• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 35
  • 17
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 120
  • 22
  • 21
  • 20
  • 19
  • 17
  • 16
  • 16
  • 16
  • 15
  • 15
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The South African legislative response to cybercrime

Mabunda, Sagwadi Mmahlatse January 2021 (has links)
Doctor Educationis / As the world moves into a hyper-connected global society with near universal access to the internet, cybercrime has become a global challenge. The problems embedded in the issue of cybercrime are at least twofold. Firstly, the proliferation of cybercrime globally, and more specifically in South Africa, is outstripping the pace at which governments and lawmakers are able to respond efficiently. Secondly, where governments do manage to respond, there is a temptation to do so on the basis of a superficial understanding of the essence of cybercrime. There are many debates about the novelty of cybercrime in which participants have described it as “old wine in new skin”. This study takes the position that cybercrime is neither completely novel nor is it merely a virtual manifestation of the ordinary terrestrial crimes. The premise of this research is that cybercrime is an interesting and unique form of criminality that manifests itself in a number of challenging ways. These manifestations need to be considered independently and comprehensively if effective countermeasures are to be devised. This is not to say that every single offence has to be considered critically. That would be impracticable. It would suffice that certain types of cybercrimes be classified differently from other types, so as not to paint all with the same brush.
22

Fundamental Demographics of Digital Piracy Offenders

Guerra, Chris 05 1900 (has links)
Digital piracy is an emerging cybercrime subtype with overarching implications for administrators and researchers alike. Within this body of knowledge, it is unclear what individual-level factors are linked to digital piracy. Using a college-based sample, while focusing on gender, race, and age, this study identifies fundamental individual-level variables associated with digital piracy commission. After conducting multiple independent samples t-tests and a multivariate logistic regression, results found age and computer proficiency were significantly associated with the likelihood of engaging in digital piracy. These findings can help establish the foundational characteristics of digital pirates. By shifting the focus back to basic individual factors, universities can identify preventive efforts and researchers can better understand who engages in digital piracy.
23

Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization

Henson, Billy 23 September 2011 (has links)
No description available.
24

When The Spying Stop: Recent Criminalisation Of Cyberstalking In Malaysia

Hamin, Z., Kamaruddin, S., Abd Rani, A.R., Wan Rosli, Wan R. 25 September 2023 (has links)
No / The ubiquity of the ICT and the Internet has made them integral to our daily lives in the past two decades, bringing numerous benefits and the risks of victimisation from various cybercrimes, including cyber harassment and cyberstalking. Stalking is generally understood as unwanted or unsolicited persistent and continuous following, pursuing, contacting, spying, harassing, threatening the victim, and causing fear and apprehension. Unfortunately, given the seriousness of cyberstalking and its severe and traumatic impacts on the victims, the existence of the law and any legal protection for victims remains elusive and vague in the Malaysian legal landscape for decades until August this year.
25

Understanding and defending against internet infrastructures supporting cybecrime operations

Konte, Maria 07 January 2016 (has links)
Today's cybercriminals must carefully manage their network resources to evade detection and maintain profitable businesses. For example, a rogue online enterprise has to have multiple technical and business components in place, to provide the necessary infrastructure to keep the business available. Often, cybercriminals in their effort to protect and maintain their valuable network resources (infrastructures), they manipulate two fundamental Internet protocols; the Domain Name System (DNS) and the Border Gateway Protocol (BGP). A popular countermeasure against cybercriminal infrastructures are Autonomous Systems (AS) reputation systems. Past research efforts have developed several AS reputation systems that monitor the traffic for illicit activities. Unfortunately, these systems have severe limitations; (1) they cannot distinguish between malicious and legitimate but abused ASes, and thus it is not clear how to use them in practice, (2) require direct observation of malicious activity, from many different vantage points and for an extended period of time, thus delaying detection. This dissertation presents empirical studies and a system that help to counteract cybecriminal infrastructures. First, we perform empirical studies that help to advance our understanding, about how these infrastructures operate. We study two representative types of infrastructures: (1) fast-flux service networks which are infrastructures based on DNS manipulation, (b) malicious ASes (hubs of cybercriminal activities) which are infrastructures that are primarily based on BGP manipulation. Second, we build on our observations from these studies, and we design and implement, ASwatch; an AS reputation system that, unlike existing approaches, monitors exclusively the routing level behavior of ASes, to expose malicious ASes sooner. We build ASwatch based on the intuition that, in an attempt to evade possible detection and remediation efforts, malicious ASes exhibit agile routing behavior (e.g. short-lived routes, aggressive re-wiring). We evaluate ASwatch on known malicious ASes, and we compare its performance to a state of the art AS reputation system.
26

Kriminologické aspekty kybernetické kriminality / Criminological aspects of cybercrime

