• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 35
  • 17
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 120
  • 22
  • 21
  • 20
  • 19
  • 17
  • 16
  • 16
  • 16
  • 15
  • 15
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Porušování autorského práva s využitím kybernetického prostoru / Violation of Authors' Rights Using Cyberspace

Křížovská, Kristina January 2020 (has links)
Violation of Authors' Rights Using Cyberspace Abstract This diploma thesis describes violation of authors' rights in cyberspace, especially the most common ways of committing this crime. The thesis is divided into five parts. The first chapter contains a general introduction to the topic, it defines the basic concepts (such as computer and related terms of hardware and software, internet, cyberspace and cybercrime), which serve as a basis for other parts of the work. The second chapter deals with copyright as such. It explains the concept of copyright work and describes the individual rights of the author. Given the nature of this criminal activity, it is not possible to limit the interpretation to the criminal law regulation. The second chapter thus indicates what rights of the author are affected, which works are subject to copyright infringement, which works are excluded from copyright protection and, finally, what are the limitations and exceptions to copyright. The third part is followed by a brief overview of the legislation that can be applied to the area of copyright (or generally to cybercrime). This includes national (Czech), European and international legislation, as it is an issue that in many cases crosses national borders. The fourth part of the thesis is a crucial part, because it deals with...
62

Právní úprava kybernetických zločinů v Evropské unii / Legal provisions on cybercrime in the European Union

Jonášová, Eliška January 2021 (has links)
Legal provisions on cybercrime in the European Union Abstract This thesis deals with a complex phenomenon of cybercrime from the perspective of legal provisions of the European Union. Therefore, the thesis presents the fundamental features of cybercrime and presents the fundamental typology of this crime, which is supplemented by examples of the most common crimes. This general framework describing cybercrime is followed by an analysis of the legal provisions of the international law and Union law. Witihin the framework of the international legal provisions the thesis presents the activities of the universal organizations, in particular the Council of Europe, whose international convention on cybercrime is also subject to the analysis, and of the regional organizations.The legal regulation of cybercrime in the European Union is examined from the point of view of both primary and secondary law, outlining the fundamental orientation of the Union's policies concerning information technology. Following the clarification of the EU legal provisions on cybercirme, the thesis also presents the legal framework of such area within the Canadian law. Canada has been chosen in view of the fact that belongs between signatories to the Council of Europe Convention on Cybercrime and is actively involved in cyber security....
63

Trestné činy z nenávisti / Hate Crimes

Korduliak, Matěj January 2020 (has links)
Hate Crimes Abstract The author of this thesis discusses the issue of hate crimes according to the Act No. 40/2009 Coll., The Criminal Code, as amended, and related case law. The thesis is divided into several parts. The first part is devoted to the definition of hate crime and related terms such as extremism, prejudice, race, anti-Semitism, nationalism and xenophobia. These concepts are important for the following interpretation and for the understanding of the existence of special protection in the context of hate crimes. The second part is devoted to the international regulation of hate crimes. Emphasis is places on the analysis of the case law of the European Court of Human Rights. The third and fundamental part of this master thesis analyzes hate crimes in the Czech Republic in the context of settled and current case law. In addition, examples of statements fulfilling the facts of individual crimes from practice are given. The fourth part analyzes the basic issues of hate speech and hate crimes in the United States legislation and case law. It also includes comparison of individual approaches with ideas of possible inspiration. The fifth part is devoted to reflections de lege ferenda on the topic, especially with regard to different concepts in the Czech Republic and the United States. The last part...
64

Kyberterorismus a digitální pirátství / Cyberterrorism and digital piracy

Knopová, Martina January 2011 (has links)
The thesis "Cyberterrorism and digital piracy" deals with the description of aims, motivation, tools, and consequences of current cyberwars. First of all, it concentrates on features of cyberconflicts while trying to indentify and define the essence of cyberterrorism, its principles, causes, and threats. Besides a description of common cyberwar methods, it provides a reader with a detailed analysis of the "Information Assurance" concept, which represents a form of strategy used to define risks of information security in the cyberspace. The analytic part of the thesis concerns concrete cases of the international cyberterorism and its forms in the 2007 to 2010 cyberwars. It also analyses some particular cyberattacks from the geopolitical point of view in a chronoligical way, especially those that happened in the European-Russian, Asian-American and Middle-Eastern regions. The comparation of the theoretical "Information Assurance" model and partial analyses of individual cyberwar examples has showed that not to keep the model reasons in the real disruption of the information security for a particular system. This fact notably contributed to the inception of aforementioned cyberconflicts, therefore the validity and applicability of the Information Assurance" concept the has been proved.
65

Cybercrime Using Electronical Identification

Brandt Hjertstedt, Eleonor January 2019 (has links)
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID. / This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
66

Lutte contre les botnets : analyse et stratégie / The fight against botnets : from observation to strategy

