<--- Back to Details
First PageDocument Content
Computer crime / Convention on Cybercrime / Computer fraud / Cyberterrorism / Hacker / Organized crime / Cyberstalking / Computer security / International Cybercrime / Cybercrime / Computer crimes / Crime
Date: 2005-09-13 11:14:47
Computer crime
Convention on Cybercrime
Computer fraud
Cyberterrorism
Hacker
Organized crime
Cyberstalking
Computer security
International Cybercrime
Cybercrime
Computer crimes
Crime

A Critical Look at the Regulation of Cybercrime ___________________________________________

Add to Reading List

Source URL: www.crime-research.org

Download Document from Source Website

File Size: 362,50 KB

Share Document on Facebook

Similar Documents

Law & Technology: Evolving challenges as a result of fraud in E-commerce sector Computer Online

DocID: 1sccJ - View Document

Elections / Politics / Voting / Government / Electronic voting / Electoral systems / Electoral fraud / Password / Authentication / Voter registration / Voting system / Absentee ballot

Authentication for Remote Voting Nathanael Paul David Evans Avi Rubin University of Virginia Johns Hopkins University Department of Computer Science Department of Computer Science

DocID: 1rk5l - View Document

Politics / Structure / Ethics / Political corruption / Abuse / Electoral fraud / Political terminology / Transparency International / Corruption / E-governance / Police corruption / Korea Independent Commission Against Corruption

SPECIAL ISSUE: ICT AND SOCIAL CHALLENGES YOU CAN’T BRIBE A COMPUTER: DEALING WITH THE SOCIETAL CHALLENGE OF CORRUPTION THROUGH ICT Shirish C. Srivastava Department of Operations Management and Information Technology,

DocID: 1r0tg - View Document

Elections / Software / Computer file / Inter-process communication / Microsoft Excel / Zip / Voter registration / Computing / Electoral fraud

Voter Registration Files This CD contains multiple compressed files containing voter registration information. The individual files are not created in a specific order, and provide information for active and inactive v

DocID: 1qUgC - View Document

Security / Prevention / E-commerce / Identity documents / Safety / Cybercrime / Password / Online shopping / Credential stuffing / Computer security / Gmail / Identity theft

F500 Retailer Case Study AUTOMATED GIFT CARD FRAUD

DocID: 1qutx - View Document