995 resultados para Computer crimes - Prevention


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fraud and deception in online marketplaces has been an on-going problem. This thesis proposes novel techniques and mechanisms using agent technology to protect buyers and sellers in online environments such as eBay. The proposed solution has been rigorously tested and the results show good commercial promise.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis proposes a novel architecture of Distributed Active Defense System (DADS) against Distibuted Denial of Service (DDoS) attacks. Three sub-systems of DADS were built. For each sub-system corresponding algorithms were developed, prototypes implemented, criteria for evaluation were set up and experiments in both simulation and real network laboratory environments were carried out.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is concerned with the evolution of fraud investigation and prevention in light of the advances in computing technology. These recent advances have impacted upon traditional fraud offences as well as creating a range of new crimes. The financial significance of fraud is growing whereas law enforcement and the judicial system appear to be unable to meet the demands of these emerging crimes and its victims. This research compares the responses of our present and future investigators with those of our current business leaders from the government and the commercial sectors. This research establishes the needs of corporate decision-makers and the attitudes of police with regard to fraud. Data relating to persons arrested and convicted of fraud was also analysed to identify the issues that may be responsible for the non-reporting of offences to police by victims. The research found that victims are seeking solutions that are not available through law enforcement, for example financial compensation. Law enforcement also under-utilises the potential of proactive responses to prevent offences and they are reluctant to acknowledge the benefits of preventative measures and to incorporate this strategy within criminal investigation training programmes. The lack of deterrence offered by the judicial system does not make the situation any better. The police function is still primarily a reactive one. In order to overcome fraud and to be able to adapt to changes there needs to be collaboration between stakeholders. This requires a joint effort from the police, government, commerce and the victims of fraud. An innovative model involving stakeholders has been formulated that represents an alternative to the current system. This approach utilises the financial resources and expertise from the commercial sector as well as the skills of criminal investigators from the police. This means adopting a combined package of both reactive and proactive measures in order to minimise the impact of fraud. This model will be adaptive and will be able to accommodate any future requirements arising out of further inevitable advances in computer technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"March 1986."

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The term “Human error” can simply be defined as an error which made by a human. In fact, Human error is an explanation of malfunctions, unintended consequents from operating a system. There are many factors that cause a person to have an error due to the unwanted error of human. The aim of this paper is to investigate the relationship of human error as one of the factors to computer related abuses. The paper beings by computer-relating to human errors and followed by mechanism mitigate these errors through social and technical perspectives. We present the 25 techniques of computer crime prevention, as a heuristic device that assists. A last section discussing the ways of improving the adoption of security, and conclusion.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Informação - FFC

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Includes bibliographies.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper describes an approach to a computer-based learning of educational material. We define a model for the class of subjects of our interest - teaching of investigation and prevention of computer crimes, (those including both theoretical and practical issues). From this model, specific content outlines can be derived as subclasses and then instanced into actual domains. The last step consists in generating interactive documents, which use the instanced domain. Students can explore these documents through a web browser. Thus, an interactive learning scenario is created. This approach allows reusing and adapting the contents to a variety of situations, students and teaching purposes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Ce mémoire propose que l’origine d’un cyberdélinquant soit un facteur explicatif du phénomène de la cybercriminalité. Il comporte deux objectifs : premièrement, décrire les profils des cybercriminels recensés dans les médias internationaux; deuxièmement, vérifier si ces profils varient selon le lieu d’origine du cyberdélinquant. Une base de données, comportant 90 cas de cybercriminels répertoriés à travers le monde, fut créée. Quinze (15) cybercriminels par territoire ont été sélectionnés, les régions ciblées allant comme suit : Amérique du Nord, Amérique latine, Australasie, Europe de l’Ouest, Eurasie et Afrique/péninsule Arabique. En premier lieu, des analyses descriptives ont été exécutées afin de dresser un portrait de ce phénomène. En second lieu, des analyses de tableaux de contingence ont été effectuées entre les variables à l’étude afin de voir si des relations existaient. Enfin, d’autres analyses de tableaux de contingence ont été réalisées afin d’établir les différences des paramètres en fonction de l’origine. Les résultats de ces divers tests démontrent que ce sont généralement de jeunes hommes âgés en moyenne de 25 ans qui seront susceptibles de commettre des délits informatiques. Quelques profils types se sont dégagés des analyses et peuvent s’expliquer par l’accès au matériel informatique, les inégalités économiques entre classes sociales, tout comme la vitesse d’Internet, et ce, en fonction de l’origine du cyberdélinquant.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis is the first national study of workers who have contact with victims and perpetrators of domestic violence. It highlights that the victim and perpetrator's gender, as well as the relevant professional's agency type and experience, all influenced their attitudes to, and service delivery decisions with, domestic violence-related clients. The portfolio utilises four case studies to examine the way that two Victorian sex offender programs attempt to balance risk-need and good lives principles in the assessment and treatment of sex offenders.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis surveys the latest development of digital forensic tools designed for anti-cybercrime purposes. It discusses the necessity of testing the digital forensics tools, and presents a novel testing framework. This new testing framework takes the viewpoint of software vendors rather than traditional software engineering approaches.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Prólogo de Alicia Bárcena

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The new digital technologies have led to widespread use of cloud computing, recognition of the potential of big data analytics, and significant progress in aspects of the Internet of Things, such as home automation, smart cities and grids and digital manufacturing. In addition to closing gaps in respect of the basic necessities of access and usage, now the conditions must be established for using the new platforms and finding ways to participate actively in the creation of content and even new applications and platforms. This message runs through the three chapters of this book. Chapter I presents the main features of the digital revolution, emphasizing that today’s world economy is a digital economy. Chapter II examines the region’s strengths and weaknesses with respect to digital access and consumption. Chapter III reviews the main policy debates and urges countries to take a more proactive approach towards, for example, regulation, network neutrality and combating cybercrime. The conclusion highlights two crucial elements: first, the need to take steps towards a single regional digital market that can compete in a world of global platforms by tapping the benefits of economies of scale and developing network economies; and second, the significance of the next stage of the digital agenda for Latin America and the Caribbean (eLAC2018), which will embody the latest updates to a cooperation strategy that has been in place for over a decade.