smarta hem bidrar med många bra funktioner där individen kan skapa en bekväm,säker och hållbar vardag. Förutom att underlätta i vardagen för individer kommer dessasmarta enheter med ett antal risker. Ju fler enheter som kopplas upp på ett nätverk destoenklare är det för en obehörig person att komma åt en annan individs privata information. Det samlas in mycket data från de smarta enheterna vilket kan möjliggöra detaljeradkartläggning av användaren. Det är svårt att veta vem som får tillgång till den privatainformationen om användaren vilket bidrar till att det blir svårt för individen att vara anonymoch skydda sig. Syftet med studien är att utveckla kunskap om vilken medvetenhet som finnshos individen kring riskerna vid användning av smarta enheter i hemmet, då det finnsförhållandevis lite forskning inom ämnet. En effekt av att individen blir mer medveten kanleda till att hen tar mer ansvar och därmed skyddar sig mer mot eventuella IT-brott. Utgångspunkten för studien har varit att samla in tidigare forskning och litteratur samt attutföra en kvantitativ enkätundersökning. Litteraturstudien ligger till grund till både tidigareforskning och det teoretiska ramverket. Med hjälp av litteraturstudien har enkätfrågorutformats för att kunna besvara studiens frågeställning. Enkätundersökningen gjordes via eninternetenkät som riktades till användarna av smarta enheter i hemmet. Utifrån insamlatmaterial och empiri kunde ett resultat presenteras och en analys utföras. Med hjälp av fyraolika teman har en slutsats dragits om vilken medvetenhet som finns hos individen kringriskerna vid användningen av smarta enheter i hemmet. / The development of technology and digitization are moving fast forward and have nowextended to the private homes. The smart home is part of a larger phenomenon called Internetof Things (IoT). The IoT devices consist of sensors and computers that can communicate witheach other and create a situational behavior. The idea of smart homes is about using differentsmart devices within the home, which are connected to a shared network. Smart homesprovides with many great functions where the individuals can create a comfortable, safe andsustainable everyday life. In addition to facilitating everyday life for individuals, these smartdevices come with a number of risks. The more devices connected to the Internet, the easier itgets for an unauthorized person to access another person's private information. The smartdevices collect a lot of data, which enables for detailed mapping of the user. It's hard to knowwho gets access to the private data about the user, which makes it difficult for the individualto be anonymous and protect himself. The purpose of the study is to develop knowledge aboutthe awareness of the individual about the risks associated with the use of smart devices athome, as there is relatively little research on the subject. An effect of becoming more aware ofthe risks, can lead to more responsibility taken by the individual to protect itself againstpossible IT crimes. The starting point of the study has been to collect prior research and literature and to conducta quantitative survey. The literature study forms the basis for the previous research and thetheoretical framework. With help from the literature, survey questions have been formulatedto answer the research question. The survey was conducted through an internet survey aimedto users of smart devices at home. Based on collected material and empirical data, a resultcould be presented and an analysis performed. With the help of four different themes, aconclusion has been drawn about the awareness of the individual about the risks associatedwith the use of smart devices in the home.Keywords:
|
96 |
The legal aspects of cybercrime in Nigeria : an analysis with the UK provisionsIbekwe, Chibuko Raphael January 2015 (has links)
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime. This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011.
|
97 |
Boj s terorismem v EU - "kyberterorismus" jako nová bezpečnostní hrozba / EU fight against terrorism - "cyberterrorism" as a new security threatSnížková, Žaneta January 2013 (has links)
This diploma thesis deals with European Union and current security threats, concretely with Cyberterrorism. Cyberspace and internet became essential parts of our living over the last decades due to rapid development of information and communication technology. The increased dependency on cyberspace is visible in all governmental operations, public-private sector, financial and business operations, as well as communications between individuals and groups. As a result our society is facing new threats. On one hand cyberspace is a place for economic growth and innovation, on the other hand criminals, spies and terrorist use cyberspace as a place for their activities. Our society should be aware of these negative impacts as well. Cyberterrorism by its nature is considered to be a very dynamic phenomenon. Regarding this fact this thesis provides a dynamic way how to define Cyberterrorism and reveals main perspectives of Cyberterrorism. Tracking the European Unions Convention on Cybercrime and main means to fight Cyberterrorism, this thesis analysis whether European Union disposes of appropriate means to engulf the dynamic nature of this phenomenon.
