• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 36
  • 35
  • 17
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 117
  • 21
  • 21
  • 19
  • 19
  • 17
  • 16
  • 15
  • 15
  • 15
  • 14
  • 14
  • 13
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention

O'Flynn, Micheál Aaron January 2015 (has links)
This thesis examines the Council of Europe's Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of 'suppression' conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the 'suppressed' offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers have provided powerful tools for policing cybercrime, and the Convention has been innovative by developing mechanisms for facilitating networking interactions between law enforcement, and on most interpretations, even providing for directly contacting foreign service providers for data. The traditional limitations of enforcement jurisdiction are gradually being transformed, but the resulting difficulties for jurisdictional concurrency are not appreciated. Given the malleability of the concept of 'territoriality', and the flexibility afforded in international law in its interpretation, seizures of jurisdiction over many cybercrimes have sometimes been on the most tenuous of grounds. This results in a problem of concurrent jurisdiction on a scale previously unseen in the context of other transnational offences. It is often assumed that once substantive criminal harmonisation occurs, jurisdictional conflict between States dissipates, but I highlight three areas where concurrency is beginning to generate difficulties: investigatory and prosecutorial negotiations, cybercrime extraditions, and the law relating to ne bis in idem. I argue that these problems are only going to be exacerbated given the inroads that are being made in investigative powers and enforcement jurisdiction, coupled with the global reach of cybercrime which brings more and more States into play. I provide both the theoretical and practical case for more refined approaches towards the concept of territoriality, and consider some of the potential mechanisms for dealing with these uneasy bedfellows in the Cybercrime Convention.
2

"HOW SAFE DO YOU FEEL OUT ALONE ONLINE?" FEAR OF CRIME AND CYBERCRIME: A SYSTEMATIC LITERATURE REVIEW

Maria, Stam January 2020 (has links)
Fear of crime is a well-explored field within criminology. Although inconsistencies exist, it is mostly defined as an emotional reaction to crime or aspects of crime. Consequences can affect society indirectly but are mainly on an individual level. For example, an individual can decide to avoid certain environments. One of these environments can be cyberspace, the internet, as individuals can experience fear of online criminal activity. This area of research has not been explored as much as fear of traditional crime. A systematic literature review is conducted to analyse the body of research that applies the concept fear of crime to cybercrime. With the purpose to assess the much-discussed concept fear of crime to a new subset of crimes within criminology, cybercrime. This review has shown that challenges and limitations from traditional fear of crime research are still present in fear of crime research of the online environment. Findings are in part in line with previously published studies on the subjects and provide a knowledge base for future research. The paper concludes that the online environment does not seem to stand on its own when it comes to feelings of fear, and that the broader context of an individual’s experiences should be considered.
3

The Red Scare: The Evolution and Impact of Russian Computer Hackers

Wilmes, Justin Allen 27 April 2006 (has links)
No description available.
4

An investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space

Morris, Sarah Louise Angela January 2013 (has links)
This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of thumbnail cache artefacts were created by researching the evidential constraints present in Forensic Computing. The criteria were used to evaluate the evidential value of live system thumbnail caches and thumbnail cache file fragments identified in unallocated space. Thumbnail caches can contain visual thumbnails and associated metadata which may be useful to an analyst during an investigation; the information stored in the cache may provide information on the contents of files and any user or system behaviour which interacted with the file. There is a standard definition of the purpose of a thumbnail cache, but not the structure or implementation; this research has shown that this has led to some thumbnail caches storing a variety of other artefacts such as network place names. The growing interest in privacy and security has led to an increase in user’s attempting to remove evidence of their activities; information removed by the user may still be available in unallocated space. This research adapted popular methods for the identification of contiguous files to enable the identification of single cluster sized fragments in Windows 7, Ubuntu, and Kubuntu. Of the four methods tested, none were able to identify each of the classifications with no false positive results; this result led to the creation of a new approach which improved the identification of thumbnail cache file fragments. After the identification phase, further research was conducted into the reassembly of file fragments; this reassembly was based solely on the potential thumbnail cache file fragments and structural and syntactical information. In both the identification and reassembly phases of this research image only file fragments proved the most challenging resulting in a potential area of continued future research. Finally this research compared the evidential value of live system thumbnail caches with identified and reassembled fragments. It was determined that both types of thumbnail cache artefacts can provide unique information which may assist with a digital investigation. ii This research has produced a set of criteria for determining the evidential value of thumbnail cache artefacts; it has also identified the structure and related user and system behaviour of popular operating system thumbnail cache implementations. This research has also adapted contiguous file identification techniques to single fragment identification and has developed an improved method for thumbnail cache file fragment identification. Finally this research has produced a proof of concept software tool for the automated identification and reassembly of thumbnail cache file fragments.
5

Kriminologické a trestněprávní aspekty fenoménu ransomware / Criminological and legal aspects of the ransomware phenomenon

