Works matching Computer crime
Results: 4036
KOMPIUTERINIŲ NUSIKALTIMŲ PĖDSAKAI: SAMPRATA, RŪŠYS IR JŲ SUSIDARYMO MECHANIZMAS.
- Published in:
- Jurisprudence / Jurisprudencija, 2006, v. 11, n. 89, p. 50
- By:
- Publication type:
- Article
Police Perceptions of Computer Crimes in Two Southeastern Cities: An Examination from the Viewpoint of Patrol Officers.
- Published in:
- American Journal of Criminal Justice, 2012, v. 37, n. 3, p. 396, doi. 10.1007/s12103-011-9131-5
- By:
- Publication type:
- Article
Impacto de los delitos informáticos en la economía empresarial del Ecuador.
- Published in:
- Sinergia Académica, 2024, v. 7, n. 4, p. 452
- By:
- Publication type:
- Article
COMPUTER CRIME AS A FORM OF THREAT CAUSED BY THE PROGRESS IN INFORMATION TECHNOLOGY.
- Published in:
- Security Dialogues, 2017, v. 8, n. 2, p. 449, doi. 10.47054/sd171-20449n
- By:
- Publication type:
- Article
Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime.
- Published in:
- Journal of Global Information Management, 2022, v. 30, n. 7, p. 1, doi. 10.4018/JGIM.295450
- By:
- Publication type:
- Article
Multi-Criteria Evaluation of the Effectiveness of Computer Crime Disclosure Under Ecuadorian Legal Regulations.
- Published in:
- Fusion: Practice & Applications, 2024, v. 15, n. 2, p. 73, doi. 10.54216/FPA.150206
- By:
- Publication type:
- Article
Analysis of Computer Crime in Singapore using Local English Newspapers.
- Published in:
- Singapore Journal of Library & Information Management, 2009, v. 38, p. 77
- By:
- Publication type:
- Article
Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network.
- Published in:
- British Journal of Criminology, 2013, v. 53, n. 2, p. 319, doi. 10.1093/bjc/azs067
- By:
- Publication type:
- Article
Process Modeling and Extraction of Patterns of Computer Crimes Using Data Mining.
- Published in:
- Computer Science Journal of Moldova, 2020, v. 28, n. 1, p. 45
- By:
- Publication type:
- Article
Computer crime motives: Do we have it right?
- Published in:
- Sociology Compass, 2023, v. 17, n. 4, p. 1, doi. 10.1111/soc4.13077
- By:
- Publication type:
- Article
Computer Crime Victimization and Integrated Theory: An Empirical Assessment.
- Published in:
- International Journal of Cyber Criminology, 2008, v. 2, n. 1, p. 308
- By:
- Publication type:
- Article
Crime in the Age of the Smart Machine: A Zuboffian Approach to Computers and Crime.
- Published in:
- International Journal for Crime, Justice & Social Democracy, 2022, v. 11, n. 1, p. 225, doi. 10.5204/ijcjsd.2136
- By:
- Publication type:
- Article
Delitos informáticos y entorno jurídico vigente en Colombia.
- Published in:
- Cuadernos de Contabilidad, 2010, v. 11, n. 28, p. 41
- By:
- Publication type:
- Article
EL DELITO DE DAÑOS INFORMÁTICOS: UNA TIPIFICACIÓN DEFECTUOSA.
- Published in:
- Estudios Penales y Criminológicos, 2009, n. 29, p. 311
- By:
- Publication type:
- Article
Managing Corporate Computer Crime and the Insider Threat: the Role of Cognitive Distortion Theory.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 2, p. 19
- By:
- Publication type:
- Article
ABUSE OF PAYMENT CARDS AS EMERGING FORMS OF COMPUTER CRIME IN THE REPUBLIC OF NORTH MACEDONIA.
- Published in:
- Vizione, 2024, n. 43, p. 191
- By:
- Publication type:
- Article
The Global Problem of Computer Crimes and the Need for Security.
- Published in:
- Industrial Management, 1991, v. 33, n. 4, p. 24
- By:
- Publication type:
- Article
CRIME IN THE COMPUTER AGE: THE LAW ENFORCEMENT PERSPECTIVE.
- Published in:
- Texas Review of Law & Politics, 1999, v. 4, n. 1, p. 59
- By:
- Publication type:
- Article
Status and Tendencies in Combating Computer Crime at European Level.
- Published in:
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2011, v. 45, n. 1, p. 487, doi. 10.5937/zrpfns1101487P
- By:
- Publication type:
- Article
The law on computer crime in Italy.
- Published in:
- Information & Communications Technology Law, 1997, v. 6, n. 3, p. 249, doi. 10.1080/13600834.1997.9965771
- By:
- Publication type:
- Article
Computer Crime Surveys Yield Mixed Results.
- Published in:
- Internal Auditor, 2004, v. 61, n. 4, p. 16
- By:
- Publication type:
- Article
Using Tittle's control balance theory to understand computer crime and deviance.
- Published in:
- International Review of Law, Computers & Technology, 2008, v. 22, n. 1/2, p. 145, doi. 10.1080/13600860801925086
- By:
- Publication type:
- Article
THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS*.
- Published in:
- Criminology, 1988, v. 26, n. 1, p. 101, doi. 10.1111/j.1745-9125.1988.tb00834.x
- By:
- Publication type:
- Article
CRIME INVESTIGATION: A COURSE IN COMPUTER FORENSICS.
- Published in:
- Communications of the Association for Information Systems, 2006, v. 18, p. 2, doi. 10.17705/1CAIS.01810
- By:
- Publication type:
- Article
BİLİŞİM SİSTEMİNE GİRME SUÇUNUN YARGI KARARLARI BAĞLAMINDA İNCELENMESİ.