|
98 |
L'expertise et la lutte contre la fraude monétique / Solid forensic assessment and the fight against payment card fraudSouvignet, Thomas 18 December 2014 (has links)
Le montant annuel de la fraude européenne à la carte de paiement se monte à plus d’1,5 milliard d’euros. Cette manne aiguise l’appétit des groupes criminels qui exploitent la moindre faille de la monétique (écosystème de la carte de paiement). Les cinq principaux acteurs de la monétique (porteurs, émetteurs, accepteurs, acquéreurs et systèmes de paiement) s’appuient pourtant sur des systèmes et réseaux normalisés dont la sécurité est encadrée par des standards internationaux contraignants. Néanmoins, la fraude monétique ne cesse de progresser alors que les moyens de lutte (étatiques, collaboratifs ou individuels) restent limités.Après étude de la fraude monétique, cette thèse propose différentes actions (passives,réactives et proactives) visant à améliorer la lutte contre la fraude monétique. D’abord,il convient de mieux connaître la fraude en étudiant la provenance des données volées et plus seulement leur usage. Ensuite l’expertise de ces fraudes doit être améliorée, en développant par exemple une captation du progrès scientifique. Une expertise qui doit être en partie transmise aux enquêteurs afin qu’ils puissent conduire leurs enquêtes. Enquêtes qui peuvent être dynamisées par des opérations réactives associant investigateurs et sachants techniques. Enfin, de manière proactive, les enquêtes et analyses de demain doivent être facilitées par les technologies monétiques conçues aujourd’hui. / Every year, payment card fraud exceeds 1.5 billion euros in Europe. Organised crime groups are exploiting any vulnerability possible to take a piece of this lucrative activity. Even though the five principal entities in the payment card industry (cardholders, issuers,acceptors, acquirers and payment system providers) are implementing binding security measures through out standardized systems and networks, fraud continues to increase. Efforts by the state, industry collaboration, and individuals have been unsuccessful in decreasing criminal advances. Having analysed the elements of payment card fraud, this thesis proposes several actions (passive, reactive and proactive) to help improve the fight against this fraud. First, itis relevant to gain knowledge of the source of the card details and not to focus only on its reuse. Next, forensic assessment has to be improved, for example by developing an increased scientific understanding of the technology. Such an expertise should then be passed on to investigators through effective training and knowledge transfer. Investigations should also be made more dynamic with reactive operations conducted in concert by investigators and technicians. Finally, in an ideal proactive spirit, future investigations and assessments should be oriented and facilitated by studying and influencing current payment card technology developments.
|
99 |
Kybernetická bezpečnost a legislativa ČR / Cyber security and legislation of the Czech RepublicKratochvíl, David January 2012 (has links)
Contemporary society is increasingly influenced by computers and internet environment and it meets with issues related to cybercrime. There are already a number of laws, whether at EU or national governments, which are trying to reduce or prevent risks associated with hackers, cyber terrorism or any other illegal activities in cyberspace. Thesis "Cyber security and legislation of the Czech Republic", is divided into two main parts. In the first theoretical part, the reader apprise with cybercrime in general. You can read about methods of investigation, types of illegal activities and how to prevent such practices. The second part consists of an analysis of the current legislation of the Czech Republic, EU and Legislative intent of the law on cyber security. I will describe the bill, analyze and appraise its benefits to society. In conclusion of this thesis, I will summarize the achievement of results and objectives of the work.
|
100 |
Trust and exchange : the production of trust in illicit online drug marketsMunksgaard, Rasmus 09 1900 (has links)
Au cours de la dernière décennie, les marchés illicites en ligne sont passés de niches de marchés à plateformes économiques à part entière. L’un des aspects de cette expansion semble reposer dans l’abandon de l’articulation traditionnelle de la relation de confiance entre vendeurs et acheteurs pour l’adoption de transactions régies par les principes d’atomisation sociale et d’anonymat. Se situant au cœur d’une sociologie économique des marchés illicites encore émergente, cette thèse cherche donc à étudier l’élaboration de la confiance au sein des marchés de drogues illicites en ligne.
