• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 1
  • Tagged with
  • 9
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Socio-legal enquiry into the motivating factors of cyberbullying in Malaysia

Mohamad, A.M., Md Isa, Y., Aziz, A.S.A., Mohd Noor, N.A., Ibrahim, H., Ghazali, O., Kamaruddin, S., Wan Rosli, Wan R. 25 September 2023 (has links)
No / Cyberbullying is the act of bullying or causing harassment or intimidation on another person by using technological means, such as devices, social media or networks. Despite the numerous efforts being carried out by both government and non-government organizations, cyberbullying continues to be on the rise and has become a national concern. This study highlights the motivating factors of cyberbullying in Malaysia. First, the study aims to investigate the factors motivating persons becoming cyberbullying perpetrators. Second, the study aims to examine the factors enhancing the susceptibility of persons becoming victims of cyberbullying. Engaging in both qualitative and quantitative approaches, this study adopts socio-legal approach in understanding and enquiring 19 interview experts and 120 survey respondents. The study found various factors that motivates perpetrators of cyberbullying, which could be divided into internal and external factors. Similarly, the factors that enhance the susceptibility of victims of cyberbullying could also be internal and external. The implication of the study is deeper understanding of the various factors motivating cyberbullying in Malaysia. Inherently, risk management strategies could be proposed could be developed to minimize the factors hence reducing the likelihood of cyberbullying occurrences in Malaysia. Hopefully, the findings of the study would contribute to the body of knowledge on the area of cybercrimes in general, and cyberbullying in particular. It is also hoped that this study would assist the general public to better manage the risk of cyberbullying, within the wider agenda of safe nation in Malaysia. / This study is funded by the Digital Society Research Grant Fund (DSRG) by Malaysian Communications and Multimedia Commission (MCMC), Malaysia.
2

Strategies to Reduce the Fiscal Impact of Cyberattacks

Smith, Shirley Denise 01 January 2019 (has links)
A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone interviews and collection and review of public documents. The data analysis process of this study involved the use of Yin's 5-step process of compiling, disassembling, reassembling, interpreting, and concluding, which provided a detailed analysis of the emerging themes. The findings produced results that identified strategies organizational managers and administrators of a U.S. airline implemented to reduce the fiscal influence of cyberattacks, such as proactive plans for education and training, active management, and an incident response plan. The findings of this study might affect social change by offering all individuals a perspective on creating effective cyberculture. An understanding of cyberculture could include the focus of a heightened understanding, whereby, to ensure the security of sensitive or privileged data and information and of key assets, thus, reducing the fiscal devastation that may be caused by cyberattacks.
3

Configurações do racismo nas redes sociais

Pena, Kamila Dutra 29 August 2017 (has links)
Submitted by FABIANA DA SILVA FRANÇA (fabiana21franca@gmail.com) on 2018-02-15T15:24:39Z No. of bitstreams: 1 Arquivo total.pdf: 2566373 bytes, checksum: a7ef5133bbb3cb328ab782ee25bcabf4 (MD5) / Made available in DSpace on 2018-02-15T15:24:43Z (GMT). No. of bitstreams: 1 Arquivo total.pdf: 2566373 bytes, checksum: a7ef5133bbb3cb328ab782ee25bcabf4 (MD5) Previous issue date: 2017-08-29 / It deals with an exploratory research with the purpose of investigating how society manifests itself on the black in the social network Facebook. For this, the theoretical framework on the current digital culture and also on racism was contextualized. The methodology was based on the use of software called NetVizz, which interacts with Facebook's Application Programming Interface (API), allowing the extraction of data for analysis. Among the six different types of NetVizz modules were chosen two of them: Page data and search data. The data were analyzed using the Bardin content analysis methodology. In view of the pre-established criteria, the page '' 30 Days Without Racism '' was selected for analysis and the research was divided into four categories: racism; Institutional racism; Reverse racism; Racism and racial insult. As it is extracted from the research, the social networks have great power of propagation of message and of social interactions. He verified that social actors use the network as a way to educate other users about racism and about the importance of combating prejudice and discrimination against blacks, generating diverse debates on the subject, among them what would or would not be framed as a crime, of Racism or racial insult. / Trata de uma pesquisa exploratória com a finalidade de investigar como a sociedade se manifesta sobre o negro na rede social Facebook. Para isso, foi contextualizado o referencial teórico sobre a cultura digital vigente e também sobre o racismo. A metodologia partiu do uso de um software denominado NetVizz, que interage com a API (Application Programming Interface) do Facebook, permitindo extrair dados para análise. Entre os seis tipos de módulos distintos do NetVizz foram escolhidos dois deles: dados de Páginas (page data) e pesquisa (search). Os dados encontrados foram analisados por meio da metodologia de análise de conteúdo de Bardin. Diante dos critérios preestabelecidos, foi selecionada a página ‘’30 Dias Sem Racismo’’ para análise e a pesquisa se dividiu em quatro categorias: racismo; racismo institucional; racismo reverso; racismo e injúria racial. Conforme se extrai da pesquisa, as redes sociais têm grande poder de propagação de mensagem e de interações sociais. Verificou que os atores sociais utilizam a rede como forma de educar outros usuários sobre o racismo e sobre a importância do combate ao preconceito e discriminação contra os negros, gerando debates diversos sobre o assunto, entre eles o que seria ou não enquadrado como crime, de racismo ou injúria racial.
4

