Works about COMPUTER crimes
Results: 2974
RESPONSABILIDAD PENAL DE LAS PERSONAS JURÍDICAS EN LOS CIBERDELITOS.
- Published in:
- Estudios Penales y Criminológicos, 2024, v. 45, p. 1, doi. 10.15304/epc.45.10219
- By:
- Publication type:
- Article
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 49, doi. 10.3390/computers14020049
- By:
- Publication type:
- Article
Designing a Two-Factor Authentication (2FA) System in E-Commerce Applications.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2025, v. 6, n. 1, p. 48
- By:
- Publication type:
- Article
Cyber Kleptomaniacs.
- Published in:
- World Affairs, 2013, v. 176, n. 3, p. 73
- By:
- Publication type:
- Article
Cyberbullying: Is Federal Criminal Legislation the Solution?
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2015, v. 57, n. 4, p. 566, doi. 10.3138/cjccj.2014.E43
- By:
- Publication type:
- Article
University students’ perceptions of campus climate, cyberbullying and cultural issues: implications for theory and practice.
- Published in:
- Studies in Higher Education, 2018, v. 43, n. 11, p. 2072, doi. 10.1080/03075079.2017.1307818
- By:
- Publication type:
- Article
A/S/L?¹ 45/JOHN DOE OFFENDER/FEDERAL PRISON---THE THIRD CIRCUIT TAKES A HARD LINE AGAINST CHILD PREDATORS IN UNITED STATES v. TYKARSKY.
- Published in:
- Villanova Law Review, 2007, v. 52, n. 5, p. 1071
- By:
- Publication type:
- Article
Online Grooming: Factores de Riesgo y Modus Operandi a Partir de un Análisis de Sentencias Españolas.
- Published in:
- Anuario de Psicología Jurídica, 2024, v. 34, n. 1, p. 119, doi. 10.5093/apj2023a9
- By:
- Publication type:
- Article
Using Peace Research to Assess Cyberthreats.
- Published in:
- Peace Review, 2005, v. 17, n. 2/3, p. 239, doi. 10.1080/14631370500332973
- By:
- Publication type:
- Article
"BURN AFTER READING": A APREENSÃO DE E-MAILS E COMUNICAÇÕES DE NATUREZA SEMELHANTE EM PROCESSOCRIME E EM PROCESSO CONTRAORDENACIONAL.
- Published in:
- Actualidad Jurídica (1578-956X), 2021, n. 57, p. 103
- By:
- Publication type:
- Article
REGULAMENTAÇÃO SUPRANACIONAL SOBRE CRIMINALIDADE INFORMÁTICA E TÉCNICAS DE TRANSPOSIÇÃO. O DIREITO PENAL PORTUGUÊS E ESPANHOL COMO PARADIGMAS.
- Published in:
- Actualidad Jurídica (1578-956X), 2018, n. 48, p. 48
- By:
- Publication type:
- Article
A LEI DO CIBERCRIME E A COLABORAÇÃO DO ARGUIDO NO ACESSO AOS DADOS INFORMÁTICOS.
- Published in:
- Actualidad Jurídica (1578-956X), 2014, n. 38, p. 146
- By:
- Publication type:
- Article
Understanding digital image anti-forensics: an analytical review.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10445, doi. 10.1007/s11042-023-15866-0
- By:
- Publication type:
- Article
Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 7, p. 10061, doi. 10.1007/s11042-022-12311-6
- By:
- Publication type:
- Article
Forensic analysis of image deletion applications.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 14, p. 19559, doi. 10.1007/s11042-021-11619-z
- By:
- Publication type:
- Article
Social cybersecurity: an emerging science.
- Published in:
- Computational & Mathematical Organization Theory, 2020, v. 26, n. 4, p. 365, doi. 10.1007/s10588-020-09322-9
- By:
- Publication type:
- Article
Assessing the Links of Sexting, Cybervictimization, Depression, and Suicidal Ideation Among University Students.