Gemeri, Peter January 2021 (has links)
Criminological aspects of cybercrime Abstract (EN) This thesis is a study of specific aspects of cybercrime in regards to banking and non- banking financial institutions in Czech republic. By comparing results of third-party analytical resources and own findings obtained by strategically performed interviews with personnel in leading positions in cyber-security careers, the thesis describes causes and results of cyber-attacks and related preventive measures with emphasis on their respective place and priority in the cybersecurity policy of the organization. The main finding is that the biggest risk to the organization seems to be its own employees. That is why the entity cannot simply trust in the security of its perimeter by protecting only its border, but has to also consider its internal part. An equally important finding is the fact that mechanisms for the prevention of cybercrime take a large number of non-mutually exclusive forms, and in order to maintain the highest possible level of security, it is appropriate to layer these measures into complex units. Keywords Cybercrime, cybersecurity, criminology, financial organizations, cybercrime prevention
27

Trestněprávní a kriminologické aspekty šíření ransomware / Criminal and criminological aspects of ransomware spreading

Zavadil, Stanislav January 2019 (has links)
Criminal and criminological aspects of ransomware spreading Abstract This diploma thesis deals with issues of ransomware spreading and examines certain criminal and criminological aspects of this cybercrime phenomenon. Ransomware is malware that encrypts, blocks or prevents access to the computer system or data in a computer system. In connection to this, it demands monetary or other ransom. This diploma thesis firstly describes ransomware from the point of view of its function and technical aspects, including its history, categorization of its variations and description of several notable infection examples, namely WannaCry, Petya, DoubleLocker and Vir Policie. Following section describes possible criminal qualifications according to Czech substantive criminal law, including the consideration of specifics of different ransomware variations and potential development of this criminal aktivity. The final part focuses on criminological aspects of ransomware spreading. It beggins with a description of the crime status and dynamics, including further details about latency and trends. Then follows the description of perpetrator and victim in view of certain criminological theories. Finally, criminological part comprises a chapter about crime control and prevention, which includes practical parts that aim to help...
28

Trestněprávní a kriminologické aspekty kyberkriminality se zaměřením na útoky typu odepření služby / Criminal and criminological aspects of cybercrime with a focus on denial of service attacks

Přívozník, Lukáš January 2019 (has links)
Criminal and criminological aspects of cybercrime with a focus on denial of service attacks Abstract The aim of this master thesis is to analyze the criminal law assessment of denial of service (DoS) cyber-attacks and related criminological aspects. The author deals with the technical characteristics and typology of this type of attack. He analyzes its individual variants, as the way of performing the attack, that is reflected in its criminal assessment. The thesis also describes the facts concerning the largest series of DoS attacks that occurred in the Czech Republic in 2013. Next, the author deals with the criminological aspects of cybercrime, namely its expansion and latency, the perpetrators and victims of the denial of service attack and related prevention, including techniques and methods of defense against this attack. In the main part of the thesis, the author analyzes the criminal law aspects of this specific type of crime. The thesis deals with the development of law in this area at international level, within the European Union and at national level. It also deals with the analysis of the factual situation of cybercrime provided for in Sections 230 to 232 of the Criminal Code and the criminal law assessment of individual variants of the attack. The thesis deals with related problematic points,...
29

Kinderpornografie im Internet - Eine Untersuchung der deutschen Rechtslage unter besonderer Berücksichtigung des Internationalen Strafrechts / Childpornography on the Internet

König, Sabine January 2003 (has links) (PDF)
Die Arbeit gliedert sich in 6 Kapitel. Das 1. behandelt die Anwendbarkeit des deutschen Strafrechts im Rahmen der Internetkriminalität, insbesondere bei § 184 StGB. Hier wird besonders eingegangen auf das Territorialitäts- und das Weltrechtsprinzip und die Frage des Erfolges von abstrakten Gefährdungsdelikten aufgegriffen. Im 2. Kapitel wird § 184 näher betrachtet, d.h. der Schutzzweck wird erörtert und eine Normananlyse durchgeführt. Kapitel 3 behandelt die strafrechtliche Verantwortlichkeit der am Kommunikationsprozess beteiligten Personen (User, Provider). Dabei wird auch ein Blick auf das TDG und EGG geworfen. Anschließend geht es in Kap. 4 und die Stafverfolgung im Internet, d.h. um prozessrechtliche Probleme. Schließlich beschäftigt sich Kap. 5 mit der Cybercrimeconvention und Kap. 6 liefert eine Zusammenfassung. / Childpornografy
30

