Computer crimes

Results: 5188



#Item
491Youth / Internet privacy / Crime / Social networking service / Online predator / Child pornography / Internet pornography / Cyber-bullying / Internet safety / Adolescence / Human development / Computer crimes

Why Age and Identity Verification Will Not Work And is a Really Bad Idea Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Website: http://csrui.org Email: January, 26, 2009

Add to Reading List

Source URL: www.embracecivility.org

Language: English - Date: 2012-10-27 13:06:12
492Computer crimes / Social engineering / Antivirus software / Spyware / Comodo Group / Malware / Phishing / Internet security / Hacker / Cryptography / Cyberwarfare / Computer security

Whitepaper September 9, 2014 Unsecure Endpoints Threaten Financial Transactions Secure Your Application

Add to Reading List

Source URL: containment.comodo.com

Language: English
493Computer security / Computer network security / Crime prevention / Electronic commerce / National security / Trust / Institute for Information Infrastructure Protection / Data security / Information Trust Institute / Ethics / Security / Computer crimes

National Cyber Leap Year Summit 2009

Add to Reading List

Source URL: tahoe-lafs.org

Language: English - Date: 2014-12-16 18:34:05
494Ethics / Internet governance / Censorship in the United Kingdom / Internet Watch Foundation / Computer crimes / Child pornography / Child sexual abuse / Europol / Sexual slavery / Crime / Sex crimes / Law enforcement

Commercial Sexual Exploitation of Children Online A Strategic Assessment Prepared by the European Cybercrime Centre (EC3) – Europol Public Version Update

Add to Reading List

Source URL: www.europeanfinancialcoalition.eu

Language: English - Date: 2015-03-20 05:42:01
495Criminal law / Hacking / Crimes / Criminal Law (Temporary Provisions) Act / Computer Misuse Act / Criminal code section 342 / Law / Computer law / Criminal law of Singapore

Computer Misuse and [No. 13 of 2004 Crimes THE COMPUTER MISUSE AND CRIMES ACT, 2004

Add to Reading List

Source URL: www.zambialii.org

Language: English - Date: 2013-03-04 14:06:16
496Spamming / Crime / Ethics / Criminology / Social engineering / Computer crimes / Phishing

Why  “No  Worse  Off”  is  Worse  Off   John  Aycock   Department  of  Computer  Science   University  of  Calgary,  Canada  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:28
497Criminal law / Criminal investigation / Abuse / Aggression / Vidocq Society / Forensic science / Richard Walter / Offender profiling / Stalking / Crime / Law enforcement / Computer crimes

PDF Document

Add to Reading List

Source URL: www.vidocq.org

Language: English - Date: 2015-01-16 22:17:44
498United States / Copyright infringement / Crimes / Online Copyright Infringement Liability Limitation Act / Digital Millennium Copyright Act / User-generated content / Section 230 of the Communications Decency Act / Intermediary / Electronic Commerce Directive / Law / Computer law / 105th United States Congress

SHIELDING THE MESSENGERS: PROTECTING PLATFORMS FOR EXPRESSION AND INNOVATION Version 2, updated December 2012 This paper examines the impact on free expression, privacy, and innovation of forcing Internet intermediaries

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2012-12-12 14:33:16
499Mobile payments / Technology / Money / Electronic commerce / Finance / Computer crimes / Payment systems / Password / Online banking

KOB102836 Brozura profibanka_Eng.indd

Add to Reading List

Source URL: www.mojebanka.cz

Language: English - Date: 2010-06-11 16:06:38
500Behavior / Social psychology / Criminology / Persecution / Computer crimes / Cyber-bullying / Victimisation / Adolescence / Peer victimization / Abuse / Ethics / Bullying

Microsoft PowerPoint - BHStockholm-DF_June

Add to Reading List

Source URL: www.childcentre.info

Language: English - Date: 2008-11-20 10:20:40
UPDATE