Search

Your search keyword '"Cyber crime"' showing total 1,337 results

Search Constraints

Start Over You searched for: Descriptor "Cyber crime" Remove constraint Descriptor: "Cyber crime"
1,337 results on '"Cyber crime"'

Search Results

2. Implementation of Recent Advancements in Cyber Security Practices and Laws in India

3. Challenges and Threats of Cybercrime in Indonesia: A Review of Legal and Information Technology Aspects Related to Ransomware Attacks on Indonesia's National Data Center.

4. Restoring @bajuyuli Business Image on Instagram Social Media in Facing the Threat of Cyber Crime Phishing.

5. Digital Evidence and Proving Cybercrime "Between High Technology and Law Constraints".

6. THE STAND OF ELECTRONIC EVIDENCE IN CYBER CRIME LAW ENFORCEMENT IN INDONESIA.

7. Digital Reconstruction: A Critical Examination of the History and Adaptation of Ku Klux Klan Websites.

8. Brute forcing on secured shell servers emphasising the role of cyber forensics – a quali-quantitative study.

9. Cyber Fraud with Profile Cloning Mode in The Perspectives of Cyberculture and Space Transition Theory.

10. Cyber Crime Communication Patterns Impulsive Purchase Behavior of NCT 127 "The Unity Jakarta" Concert Tickets on X (Twitter).

11. CHALLENGES OF INDONESIAN INDUSTRIALIZATION AND TRADE PROBLEMS IN THE INDUSTRIAL ERA 4.0 FOR THE INDONESIAN ECONOMY AND GOVERNMENT POLICY BREAKTHROUGH.

12. الوعي بالجريمة السيبرانية القائمة على منصات التواصل الاجتماعي: دراسة استكشافية على المجتمع العماني

13. Promoting Cyber Ethics Compliance among Teachers in Tanzania: What should be done?

14. Feasibility Study of Using Blockchain Technology for Criminal Records in Central Java

15. A Quantile Regression for Computer Crimes Act in Thailand

18. PERETASAN SITUS MILIK DEWAN KEHORMATAN PENYELENGGARA PEMILU OLEH H DITINJAU DARI UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK

19. Tindak Pidana Kesusilaan Di Media Sosial

20. 网络犯罪抽样取证的实践困境与完善.

21. Kybernetická zbraň a právo: kybernetické útoky proti nemocnicím.

22. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.

23. Securitatea cibernetică din perspectiva respectării drepturilor și libertăților individuale.

24. