Computer fraud

Results: 842



#Item
531Computer crimes / Computer network security / Spyware / Social engineering / Malware / Identity theft / Keystroke logging / Computer security / Credit card fraud / Espionage / Cybercrime / Security

Cyber Crime: How It Happens And How You Can Protect Yourself

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2011-09-22 21:42:16
532Law / Stored Communications Act / Privacy / Telephone tapping / Computer Fraud and Abuse Act / Internet privacy / Criminal law / Konop v. Hawaiian Airlines /  Inc. / Computer law / Privacy of telecommunications / Privacy law

Ronald Davis III Onate High School Dr. Anne Foltz Word Count: 1460 Introduction Bill has been hired for a summer job with hopes that it will become his part-time job

Add to Reading List

Source URL: www.nmbar.org

Language: English - Date: 2013-04-08 15:51:28
533Internet fraud / Online predator / Adolescence / Pornography / Internet safety / Criminology / Law enforcement / Youth Internet Safety Survey / Computer crimes / Crime / Cyber-bullying

Fewer kids are exposed to unwanted sexual content online By Shari Roan, Los Angeles Times / For the Booster Shots blog 4:41 p.m. EST, December 15, 2011 Kids are not being exposed as much to unwanted sexual solicitations

Add to Reading List

Source URL: www.unh.edu

Language: English - Date: 2013-09-27 14:33:46
534Computer crimes / Cyberwarfare / Hacker / Cyberterrorism / Hacktivism / Electron / Computer fraud / Computer insecurity / DEF CON / Cybercrime / Computing / Hacking

SANTA CLARA COMPUTER AND HIGH TECHNOLOGY LAW JOURNAL CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF

Add to Reading List

Source URL: www.duanemorris.com

Language: English - Date: 2011-02-09 16:04:13
535Technology / Voter-verified paper audit trail / Premier Election Solutions / Diebold / Electoral fraud / Gems / Voting machine / Vulnerability / Computer security / Electronic voting / Election fraud / Politics

Source Code Review of the Diebold Voting System Joseph A. Calandrino Ariel J. Feldman J. Alex Halderman

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2007-08-20 16:59:32
536Computer network security / Computer crimes / Spyware / Social engineering / Malware / Identity theft / Keystroke logging / Computer security / Credit card fraud / Espionage / Cybercrime / Security

ESRMO Monthly Security Tips NEWSLETTER July 2011

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2011-09-28 15:10:40
537Information technology audit / Ethics / Computer crimes / United States Federal Sentencing Guidelines / United States federal law / Damages / Computer fraud / National Information Infrastructure Protection Act / USA PATRIOT Act /  Title VIII / Crime / Law / Criminology

Faking It: Calculating Loss in Computer Crime Sentencing By Jennifer S. Granick* DRAFT. NOT FOR CITATION. INTRODUCTION Thoroughly and consistently calculating losses from computer intrusions is a difficult endeavor becau

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
538Malware / Rogue software / Spyware / Password / Computer virus / Spamming / Advance-fee fraud / Keystroke logging / Espionage / Cyberwarfare / Computer network security

Protect Yourself: What Is Computer Intrusion? Passwords and anti-virus software can help protect your computer – and the information that’s stored there. But what if someone were able to enter your computer without

Add to Reading List

Source URL: fsroundtable.org

Language: English - Date: 2014-06-11 09:42:35
539Law / Actuarial science / Phishing / Social engineering / Spamming / Identity theft / Law firm / Internet fraud / Insurance / Computer crimes / Crime / Security

2013 REVIEW practicePRO PROGRAM practicePRO program

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2014-05-30 15:57:05
540Computer crimes / Security / Phishing / Malware / Internet fraud / Identity theft / Hacker / Internet security / Spyware / Cybercrime / Computer network security / Crime

Microsoft Word - February 2009 Cyber Security Trends.doc

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2009-06-26 14:56:08
UPDATE