- Published in:
- 2018
- By:
- Publication type:
- journal article
ADAPTING TO CYBERSECURITY CHALLENGES: ASSESSING THE EFFECTIVENESS OF INTERNATIONAL LAW AGAINST CYBER TERRORISM.
- Published in:
- Journal of Social Research Development, 2023, v. 4, n. 4, p. 669, doi. 10.53664/JSRD/04-04-2023-02-669-685
- By:
- Publication type:
- Article
Investigation on e-Commerce Platforms for Tackling e-Business Security Challenge.
- Published in:
- International Journal on Engineering Applications, 2022, v. 10, n. 6, p. 401, doi. 10.15866/irea.v10i6.20649
- By:
- Publication type:
- Article
Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework.
- Published in:
- Journal of Applied Science & Technology Trends (JASTT), 2023, v. 4, n. 1, p. 54, doi. 10.38094/jastt401144
- By:
- Publication type:
- Article
Exploring cyber violence against women and girls in the Philippines through Mining Online News.
- Published in:
- Comunicar (English Edition), 2022, v. 30, n. 70, p. 121, doi. 10.3916/C70-2022-10
- By:
- Publication type:
- Article
Reviewing Information and Electronic Transaction Act from a Convention on Cybercrime of 2001.
- Published in:
- Jurnal Hukum Novelty (1412-6834), 2021, v. 12, n. 2, p. 267, doi. 10.26555/novelty.v12i2.a17679
- By:
- Publication type:
- Article
DIREITO PENAL CIBERNÉTICO: DA EVOLUÇÃO LEGISLATIVA À NECESSIDADE DE TIPIFICAÇÃO DE CRIMES CIBERNÉTICOS PRÓPRIOS.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 6, p. 1, doi. 10.54751/revistafoco.v16n6-028
- By:
- Publication type:
- Article
جَرِيمَةُ اِسْتِغْلَاَلِ الْأَطْفَالِ جِنْسِيَّاً عَبْرَ الإنترنت دِرَاسَةً فِقْهِيَّةً مُقَارَنَةً مع القانون الوضعي.
- Published in:
- IUG Journal of Sharia & Law Studies, 2022, v. 30, n. 1, p. 1, doi. 10.33976/IUGJSLS.30.1/2022/1
- By:
- Publication type:
- Article
الجريمة المنظمة الإلكترونية "دراسة تحليلية في التشريع الفلسطيني".
- Published in:
- IUG Journal of Sharia & Law Studies, 2021, v. 29, n. 2, p. 93, doi. 10.33976/IUGJSLS.29.2/2021/4
- By:
- Publication type:
- Article
NUEVAS TECNOLOGÍAS, ESTAFA INFORMÁTICA E IGNORANCIA DELIBERADA.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2023, v. 12, n. 1, p. 1
- By:
- Publication type:
- Article
EFECTOS QUE HAN PROVOCADO LOS ESTADOS DE ALARMA EN LOS ÍNDICES DE DELINCUENCIA EN LA PROVINCIA DE CÁDIZ.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2022, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
LA CIBERDELINCUENCIA EN ESPAÑA: UN ESTUDIO BASADO EN LAS ESTADÍSTICAS POLICIALES.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2020, n. 6, p. 1
- By:
- Publication type:
- Article
IMPLEMENTATION AND MANAGEMENT OF SECURITY INFORMATION AND EVENT MANAGEMENT TOOLS IN INFORMATION SYSTEMS THROUGH THE MSSP MODEL.
- Published in:
- Archaeology & Science / Arheologija i Prirodne Nauke, 2019, v. 15, p. 99, doi. 10.18485/arhe_apn.2019.15.8
- By:
- Publication type:
- Article
مدى توافر السلوك االجرامي يف اجلرمية االلكرتونية.
- Published in:
- Journal of The Iraqi University, 2022, v. 56, n. 1, p. 402
- By:
- Publication type:
- Article
THE CRIMES OF DIGITAL CAPITALISM.