- Published in:
- Hacettepe Law Review, 2020, v. 10, n. 2, p. 406, doi. 10.32957/hacettepehdf.726568
- By:
- Publication type:
- Article
Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later.
- Published in:
- International Journal of Cyber Criminology, 2023, v. 17, n. 1, p. 102, doi. 10.5281/zenodo.4766607
- By:
- Publication type:
- Article
The Three Elements of Computer Crime.
- Published in:
- Journal of Offender Monitoring, 2002, v. 15, n. 2, p. 11
- By:
- Publication type:
- Article
Effective Management of Rapid Intervention, Investigation, Analysis and Reporting Processes in Computer Crimes with New-Generation Digital Forensic Methods.
- Published in:
- Journal of Polytechnic, 2024, v. 27, n. 5, p. 1945
- By:
- Publication type:
- Article
PUTTING COMPUTER-RELATED CRIME IN PERSPECTIVE.
- Published in:
- Journal of Policy Analysis & Management, 1987, v. 6, n. 4, p. 714, doi. 10.2307/3323530
- By:
- Publication type:
- Article
Task Force Tackles Computer Crime.
- Published in:
- IEEE Software, 2004, v. 21, n. 4, p. 99
- By:
- Publication type:
- Article
SOME REMARKS REGARDING THE CRIMINALIZATION AND THE FORENSIC INVESTIGATION OF THE CRIME OF COMPUTER FORGERY IN THE ROMANIAN LEGISLATION.
- Published in:
- Bulletin of the Transilvania University of Brasov, Series VII: Social Sciences & Law, 2021, v. 14 (63), p. 197, doi. 10.31926/but.ssl.2021.14.63.3.25
- By:
- Publication type:
- Article
An empirical analysis of sentencing of "Access to Information" computer crimes.
- Published in:
- Journal of Empirical Legal Studies, 2023, v. 20, n. 2, p. 434, doi. 10.1111/jels.12349
- By:
- Publication type:
- Article
Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination.
- Published in:
- Journal of Education for Business, 2011, v. 86, n. 2, p. 119, doi. 10.1080/08832323.2010.489587
- By:
- Publication type:
- Article
Carr, Indira (2009).Computer Crime.
- Published in:
- 2012
- By:
- Publication type:
- Book Review
A Survey of Computer Crime Legislation in the United States.
- Published in:
- Information & Communications Technology Law, 1999, v. 8, n. 1, p. 35, doi. 10.1080/13600834.1999.9965797
- By:
- Publication type:
- Article
NO FREE LUNCH (OR WI-FI): MICHIGAN'S UNCONSTITUTIONAL COMPUTER CRIME STATUTE.
- Published in:
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- By:
- Publication type:
- Article
COMPUTER CRIME (Book Review).
- Published in:
- 1982
- Publication type:
- Book Review
CRIMINOLOGICAL CHARACTERISTICS OF COMPUTER CRIME.
- Published in:
- Journal of Criminal Investigation, 2012, v. 5, n. 1, p. 92
- By:
- Publication type:
- Article
PERSPECTIVES ON CRIMES AND PUNISHMENT UNDER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Journal of Accounting & Finance Research, 2004, v. 12, n. 4, p. 10
- By:
- Publication type:
- Article
Cyberfraud and Computer Crime.
- Published in:
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- By:
- Publication type:
- Article
The modus operandi of transnational computer fraud: a crime script analysis in Vietnam.
- Published in:
- Trends in Organized Crime, 2022, v. 25, n. 2, p. 226, doi. 10.1007/s12117-021-09422-1
- By:
- Publication type:
- Article
Computer crime costs $100 million.
- Published in:
- Internal Auditor, 1997, v. 54, n. 3, p. 9
- Publication type:
- Article
The Evolution of Federal Computer Crime Policy: The Ad Hoc Approach to an Ever-Changing Problem.
- Published in:
- American Journal of Criminal Law, 1999, v. 27, n. 1, p. 81
- By:
- Publication type:
- Article
Cyber Security and Impact on Computer Crimes.
- Published in:
- Acta Universitatis Danubius: Juridica, 2023, v. 19, n. 2, p. 66
- By:
- Publication type:
- Article
EL DELITO DE ESTAFA INFORMÁTICA. ¿ES POSIBLE DETERMINAR LA RESPONSABILIDAD CIVIL DE LA ENTIDAD FINANCIERA EN BASE AL ARTÍCULO 120.3 DEL CÓDIGO PENAL COMO CONSECUENCIA DEL «PHISHING»?
- Published in:
- Revista de Derecho Penal y Criminologia, 2023, n. 30, p. 273
- By:
- Publication type:
- Article
Computer crime, investigation, and the law.
- Published in:
- 2012
- By:
- Publication type:
- Book Review
CRIME AND THE COMPUTER.
- Published in:
- 1993
- By:
- Publication type:
- Book Review
Computer Crime: Assessing the Lawyer's Perspective.
- Published in:
- Journal of Business Ethics, 1989, v. 8, n. 4, p. 243, doi. 10.1007/BF00383337
- By:
- Publication type:
- Article
Computer Crimes and Digital Investigations.
- Published in:
- 2011
- By:
- Publication type:
- Book Review
METHODOLOGICAL ASPECTS REGARDING THE FORENSIC INVESTIGATION OF COMPUTER CRIMES.
- Published in:
- Romanian Journal of Forensic Science, 2018, n. 4, p. 34
- By:
- Publication type:
- Article