Computer crimes

Results: 5188



#Item
331Social change / Structure / Sociology / Computer crimes / Organized crime / United Nations

Exhibit Hall 4 PNI NETWORK: CRIME CONGRESS GAME 13:15

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2015-04-17 11:19:48
332International Telecommunication Union / Computer security / Websense / Malware / Crime / Public safety / Computer crimes / Security / International Multilateral Partnership Against Cyber Threats

THIRTY PERCENT SIXTY-SIX PERCENT OF ORGANIZATIONS

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2015-04-20 05:03:01
333Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
334Sonia Livingstone / Cyber-bullying / Social psychology / Internet privacy / Internet safety / Social networking service / Adolescence / Human development / Computer crimes

PDF Document

Add to Reading List

Source URL: www.lse.ac.uk

Language: English - Date: 2013-04-21 17:43:22
335Copyright law / Copyright infringement / Crimes / Tort law / Copyright / The Pirate Bay / Digital Economy Act / Legal aspects of file sharing / Law / Intellectual property law / Computer law

PDF Document

Add to Reading List

Source URL: apraamcos.com.au

Language: English - Date: 2014-09-05 02:21:46
336Human trafficking / International Cybercrime / Criminology / United Nations Office on Drugs and Crime / United Nations Interregional Crime and Justice Research Institute / Criminal justice / Computer crimes / Crime / Law

Microsoft WordCrime Congress Workshop 3 Draft Agenda 13 April 2015_for distribution

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2015-04-13 05:51:29
337Electronic warfare / Military technology / Technology / War / Military science / International Multilateral Partnership Against Cyber Threats / Internet-related prefixes / Global governance / SCADA / Computer crimes / Cyberwarfare / Hacking

Risk Nexus | Global cyber governance: preparing for new business risks | April 2015 | Zurich Insurance Company Ltd

Add to Reading List

Source URL: knowledge.zurich.com

Language: English - Date: 2015-04-24 03:43:01
338Cybercrime / Computer crimes / Computer virus / Spam / Virus / Email spam / Phishing / Internet / Spamming / Computing

S e c t i o n 13 Challenges toward Ubiquitous Society 1 ICT usage from the viewpoint of safety and security A recent major challenge in our society is to ensure security in using ICT. More and more individuals and

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2009-10-02 11:39:05
339Risk / Fraud / Ethics / Crimes / Deception / Forensic accountant / Association of Certified Fraud Examiners / Certified Fraud Examiner / Computer-aided audit tools / Auditing / Information technology audit / Accountancy

Using Tips & Technology to Prevent Fraud Schemes Written by Adolfo Pesquera and Carolyn Newman Local government entities rely on tips and complaints to sniff out corruption within their departments. Once the appropriate

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2013-05-10 16:59:19
340Computer network security / Crime prevention / Computer crimes / International Multilateral Partnership Against Cyber Threats / Access control / Cyber security standards / Critical infrastructure protection / Security / Computer security / National security

Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon! Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-04-17 12:03:24
UPDATE