- Published in:
- Mitchell Hamline Law Review, 2022, v. 48, n. 4, p. 971
- By:
- Publication type:
- Article
A genealogy of hacking.
- Published in:
- Convergence: The Journal of Research into New Media Technologies, 2017, v. 23, n. 5, p. 528, doi. 10.1177/1354856516640710
- By:
- Publication type:
- Article
A Study of Computer Users' Attitude and Awareness towards Cyber Security.
- Published in:
- International Journal of Computer Information Systems & Industrial Management Applications, 2021, v. 13, p. 300
- By:
- Publication type:
- Article
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge.
- Published in:
- International Journal of Computer Information Systems & Industrial Management Applications, 2021, v. 13, p. 252
- By:
- Publication type:
- Article
United States v. Nosal and the CFAA: What Does DailySudoku.com Have to Do with Computer Fraud?
- Published in:
- New England Law Review, 2014, v. 48, n. 2, p. 421
- By:
- Publication type:
- Article
Bits, Bytes, and Bicycles: Theft and "Cyber Theft".
- Published in:
- New England Law Review, 2013, v. 47, n. 4, p. 817
- By:
- Publication type:
- Article
The Investigation of Relationship among Relational-Interdependent Self-Construal Cyberbullying, and Psychological Disharmony in Adolescents: An Investigation of Structural Equation Modelling.
- Published in:
- Educational Sciences: Theory & Practice, 2012, v. 12, n. 2, p. 646
- By:
- Publication type:
- Article
The engineer–criminologist and "the novelty of cybercrime": a situated genealogical study of timesharing systems.
- Published in:
- Internet Histories, 2018, v. 2, n. 1/2, p. 20, doi. 10.1080/24701475.2018.1448498
- By:
- Publication type:
- Article
Polymorphic worm detection using strong token-pair signatures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2009, v. 17, n. 2, p. 163, doi. 10.3906/elk-0905-29
- By:
- Publication type:
- Article
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah.
- Published in:
- Techno.com, 2023, v. 22, n. 3, p. 654, doi. 10.33633/tc.v22i3.8299
- By:
- Publication type:
- Article
igital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial.
- Published in:
- Techno.com, 2021, v. 20, n. 4, p. 527, doi. 10.33633/tc.v20i4.5170
- By:
- Publication type:
- Article
EL DELITO DE HACKING O ACCESO ILÍCITO A SISTEMAS INFORMÁTICOS.
- Published in:
- Themis: Revista de Derecho, 2023, n. 83, p. 413, doi. 10.18800/themis.202301.023
- By:
- Publication type:
- Article
A Tribute to Donn Parker.
- Published in:
- 2021
- By:
- Publication type:
- Obituary
Cyberfraud: A Review of the Internet and Anonymity in the Nigerian Context.
- Published in:
- ISSA Journal, 2021, v. 19, n. 3, p. 28
- By:
- Publication type:
- Article
The Future of Cybercrime.
- Published in:
- ISSA Journal, 2019, v. 17, n. 6, p. 9
- By:
- Publication type:
- Article
Is Basic Security Still “Basic”?
- Published in:
- ISSA Journal, 2019, v. 17, n. 4, p. 8
- By:
- Publication type:
- Article
Our Journey in Phishing Mitigation.
- Published in:
- ISSA Journal, 2018, v. 16, n. 12, p. 17
- By:
- Publication type:
- Article
The Wild West of Payments.
- Published in:
- ISSA Journal, 2018, v. 16, n. 10, p. 7
- By:
- Publication type:
- Article
The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence.
- Published in:
- ISSA Journal, 2018, v. 16, n. 8, p. 22
- By:
- Publication type:
- Article
When You Cannot Be Silent: Whistle-Blowing 2.0.
- Published in:
- ISSA Journal, 2018, v. 16, n. 1, p. 41
- By:
- Publication type:
- Article