Computer crime

Results: 9938



#Item
791Computer crimes / Behavior / Bullying / Crime / Persecution / Parry Aftab / Online predator / Cyberbully / Social networking service / Cyber-bullying / Ethics / Abuse

T oday’s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social networking

Add to Reading List

Source URL: www.victimvoice.org

Language: English - Date: 2013-01-23 18:54:43
792Surveillance / Face recognition / Crime prevention / Privacy / Automatic identification and data capture / Facial recognition system / Face detection / Biometrics / Internet privacy / Security / National security / Ethics

GARP-Face: Balancing Privacy Protection and Utility Preservation in Face De-identification Liang Du1 , Meng Yi1 , Erik Blasch2 , and Haibin Ling1 1 Department of Computer and Information Science Temple University

Add to Reading List

Source URL: www.dabi.temple.edu

Language: English - Date: 2014-09-30 14:55:32
793Crime prevention / Public safety / CERIAS / Purdue University / Computer network security / Information assurance / Information security / Gene Spafford / Elisa Bertino / Security / Computer security / National security

Agenda Information Assurance Workshop 8:30-9:45 a.m. UAF and CAE Programs, Dr. Kara L. Nance

Add to Reading List

Source URL: assert.uaf.edu

Language: English - Date: 2009-01-14 00:49:22
794National security / Public safety / Information security / Computer security / Security policy / Security engineering / Dependability / Security / Prevention / Crime prevention

CHAPTER 27 Conclusions We are in the middle of a huge change in how security is done. Ten years ago, the security manager of a large company was usually a retired

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:03
795Computer security / Computer network security / Crime prevention / Identity management / Internet privacy / Access control / Security clearance / Malware / Duty of confidentiality / Security / National security / Law

SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:20:43
796Computer security / Public safety / Data security / Prevention / Information security / Network security / Security / Crime prevention / National security

faulkner advisory for information technology studies THE PREMIER web-based information technology reports library designed exclusively for the academic community Continually updated and fully searchable, FAITS contains h

Add to Reading List

Source URL: tsmuohio.files.wordpress.com

Language: English - Date: 2015-01-26 10:52:02
797Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Vulnerability / Asset / IT risk management / IT risk / Computer security / Security / Data security

Information Security Measures Benchmark - The Self-Assessment Tool for Information Security Measures This page shows the result of your self-assessment for your security measures. Based on your answer to 15 questions reg

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-13 01:10:15
798Law / Technology / Telecommunications / Telecommunications data retention / Computer law / Terrorism in the United Kingdom / Regulation of Investigatory Powers Act / Anti-terrorism /  Crime and Security Act / Communications data / National security / Surveillance / Privacy of telecommunications

Briefing paper: Counter Terrorism and Security Bill About ISPA 1. The Internet Services Providers’ Association (ISPA) is the trade association for companies involved in the provision of Internet Services in the UK wit

Add to Reading List

Source URL: www.ispa.org.uk

Language: English - Date: 2014-12-16 07:55:41
799National security / Computing / Computer security / Cyberwarfare / Computer network security / Information security / Malware / Vulnerability / Email privacy / Email / Security / Crime prevention

Annex B: Email Security 1. It is often said that the Internet is inherently insecure. In fact, Internet applications such as email can be used in both secure and insecure ways. Consideration should be given to the securi

Add to Reading List

Source URL: www.barcouncil.org.uk

Language: English - Date: 2015-02-18 13:41:00
800Crime prevention / Computing / Software / Computer crimes / FTP clients / Computer security / Internet / International Multilateral Partnership Against Cyber Threats / International Cybercrime / Computer network security / National security / Security

Understanding Security and Resilience of the Internet Cybersecurity is a rather vague overarching term that is used in different contexts to mean anything from: “information and computer security”; security of the In

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-07-10 20:12:07
UPDATE