995 resultados para Computer crimes - Prevention


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using the work and ideas of French theorist Michel Foucault the writer examines s 3LA of the Crimes Act, which provides law enforcement officers with power to compel a person to reveal their private encryption keys and other personal information, and concludes that such a section creates fear, redirects flow of power between law enforcement agencies and citizens, and creates resistance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A multiagent diagnostic system implemented in a Protege-JADE-JESS environment interfaced with a dynamic simulator and database services is described in this paper. The proposed system architecture enables the use of a combination of diagnostic methods from heterogeneous knowledge sources. The process ontology and the process agents are designed based on the structure of the process system, while the diagnostic agents implement the applied diagnostic methods. A specific completeness coordinator agent is implemented to coordinate the diagnostic agents based on different methods. The system is demonstrated on a case study for diagnosis of faults in a granulation process based on HAZOP and FMEA analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is a widespread perception among staff in Computer Science that plagiarism is a major problem particularly in the form of collusion in programming exercises. While departments often make use of electronic detection measures, the time consumed prosecuting plagiarism offences remains a problem. As a result departments continue to seek ways to reduce the amount of plagiarism and collusion that occurs. This paper reports the findings of a questionnaire based study which attempted to assess the students' attitudes to the issues involved in the hope that such an understanding might result in practical measures for minimizing the problem. The study revealed that while students did understand the definition of plagiarism in its most extreme cases they were often confused about less clear-cut situations. Changes in the previous experience of incoming students meeting modules originally designed on the assumption that students already had some programming background and were equipped for self-directed study would also appear to be a contributory factor in the extent of collusion in programming exercises.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

International audience

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While SQL injection attacks have been plaguing web application systems for years, the possibility of them affecting RFID systems was only identified very recently. However, very little work exists to mitigate this serious security threat to RFID-enabled enterprise systems. In this paper, we propose a policy-based SQLIA detection and prevention method for RFID systems. The proposed technique creates data validation and sanitization policies during content analysis and enforces those policies during runtime monitoring. We tested all possible types of dynamic queries that may be generated in RFID systems with all possible types of attacks that can be mounted on those systems. We present an analysis and evaluation of the proposed approach to demonstrate the effectiveness of the proposed approach in mitigating SQLIA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many nations are able to prosecute transplant-related crimes committed in their territory, but transplant recipients, organ sellers and brokers, and transplant professionals may escape prosecution by engaging in these practices in foreign locations where they judge the risk of criminal investigation and prosecution to be remote.Methods. The Declaration of Istanbul Custodian Group convened an international working group to evaluate the possible role of extraterritorial jurisdiction in strengthening the enforcement of existing laws governing transplant-related crimes across national boundaries. Potential practical and ethical concerns about the use of extraterritorial jurisdiction were examined, and possible responses were explored. Results. Extraterritorial jurisdiction is a legitimate tool to combat transplant-related crimes. Further, development of a global registry of transnational transplant activities in conjunction with a standardized international referral system for legitimate travel for transplantation is proposed as a mechanism to support enforcement of national and international legal tools. Conclusions. States are encouraged to include provisions on extraterritorial jurisdiction in their laws on transplant-related crimes and to collaborate with professionals and international authorities in the development of a global registry of transnational transplant activities. These actions would assist in the identification and evaluation of illicit activities and provide information that would help in developing strategies to deter and prevent them.