Computer crimes

Results: 5188



#Item
291Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.nl

Language: English - Date: 2015-03-31 09:09:36
292Spamming / Internet ethics / Social engineering / Computer crimes / Phishing / Identity theft / Hacker / Malware / Email spam / Computing / Internet / Cybercrime

Poster: Computer security information in stories, news articles, and education documents Katie Hoban, Emilee Rader, Rick Wash, Kami Vaniea Department of Media and Information Michigan State University {hobankat, emilee,

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
293Crime / Computer crimes / Child sexual abuse / Community websites / Virtual communities / Sexual predator / Online predator / Social networking service / Sex offender / Sex crimes / Cybercrime / Human behavior

Research that is “Outdated and Inadequate?” An Analysis of the Pennsylvania Child Predator Unit Arrests in Response to Attorney General Criticism of the Berkman Task Force Report Nancy Willard, M.S., J.D. Center for

Add to Reading List

Source URL: www.embracecivility.org

Language: English - Date: 2012-10-27 13:05:11
294Behavior / Computer crimes / Aggression / Bullying / Cyber-bullying / Social psychology / Suicide of Megan Meier / Cyberstalking / Anti-bullying legislation / Abuse / Ethics / Cybercrime

Joint Statement on the Megan Meier’s Cyberbullying Prevention Act, HR 6123 Submitted to: The Subcommittee on Crime, Terrorism, and Homeland Security Committee on The Judiciary House of Representatives September 30, 200

Add to Reading List

Source URL: www.embracecivility.org

Language: English - Date: 2012-10-27 13:04:00
295Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.cybersecurityweek.nl

Language: English - Date: 2015-03-23 13:37:12
296Behavior / Computer crimes / Cyber-bullying / Harassment / Cyberstalking legislation / Anti-bullying legislation / Abuse / Ethics / Bullying

Schools have the power to impose a range of sanctions against pupils who are involved in bullying incidents outside school. Their anti-bullying policy must include measures to be taken with a view to: “...encouraging g

Add to Reading List

Source URL: www.leicester.gov.uk

Language: English - Date: 2014-10-13 05:22:14
297Internet / Phishing / Social engineering / Computing / Crime / Email spam / Internet security / Internet fraud / Anti-spam techniques / Spamming / Computer crimes / Email

Analysis Report Besmellah Apple phishing kit Introducing the campaign In the recent past, Apple customers have been amongst the favourite targets of cyber attacks, especially in the form of phishing. Cybercriminals are

Add to Reading List

Source URL: www.tigersecurity.pro

Language: English - Date: 2014-10-08 17:38:06
298National security / Cyberwarfare / Electronic warfare / Hacking / Military technology / Computer security / RSA / Computer crimes / Security / Crime

“In this rapidly changing digital world it is crucial to be innovative. Being three months ahead is considered far, we try to stay two years ahead of any problem.” SID NL and Humanity House BREAD & BRAINS with Ida Ha

Add to Reading List

Source URL: sidnl.org

Language: English - Date: 2015-01-26 05:24:19
299International Telecommunication Union / Computer security / Crime / Public safety / Computer crimes / Security / International Multilateral Partnership Against Cyber Threats

SureView® Suite Cybersecurity and Analytics Solutions Raytheon leverages decades of cybersecurity expertise, delivering defense grade solutions that enable commercial customers to track human activity, monitor endpoint

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
300International Telecommunication Union / Computer security / Crime / Public safety / Computer crimes / Security / International Multilateral Partnership Against Cyber Threats

SureView® Suite Cybersecurity and Analytics Solutions Raytheon leverages decades of cybersecurity expertise, delivering defense grade solutions that enable commercial customers to track human activity, monitor endpoint

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
UPDATE