• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 6
  • 6
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Detecting age in online chat

Tam, Jenny K. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Martell, Craig H. "September 2009." Description based on title screen as viewed on November 6, 2009. Author(s) subject terms: Authorship Profiling, Age Detection, Online Chat, Naïve Bayes Classifier, Support Vector Machine. Includes bibliographical references (p.125-127). Also available in print.
2

>Die> Tatortregel bei Internetdelikten : Zur Anknüpfung haftungsrechtlich relevanten Verhaltens in der vernetzten Welt.

Kindereit, Kai. January 2005 (has links)
Zugl.: Düsseldorf, Univ., Diss 2004.
3

Criminal Justice Responses to Emerging Computer Crime Problems

Sen, Osman N. 08 1900 (has links)
This study discussed the issue of computer crime as it relates to the criminal justice system, specifically law enforcement. The information was gathered through several books, academic journals, governmental documents, and the Internet. First, the nature and forms of computer crime, Internet crime, and cyber terrorism were analyzed. Next, law enforcement responses were discussed. International aspects of the problem were separately pointed out. Further, detection and investigation of computer crime were examined. Problems related to the each component of the criminal justice system (law enforcement, investigators, prosecutors, and judges) were described. Specific solutions to these problems were offered. In addition, computer crime handling procedures were presented. Results indicate that computer crime will increase in the 21st century, and this problem cannot be controlled by traditional methods alone. Using new technology as preventive measures, and increasing awareness and security conscious culture will prevent the problem in the long run.
4

Partnership policing of electronic crime: an evaluation of public and private police investigative relationships

McKenzie, Shane E. H. Unknown Date (has links) (PDF)
Law enforcement agencies worldwide, including those in Australia, have declared partnerships with the private sector to police e-crime as “critical”. However, this strategy faces uncertainties about appropriate formats and the potential for fostering corruption. Sarre and Prenzler’s (2000) Regulated Intersections model proposes that, to avoid corruption, cooperation must be limited and regulated closely. Consequently, this thesis examines the conditions under which investigative partnership policing of e-crime at the state police level can be mutually beneficial to police and the private sectors, while maintaining public interests. The thesis aims, therefore, to establish normative standards and guidelines for configuring effective and ethical public-private partnerships for e-crime investigation. An exploratory analysis of 3529 e-crime incidents, reported to and cleared by Victoria Police during 1999/00 to 2003/04, investigated the nature of reported e-crime, routine factors affecting its successful investigation and whether partnership was one of those factors. A pilot survey canvassed private sector responses to these issues and partnered e-crime investigation. Thirty-seven interviews were conducted with police, private investigators and e-crime victims. During the research, three Australian attempts at public-private investigative partnership formed to varying success, including the Joint Banking and Finance Sector Investigation Team (JBFSIT) at the Australian High Tech Crime Centre.
5

Local Law Enforcement in the Realm of Cyberspace: The Role of Local Law Enforcement Agencies in Controlling Internet Crime

Carter, James W., II 19 April 2011 (has links)
No description available.
6

The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions

Ibekwe, Chibuko Raphael January 2015 (has links)
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime. This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011.

Page generated in 0.3492 seconds