Freyssinet, Eric 12 November 2015 (has links)
Les botnets, ou réseaux d’ordinateurs infectés par un code malveillant et connectés à un système de commande et de contrôle, constituent le premier outil de la délinquance sur Internet. Ils permettent de concrétiser le développement d’un nouveau type d’activités criminelles: le crime comme un service (CaaS). Ils constituent un défi en matière de répression. D’abord par l’importance de leur impact sur la sécurité des réseaux et la commission d’infractions sur Internet. Ensuite par la dimension extrêmement internationale de leur diffusion et donc une certaine difficulté à mener des investigations. Enfin, par le grand nombre des acteurs qui peuvent être impliqués (codeurs, maîtres de botnets, intermédiaires financiers). Cette thèse porte sur l’étude des botnets (composantes, fonctionnement, acteurs), la proposition d’une méthode de collecte de données sur les activités liées aux botnets et les dispositifs techniques et organisationnels de lutte contre les botnets ; elle conclut sur des propositions en matière de stratégie pour cette lutte. Les travaux menés ont permis de confirmer la pertinence, pour l’étude efficace des botnets, d’un modèle englobant l’ensemble de leurs composants, y compris les infrastructures et les acteurs. Outre un effort de définition, la thèse apporte un modèle complet du cycle de vie d’un botnet et propose des méthodes de catégorisation de ces objets. Il en ressort la nécessité d’une stratégie partagée qui doit comporter les éléments de détection, de coordination et la possibilité, voire l’obligation, pour les opérateurs de mettre en œuvre des mesures de mitigation. / Botnets, or networks of computers infected with malware and connected to a command and control system, is one of the main tools for criminal activities on the Internet today. They allow the development of a new type of crime: crime as a service (CaaS). They are a challenge for law enforcement. First by the importance of their impact on the security of networks and the commission of crimes on the Internet. Next, with regards to the extremely international dimension of their dissemination and therefore the enhanced difficulty in conducting investigations. Finally, through the large number of actors that may be involved (software developers, botnet masters, financial intermediaries, etc.). This thesis proposes a thorough study of botnets (components, operation, actors), the specificaion of a data collection method on botnet related activities and finally the technical and organizational arrangements in the fight against botnets; it concludes on proposals on the strategy for this fight. The work carried out has confirmed the relevance, for the effective study of botnets, of a model encompassing all their components, including infrastructure and actors. Besides an effort in providing definitions, the thesis describes a complete model of the life cycle of a botnet and offers methods for categorization of these objects. This work shows the need for a shared strategy which should include the detection elements, coordination between actors and the possibility or even the obligation for operators to implement mitigation measures.
67

Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access

Twisdale, Jerry Allen 01 January 2018 (has links)
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner's knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention.
68

Dopad COVID-19 na bezpečnostní politiku států v oblasti kybernetické bezpečnosti / Impact of COVID-19 on Security Policies of States in the Area of Cyber Security

Rieger, Anastasiya January 2022 (has links)
CHARLES UNIVERSITY FACULTY OF SOCIAL SCIENCES Master of International Security Systems Anastasiya Neskoromna/Rieger Impact of COVID 19 on Security Policies of States in the Area of Cyber Security Abstract Prague 2022 Author: Ms. Anastasiya Neskoromna/Rieger Supervisor: prof. David Erkomashvile, Ph.D. Academic Year: 2021/2022 Abstract The SARS-Cov-19 or in different wording the global Covid pandemic outburst have created an unprecedented scenario for various organizations, agencies and structures. The COVID-19 pandemic in 2020 has become an extraordinary and shocking event for the world community and the global economy. On the part of the authorities, the COVID-19 pandemic is accompanied by sometimes harsh and ambiguous decisions, the consequences of which are felt by people in many countries of the world: movement between countries was stopped, businesses and enterprises were closed, the restriction was created, those who were sick or at risk of infection were isolated. There was also no possible assumption regarding how long such a mode of life will last. Many factors as a consequential chain of reactions from the pandemic in the aggregate have created a pleasant environment for altering and modifying the cybercrime landscape. This work aims to analyze the factorial presence of modification in the sphere...
69

The offline impact of cyberbullying

Ortiz, Kathleen 01 May 2013 (has links)
Over the recent years, we have seen an immense increase in technology. Though the Internet can be convenient to students, it can also bear negative repercussions. Cyberbullying has impacted millions of people across the nation hindering them in many ways. The Bullying occurs through different outlets, from websites, emails to text messages. Victims cannot truly escape the matter because it follows them wherever they may go. The intent of this thesis was to see who the victims of cyberbullying are, what the aftermath effect is, and whether they notify an adult about their situation. Using data from the School Crime Supplement based on the National Crime Victimization Survey, the findings suggest that females are victims of cyber bullying more frequently than males and that adults are not commonly notified when victimization occurs. Furthermore, the repercussions of victimization include fear of harm or attack, as well as skipping classes to avoid the problem. By exploring cyberbullying and its effect, through time studies such as this one will raise awareness in society and contribute towards the solution of cyberbullying.
70

What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground

Bachmann, Michael 01 January 2008 (has links)
The increasing dependence of modern societies, industries, and individuals on information technology and computer networks renders them ever more vulnerable to attacks on critical IT infrastructures. While the societal threat posed by hackers and other types of cyber-criminals has been growing significantly in the last decade, main-stream criminology has only recently begun to realize the significance of this threat. Cyber-criminology is slowly emerging as a subfield of criminological study and has yet to overcome many of the problems other areas of criminological research have already mastered. Aside from substantial methodological and theoretical problems, cyber-criminology currently also suffers from the scarcity of available data. As a result, scientific answers to crucial questions, such as who exactly the attackers are and why they engage in hacking activities, remain largely fragmentary. The present study begins to fill this remaining gap in the literature. It examines survey data about hackers, their involvement in hacking, their motivations to hack, and their hacking careers. The data for this study was collected during a large hacking convention in Washington D.C. in February 2008. The theoretical framework guiding the analyses is the rational choice perspective (Clarke & Cornish, 1985). Several hypotheses about hackers are derived from the theory and some of its models are transposed into the context of hackers. Results suggest that the rational choice perspective is a viable theory when applied to cyber-criminals. Findings also demonstrate that the creation of more effective countermeasures requires adjustments to our understanding of who hackers really are and why they hack.

Page generated in 0.1011 seconds