Mapeamento de incidentes com identidades digitais e estratégias de controle em ambientes virtuais

GOMES, Anselmo Lacerda 31 August 2015 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-04-07T13:22:15Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5) / Made available in DSpace on 2016-04-07T13:22:15Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5) Previous issue date: 2015-08-31 / O Roubo de Identidade Digital (RID) é o roubo de informações que resulta na possibilidade de alguém assumir a identidade da vítima. Em decorrência disso, credenciais de acesso e dados dispostos em qualquer meio eletrônico ficam vulneráveis, como em computadores e em dispositivos móveis. Ultimamente, esses dispositivos têm sido bastante visados pelos atacantes, devido à sensibilidade e pessoalidade dos dados nele armazenados. Senhas, informações bancárias, financeiras e de geolocalização são apenas alguns exemplos de dados expostos a essa vulnerabilidade moderna. O RID é uma prática que pode resultar no êxito de diversos outros crimes associados, por exemplo, estelionato, espionagem, ciberterrorismo e ciberguerra. Suas implicações são sérias, já que o atacante pode assumir o controle de instalações industriais, centros militares, governos e organizações inteiras, sendo imprevisíveis os danos à ordem pública e aos cidadãos. Neste trabalho foi utilizada a metodologia de mapeamento sistemático para identificar quais são os principais incidentes de segurança associados ao RID. Relações e relativizações foram realizadas a fim de mapear as suas principais causas e consequências. A principal contribuição desta dissertação é o mapeamento sistemático de RID. Finalmente, esta dissertação de mestrado objetivou delinear o conhecimento sobre o assunto, de forma atualizada, indicando diretrizes para a minimização ou completa prevenção de incidentes dessa natureza. / The Digital Identity Theft (DIT) is the stealing of information that allows the attacker to take the victim’s identity, somehow. This promotes the access to credentials and data disposed in computers, mobile devices or any electronic environment, making them vulnerable. Recently, mobile devices are being very targeted because of the sensibility and personality of the data found there. Passwords, bank, financial and geolocation information are just some examples of data being exposed by this modern vulnerability. DIT is a practice that may result in the success of many other associated crimes, like embezzlement, espionage, cyberterrorism and cyberwar. Its implications are serious because the attacker can assume the control of industrial facilities, military centres, government and entire organizations, damaging the public order and the people to an unpredictable extent. This work used the systematic mapping methodology to identify which are the main security incidents related to DIT. Relations and relativizations were performed to map its main causes and consequences. Finally, this dissertation aimed to delineate the knowledge on the subject, indicating guidelines to minimize or avoid entirely incidents with this nature.
5

La contribution des dynamiques internationales formelles au renforcement de la cybersécurité canadienne

Vodouhe, Carolle 05 1900 (has links)
No description available.
6

A transnacionalidade do comércio eletrônico: uma análise dos desafios e logros no âmbito do Direito Internacional Privado / Cross-Border E-Commerce: an analysis of the challenges and achievements under the Private International Law

