<--- Back to Details
First PageDocument Content
Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes
Date: 2014-07-16 02:47:23
Information technology audit
Criminal law
Computer crimes
Cyberspace
Legal aspects of computing
Abuse
Fraud
Computer fraud
Computer Fraud and Abuse Act
Computer law
Law
Crimes

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Download Document from Source Website

File Size: 118,12 KB

Share Document on Facebook

Similar Documents

Law & Technology: Evolving challenges as a result of fraud in E-commerce sector Computer Online

DocID: 1sccJ - View Document

Elections / Politics / Voting / Government / Electronic voting / Electoral systems / Electoral fraud / Password / Authentication / Voter registration / Voting system / Absentee ballot

Authentication for Remote Voting Nathanael Paul David Evans Avi Rubin University of Virginia Johns Hopkins University Department of Computer Science Department of Computer Science

DocID: 1rk5l - View Document

Politics / Structure / Ethics / Political corruption / Abuse / Electoral fraud / Political terminology / Transparency International / Corruption / E-governance / Police corruption / Korea Independent Commission Against Corruption

SPECIAL ISSUE: ICT AND SOCIAL CHALLENGES YOU CAN’T BRIBE A COMPUTER: DEALING WITH THE SOCIETAL CHALLENGE OF CORRUPTION THROUGH ICT Shirish C. Srivastava Department of Operations Management and Information Technology,

DocID: 1r0tg - View Document

Elections / Software / Computer file / Inter-process communication / Microsoft Excel / Zip / Voter registration / Computing / Electoral fraud

Voter Registration Files This CD contains multiple compressed files containing voter registration information. The individual files are not created in a specific order, and provide information for active and inactive v

DocID: 1qUgC - View Document

Security / Prevention / E-commerce / Identity documents / Safety / Cybercrime / Password / Online shopping / Credential stuffing / Computer security / Gmail / Identity theft

F500 Retailer Case Study AUTOMATED GIFT CARD FRAUD

DocID: 1qutx - View Document