Johanovský, Tomáš January 2018 (has links)
Criminological and legal aspects of the ransomware phenomenon Abstract This diploma thesis deals with the current topic of cybercrime and focuses specifically on the phenomenon of ransomware on a scope unprecedented in Czech legal literature. Ransomware is a malicious code that interferes with the operation of a computer system, and later requires ransom for the victim to recover the access to the computer system and the data contained therein. Basic concepts necessary for the definition of ransomware (such as cyberspace, cybercrime, computer system, malicious code, cryptocurrency and darknet) are introduced and explained. The specificities of cybercrime and its development and current range in the Czech Republic are analysed. The main part of the text deals with the analysis of ransomware, starting with its history and leading to the possible future developments of ransomware. Different variants of ransomware are described such as false antivirus, police, locker and encryption ransomware. From a criminological point of view, the text focuses on the unique interaction of the perpetrator and the victim, which takes on surprising forms of customer support, answers to frequently asked questions and instructions for acquiring virtual currencies. Emphasis is placed on prevention efforts that can mitigate the...
6

An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space

Morris, S L A 08 October 2013 (has links)
©Cranfield University / This thesis establishes the evidential value of thumbnail cache file fragments identified in unallocated space. A set of criteria to evaluate the evidential value of thumbnail cache artefacts were created by researching the evidential constraints present in Forensic Computing. The criteria were used to evaluate the evidential value of live system thumbnail caches and thumbnail cache file fragments identified in unallocated space. Thumbnail caches can contain visual thumbnails and associated metadata which may be useful to an analyst during an investigation; the information stored in the cache may provide information on the contents of files and any user or system behaviour which interacted with the file. There is a standard definition of the purpose of a thumbnail cache, but not the structure or implementation; this research has shown that this has led to some thumbnail caches storing a variety of other artefacts such as network place names. The growing interest in privacy and security has led to an increase in user’s attempting to remove evidence of their activities; information removed by the user may still be available in unallocated space. This research adapted popular methods for the identification of contiguous files to enable the identification of single cluster sized fragments in Windows 7, Ubuntu, and Kubuntu. Of the four methods tested, none were able to identify each of the classifications with no false positive results; this result led to the creation of a new approach which improved the identification of thumbnail cache file fragments. After the identification phase, further research was conducted into the reassembly of file fragments; this reassembly was based solely on the potential thumbnail cache file fragments and structural and syntactical information. In both the identification and reassembly phases of this research image only file fragments proved the most challenging resulting in a potential area of continued future research. Finally this research compared the evidential value of live system thumbnail caches with identified and reassembled fragments. It was determined that both types of thumbnail cache artefacts can provide unique information which may assist with a digital investigation. ii This research has produced a set of criteria for determining the evidential value of thumbnail cache artefacts; it has also identified the structure and related user and system behaviour of popular operating system thumbnail cache implementations. This research has also adapted contiguous file identification techniques to single fragment identification and has developed an improved method for thumbnail cache file fragment identification. Finally this research has produced a proof of concept software tool for the automated identification and reassembly of thumbnail cache file fragments.
7

Is it Possible to Regulate the Internet Globally?: a Comparative Case Study of the Cybercrime Framework in Canada and Romania.

Manolescu, Dan Stefan Dragos Unknown Date
No description available.
8

Is it Possible to Regulate the Internet Globally?: a Comparative Case Study of the Cybercrime Framework in Canada and Romania.

Manolescu, Dan Stefan Dragos 11 1900 (has links)
In this thesis, I investigate the concept of Internet regulation and its implementation by examining the Convention on Cybercrime, which regulates the European Union (EU) and non EU countries. I examine the approaches taken toward the Convention on Cybercrime in two different socio-economic and political systems: Canada, a modern democracy that only signed the Convention, and Romania, an ex-communist democracy that both signed and ratified it. With this Convention, the Council of Europe has claimed that one model of global Internet regulation is appropriate for all countries. I argue that the infrastructure and legal, economic, and socio-cultural aspects of local cultures make the global homogenous regulation of the Internet impractical, therefore regulation on a national level would be more effective. I also try to contribute to current research by studying the complexity of the global regulation of Internet crimes by demonstrating: the importance of democracy and technology for public policy frameworks for cybercrime, by describing; the limitations of the model represented by the global monolithic Convention on Cybercrime, and by suggesting that a universal democratic model of global Internet regulation is utopian and does not address the individual needs of each country.
9

Kriminalita spojená s využíváním nových médií dětmi / Crime related to the use of new media by children

Kudrlová, Kateřina January 2019 (has links)
Crime related to the use of new media by children Mgr. et Mgr. Kateřina Kudrlová Abstract: The thesis confirms two hypotheses: young people online are put at risk of crime and commit crime as well. It is based mostly on the study of documents and scientific literature and analyzing of statistical data. The predominantly criminological perspective sets out the specifics of cyberspace and mentions some of its technological, sociological, psychological and at last but not least legal aspects. Furthermore, the thesis demonstrates the use of cyberspace by young people and the risks that users face. It focuses specifically on internet technology, new media, communication and identity (not only) online, digital imprint, social networks, netholism, an avatar as a user's representation, legal framework and criminal law regulation of cyberspace, bitcoins, cybercrime in general, cybercrime research conducted by the Institute of Criminology and Social Prevention, sexual exploitation of children (focusing on child pornography, sexting and cyber grooming), cyber bullying, intolerance and finally prevention and cybercrime trends. The threat of online crime occurs from the early age of the child, starting with the possible misuse of the digital imprint created by others and encountering inappropriate content. During...
10

Victimization of the 21st Century: An Examination of Cyberstalking Victimization Using a Target Congruence Approach

Fissel, Erica R. 07 June 2019 (has links)
No description available.

Page generated in 0.0439 seconds