Fernanda Miguez Costa 22 August 2014 (has links)
Ante a crescente utilização dos meios eletrônicos como forma de viabilizar o comércio de produtos e serviços além das fronteiras estatais o presente estudo tem como escopo identificar os desafios oriundos do embate entre a realidade cibernética e o direito internacional contemporâneo, pontuando, de forma crítica, as soluções descortinadas pela sociedade internacional. Isto porque as questões de direito internacional, já conflituosas no âmbito do comércio internacional tradicional, se mostram ainda mais subjetivas no peculiar ambiente virtual, em regra desmaterializado e a desterritorializado. Tais características e peculiaridades refletem na identificação da jurisdição e da lei aplicável no contrato eletrônico, nas soluções para o combate do cibercrime e na solução alternativa de conflitos, ademais de outros temas que foram possíveis de serem abordados neste estudo. Para tanto é proposto um exame das soluções até então desenvolvidas para a regularização e/ou padronização das condutas no âmbito do comércio internacional por via eletrônica, colacionando a normativa e a jurisprudência implementadas e/ou em desenvolvimento na área. / In view of the increasing on the usage of electronic media as a means to facilitate the trade of goods and services beyond the State borders, the purpose of this study is to identify the challenges arising from the clash between the practices in the cyberspace and the contemporary law, showing in a critically way the solutions unveiled by international society. The international law issues, that are already conflictual before the traditional international trade, become even more subjective in particular virtual environment, dematerialized and deterritorialized. Such characteristics and peculiarities reflects in the identification of jurisdiction and applicable law, in the solutions to prevent the cybercrime and in the alternative dispute resolutions as well as other subjects that were likely to be addressed in this study. Therefore this study intends to examine the solutions developed so far in order to regularize and/or standardize the actions in the electronically international trade, presenting rules and case law implemented or in developing in the area.
7

A transnacionalidade do comércio eletrônico: uma análise dos desafios e logros no âmbito do Direito Internacional Privado / Cross-Border E-Commerce: an analysis of the challenges and achievements under the Private International Law

Fernanda Miguez Costa 22 August 2014 (has links)
Ante a crescente utilização dos meios eletrônicos como forma de viabilizar o comércio de produtos e serviços além das fronteiras estatais o presente estudo tem como escopo identificar os desafios oriundos do embate entre a realidade cibernética e o direito internacional contemporâneo, pontuando, de forma crítica, as soluções descortinadas pela sociedade internacional. Isto porque as questões de direito internacional, já conflituosas no âmbito do comércio internacional tradicional, se mostram ainda mais subjetivas no peculiar ambiente virtual, em regra desmaterializado e a desterritorializado. Tais características e peculiaridades refletem na identificação da jurisdição e da lei aplicável no contrato eletrônico, nas soluções para o combate do cibercrime e na solução alternativa de conflitos, ademais de outros temas que foram possíveis de serem abordados neste estudo. Para tanto é proposto um exame das soluções até então desenvolvidas para a regularização e/ou padronização das condutas no âmbito do comércio internacional por via eletrônica, colacionando a normativa e a jurisprudência implementadas e/ou em desenvolvimento na área. / In view of the increasing on the usage of electronic media as a means to facilitate the trade of goods and services beyond the State borders, the purpose of this study is to identify the challenges arising from the clash between the practices in the cyberspace and the contemporary law, showing in a critically way the solutions unveiled by international society. The international law issues, that are already conflictual before the traditional international trade, become even more subjective in particular virtual environment, dematerialized and deterritorialized. Such characteristics and peculiarities reflects in the identification of jurisdiction and applicable law, in the solutions to prevent the cybercrime and in the alternative dispute resolutions as well as other subjects that were likely to be addressed in this study. Therefore this study intends to examine the solutions developed so far in order to regularize and/or standardize the actions in the electronically international trade, presenting rules and case law implemented or in developing in the area.
8

La prévention de la cybercriminalité : résultats d’une enquête sur les effets perçus d’une campagne de prévention réalisée par une institution financière