En m’appuyant sur la notion d’institutions en tant que constructions sociales, j'avance la thèse selon laquelle ces marchés illicites modernisent les modalités de transaction des marchés licites traditionnels : des contrats sont proposés ; des tribunaux sont érigés; la sanction est formalisée ; et la gouvernance est transformée. Cette approche permet de révéler un schisme fondamental de la littérature et de ses postulats à l’égard de l'ordre social régnant au sein des marchés illicites en ligne -- rupture qui s’exprime notamment par l’opposition entre 1) une conception de ces marchés comme socialement atomisés et régis uniquement par la réputation ; et 2) l’idée selon laquelle les serveurs restent sous le contrôle des administrateurs.
Afin de pallier cette discordance, je propose un modèle d’élaboration de la confiance notamment issu des approches cognitives et comportementales. Premièrement, je soutiens qu'un ensemble de mécanismes actifs de renforcement remplace fonctionnellement les principes sociaux traditionnels de la confiance. Deuxièmement, je soutiens que la confiance, aussi bien interpersonnelle qu’abstraite (à savoir, la confiance accordée aux institutions), est principalement produite selon un processus bayésien d'accumulation d'expériences.
Dans cette perspective, l'article « Uncertainty and Risk » examine l'ensemble des mécanismes actifs de renforcement de la confiance -- première composante de ce modèle -- et révèle que les vendeurs ajustent les prix non seulement en fonction de la réputation, mais également des contrats et du statut. Dans les articles suivants, le processus bayésien d'accumulation d'expériences -- deuxième partie du modèle -- est abordé. L’étude menée dans l‘article « Building a case for trust » met ainsi en lumière une association entre les échanges répétés avec le vendeur et une tendance à effectuer des transactions de plus en plus importantes. Le troisième article (« A change of expectations? »), quant à lui, met en exergue le fait qu’un faible nombre d’expériences satisfaisantes suffit à augmenter la certitude de l’acheteur quant à la qualité du produit illicite. Dans leur ensemble, ces deux articles soutiennent l’idée selon laquelle le processus d'accumulation d'expériences favorise la coopération et les attentes.
Enfin, ce travail s’achève par l’articulation des deux composantes de ce modèle et, de manière plus générale, par l’articulation de la thèse de la modernisation et d’une conception de la confiance dont l’élaboration repose sur un processus d’accumulation d’expériences sociales. L’apport unique d'une sociologie économique dans l’étude criminologique des marchés illicites est notamment souligné et des pistes de recherches futures sont discutées. / During the last decade illicit online drug markets have grown from niche markets into full-fledged platform economies. It seems that over the course of a few years, sellers and buyers have left the social bases of trust behind preferring to exchange under conditions of social atomization and anonymity. Situated in an emerging economic sociological approach to illicit markets, this work examines the production of trust in illicit online drug markets.
Drawing on economic sociology, namely, the notion of institutions as social constructions, I advance the thesis that these markets modernize the premodern exchange modes of traditional illicit markets: Contracts are implemented; courts are erected; sanctions are formalized; and governance transforms. This analysis reveals a fundamental schism in the literature and its assumptions about the social order of illicit online markets. Specifically, a conception of these markets as socially atomized and governed only by reputation, versus the recognition that servers remain under the control of administrators.
Building off the modernization thesis and the schism, I propose a model for the production of trust that is sensitive to both cognitive and behavioral approaches to trust. First, I propose that a set of active trust producing mechanisms functionally replace the bases of trust that have eroded as illicit markets move online. Second, I argue that trust is primarily produced through a Bayesian process of accumulating experience, which produces both interpersonal and abstract trust.
In the article Uncertainty and Risk I examine the first component, the active production of trust. I revisit a key debate in the literature, the pricing of illicit goods. We find that sellers set prices adjust prices not only with respect to reputation, but also contracts and status. In the following two articles, I examine the second part of the model, the bayesian process of experience accumulation. In the article Building a Case for Trust, I find that repeated exchanges with a seller are associated with a propensity towards larger transactions. In the third article, A Change of Expectations?, I find that even a few experiences increases expectations in the performance of the market institution. Thus, the two articles provide evidence that the process of experience accumulation promotes cooperation and expectation.
I conclude the work by reconciling a tension between the two components of the model, the proposition that markets are modernized, but that trust is produced primarily through a process of experience accumulation. On this basis, I continue to highlight the contributions and analytical advantages of the economic sociological approach to illicit markets.
|
Page generated in 0.0273 seconds