Computer crimes

Results: 5188



#Item
651Computer network security / Security / Malware / Spamming / Computer crimes / Advanced persistent threat / Web threat / Phishing / Computer worm / Cyberwarfare / Cybercrime / Computer security

ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave of fear, hype, an

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-05-21 15:02:17
652Bullying / National Curriculum / Cyberbully / Education / Ethics / Crime / Cyber-bullying / Computer crimes / Abuse

Cyberbullying Lesson Plan

Add to Reading List

Source URL: old.digizen.org

Language: English - Date: 2009-02-09 11:44:55
653Copyright infringement / Crimes / Organized crime / Tort law / Copyright / Counterfeit consumer goods / Counterfeit / Trademark / Advertising network / Law / Intellectual property law / Computer law

STATEMENT of BEST PRACTICES GUIDELINES FOR AD NETWORKS TO ADDRESS PIRACY and COUNTERFEITING U.S. companies that offer "Ad Networks" in the U.S., as further defined below, are committed to maintaining high quality standar

Add to Reading List

Source URL: l.yimg.com

Language: English - Date: 2013-12-23 16:02:55
654Computer crimes / Technology / Computer security / Electronic warfare / Military technology / Stuxnet / Insurance / Risk management / Liability insurance / Cyberwarfare / Security / Hacking

What isn’t Vulnerable to Cyber Attack? IT-based technologies have facilitated immense advances in practically all human endeavors. Huge upside, but with these capabilities comes a spectrum of (growing) risks relating t

Add to Reading List

Source URL: www.partnerre.com

Language: English - Date: 2014-11-19 11:24:00
655Behavior / Bullying / Aggression / Crime / Cyberstalking / Sociology / Cyber-bullying / Harassment / Stalking / Abuse / Computer crimes / Ethics

Online Abuse, Cyber-bullying and Cyberstalking: As technology gets more advanced and constantly becomes a bigger part of our lives, online abuse and cyber-bullying also become more and more prevalent. Cyberbullying is co

Add to Reading List

Source URL: www.cjcp.org.za

Language: English - Date: 2014-07-24 08:32:59
656Accountancy / Crimes / Deception / Business intelligence / Computer-aided audit tools / Fraud deterrence / Association of Certified Fraud Examiners / Certified Fraud Examiner / ACL / Business / Fraud / Ethics

ARBUTUS Fraud Detection Solutions Arbutus Software and Cash Recovery Partners, LLC have aligned to provide a powerful combination of services, technology and methodology that is based on over 20 years of experience in wo

Add to Reading List

Source URL: www.arbutussoftware.com

Language: English - Date: 2014-12-03 17:54:17
657Virtual reality / William Gibson / Computer crimes / Information Warfare Monitor / Internet-related prefixes / Cyberpunk / Contemporary history / Crime / Electronic warfare / Cyberspace / Information Age

2 Contesting Cyberspace and the Coming Crisis of Authority Ronald Deibert and Rafal Rohozinski [Essentially contested concepts are] concepts the proper use of which inevitably involves endless disputes about their proper

Add to Reading List

Source URL: access.opennet.net

Language: English - Date: 2011-12-09 11:49:14
658Computer crimes / Social psychology / Persecution / Aggression / Cyber-bullying / Bullying / Social networking service / Internet privacy / Privacy / Ethics / Behavior / Abuse

Cyber-bullying – What you need to know Introduction The proliferation of communication technologies has transformed our lives. People are connected all the time by a variety of electronic means and devices. Through ins

Add to Reading List

Source URL: www.pcpd.org.hk

Language: English - Date: 2014-11-19 23:19:20
659Intellectual property law / Computer law / Copyright infringement / Crimes / Copyright law of Australia / Roadshow Films v iiNet / Graduated response / IiNet / Copyright law of the United States / Law / Internet in Australia / Australian copyright law

COMMENTS ON SCHEME TO ADDRESS ONLINE COPYRIGHT INFRINGEMENT MARCH 2015 The Australian Copyright Council (ACC) welcomes the opportunity to comment on the proposal for a notice and discovery scheme to address online copyr

Add to Reading List

Source URL: www.commsalliance.com.au

Language: English - Date: 2015-03-19 18:15:57
660Cyber-bullying / Adolescence / Cyberbully / Ethics / Human development / Youth / Abuse / Computer crimes / Bullying

Appearance-related cyberbullying – a problem especially for girls Ann Frisén & Sofia Berne Ann Frisén and Sofia Berne begin the lecture by saying that social networking sites are examples of contexts in which adolesc

Add to Reading List

Source URL: www.cyberbullying.se

Language: English - Date: 2014-10-16 02:13:48
UPDATE