Criminologias cyber : o que ? propriamente crime no ciberespa?o

Fran?a, Leandro Ayres 10 July 2017 (has links)
Submitted by PPG Ci?ncias Criminais (ppgccrim@pucrs.br) on 2017-07-14T14:56:17Z No. of bitstreams: 1 LEANDRO - Tese - deposito arquivo completo.pdf: 1752576 bytes, checksum: e4eb2039364b52ef0ebcd8bb402d1ba3 (MD5) / Rejected by Caroline Xavier (caroline.xavier@pucrs.br), reason: Devolvido para altera??o de t?tulo e arquivo. on 2017-07-19T13:41:32Z (GMT) / Submitted by PPG Ci?ncias Criminais (ppgccrim@pucrs.br) on 2017-07-20T14:45:36Z No. of bitstreams: 1 LEANDRO_AYRES_FRAN?A_TES.pdf: 1695802 bytes, checksum: a9a54e7833fa75d3f28c75567ad820a0 (MD5) / Approved for entry into archive by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-07-28T19:13:57Z (GMT) No. of bitstreams: 1 LEANDRO_AYRES_FRAN?A_TES.pdf: 1695802 bytes, checksum: a9a54e7833fa75d3f28c75567ad820a0 (MD5) / Made available in DSpace on 2017-07-28T19:17:49Z (GMT). No. of bitstreams: 1 LEANDRO_AYRES_FRAN?A_TES.pdf: 1695802 bytes, checksum: a9a54e7833fa75d3f28c75567ad820a0 (MD5) Previous issue date: 2017-07-10 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior - CAPES / Linked to the Violence, Crime and Public Security research line of the Pontif?cia Universidade Cat?lica do Rio Grande do Sul?s Graduation Program in Criminal Sciences, this thesis analyzes the cyberspace?s architecture and the violations structured and conditioned by this new technology, questioning what is properly cyber about cybercrimes. The first part of the thesis describes, in broad lines, the different perspectives of the debate on the (dis)continuity of traditional criminologies, inquiring the need of alternative criminologies for the cyber crimes, deviations and threats. Therefore, and based on various intellectual resources, factual and philosophical assumptions are presented allowing a new proposition of criminological definition and criteria. From this, the thesis takes on the argument that the development of a new and distinct social environment, cyberspace, with its own ontological and epistemological structures, forms of interactions, functions and possibilities, enabled the emergence of unprecedented criminal phenomenologies, and that the latter require, what has been conventionally called, cyber-criminologies. Once this thesis has as object the study of crimes, deviations and threats developed from, and conditioned by, a new environment (cyberspace), the second chapter is dedicated to the criminological theories that were focused on space when analyzing the criminal phenomena and it explains two fundamental matters of cyberspace: both its neutrality and architecture. The third chapter explains how some traditional criminological theories on the etiology of deviant behavior are adaptable to the cyber context, though it is emphasized the need of a reconfiguration of individual actors into actants, making possible that new ways of understanding technical assemblages of humans/objects are developed. Lastly, and to undergird the thesis? main argument, a cybercrimes? generational taxonomy is presented, followed by explanations and critics, enabling then a clearer and more practical comprehension of cybercrimes? motives, forms and impacts. / Vinculada ? linha de pesquisa de Viol?ncia, Crime e Seguran?a P?blica do Programa de P?s-Gradua??o em Ci?ncias Criminais da Pontif?cia Universidade Cat?lica do Rio Grande do Sul, a presente tese analisa a arquitetura do ciberespa?o e as viola??es estruturadas e condicionadas por essa nova tecnologia, colocando em quest?o o que ? propriamente cyber naquilo que chamamos de cybercrimes. A primeira parte da tese descreve, em linhas gerais, as diferentes perspectivas do debate sobre a (des)continuidade das criminologias tradicionais, questionando se s?o justific?veis criminologias alternativas para os crimes, desvios e amea?as cyber. Para isso, e com fundamento em recursos intelectuais diversos, s?o apresentados pressupostos f?ticos e filos?ficos que permitem uma nova proposi??o de defini??o e crit?rios criminol?gicos. A partir da?, a tese assume o pressuposto de que o desenvolvimento de um ambiente social novo e distinto, o ciberespa?o, com suas pr?prias estruturas ontol?gica e epistemol?gica, formas de intera??o, fun??es e possibilidades, oportunizou a emerg?ncia de fenomenologias criminais in?ditas, e que estas demandam, o que se convencionou chamar de, criminologias cyber. Uma vez que esta tese tem como objeto o estudo de crimes, desvios e amea?as desenvolvidos a partir de, e condicionados por, um novo ambiente (ciberespa?o), a segunda parte do trabalho dedica-se ?s teorias criminol?gicas que tiveram como objeto principal o fator espacial na an?lise do fen?meno criminal e explica duas quest?es fundamentais do ciberespa?o: sua neutralidade e sua arquitetura. No terceiro cap?tulo, explica-se como algumas teorias criminol?gicas tradicionais sobre a etiologia do comportamento desviante s?o adapt?veis ao contexto cyber, mas ? destacada a necessidade de uma reconfigura??o dos atores individuais em atuantes, tornando poss?vel que sejam desenvolvidas novas formas de compreender conjuntos t?cnicos de humanos/objetos. Por fim, e para refor?ar o argumento central da tese, ? apresentada uma taxonomia geracional dos cybercrimes, acompanhada de explica??es e cr?ticas, permitindo, assim, uma compreens?o mais clara e pr?tica dos motivos, formas e impactos dos cybercrimes.

Page generated in 0.0714 seconds