Coutu, Cameron 08 1900 (has links)
La recherche menée dans le cadre de ce mémoire s’intéresse à la prévention des cybercrimes. De façon plus précise, l’étude avait pour objectif d’évaluer les effets perçus d’une campagne de prévention des cybercrimes réalisée par une institution financière canadienne. Une attention particulière a été accordée aux perceptions des personnes en lien avec leur sentiment de sécurité. Après la fin de la campagne (qui a eu lieu en octobre 2018), 1452 clients francophones (831 hommes et 521 femmes) ont répondu au sondage par l’entremise d’un panel web disponible en ligne. Les résultats indiquent que la campagne de prévention a été bien perçue pour une majorité des répondants (75%), en particulier chez les participants plus âgés (55 ans et plus). Les analyses ont aussi révélé que le genre n’était pas un facteur associé significativement aux réponses des répondants. De façon générale, les participants ont estimé que la campagne avait contribué à augmenter leur sentiment de sécurité, cependant, on constate que la campagne a manqué de visibilité car seulement un faible pourcentage d’individus se souvient l’avoir vue avant de répondre au sondage. Il en ressort néanmoins que la plupart des répondants sondés ont démontré de l’intérêt à recevoir plus d’informations sur la cybercriminalité et les moyens de s’en protéger. Dans le futur, il serait utile de mener des campagnes de prévention plus ciblées afin de mieux atteindre les objectifs poursuivis. La discussion fait état de plusieurs autres recommandations qui prennent appui sur les résultats obtenus et sur l’analyse de la documentation consultée. / The purpose of this study was to evaluate the impact of a prevention campaign about cybercrimes that was run by a Canadian financial institution. More specifically, we examined how participants/clients perceived the financial institution’s initiative to inform them about cybercrimes. The study also explored whether or not the campaign had the desired effect, which was to reinforce their sense of security. This campaign took place on October 2018 and 1,452 adults (831 males and 521 females) participated in the online web survey. The results indicated that the prevention campaign had been positively perceived by most of the respondents (75%), especially among older individuals (55 y/o and over). Further analysis has shown no gender differences in participants’ responses. In general, participants felt that the campaign has increased their sense of safety; however, they also noted that the campaign lacked visibility and only a low percentage of individuals had seen it prior to the completion of the survey. Nonetheless, most participants have expressed an interest in receiving more information on cybercrime and how to take actions on protecting one’s self. In the future, it would be advisable to conduct targeted prevention campaigns in order to better achieve its objectives. Discussion also includes recommendations based on the results and the review of the literature.
9

IMPLEMENTATION OF DIGITAL FORENSIC TOOLS IN WHITE-COLLAR CYBERCRIMES. : A QUALITATIVE STUDY ABOUT IMPLEMENTATION OF DIGITAL FORENSIC TOOLS IN INVESTIGATION OF WHITE-COLLAR CYBERCRIMES.

NDOPE, AISHA January 2024 (has links)
Minimal research has been conducted regarding the connection between white collar crime, cybercrime and the effectiveness of digital forensic tools that can assist in combating this new type of crime. The aim of this study is to understand and examine the role that digital forensic tools play during the investigation of white-collar cybercrimes and to evaluate how effective these tools are when implemented in white-collar cybercrime investigations. By conducting in-depth interviews and using a Rational choice theory driven thematic analysis, the findings of this research have revealed how important adaptability of digital forensic tools is to the emerging cybercrime techniques, together with their integration of existing systems, and the adherence to legal and ethical standards. The findings also noted the challenges that are faced by digital investigators when implementing these digital forensic tools in white-collar crimes investigations and the importance of using updated digital forensic tools and skill developed cybersecurity experts to enhance the outcome of investigations. This study concludes by discussing that it is important for digital forensic tools to be continuously updated and skillfully utilized in the investigation of white-collar cybercrimes and that the significant challenges must be addressed for accurate and more reliable investigative outcomes. Various evaluation methodologies should also be developed as different variations of methodological approaches can improve the standards of research and thus provide frameworks that are more reliable for digital forensic studies and white-collar cybercrime investigations.

Page generated in 0.0312 seconds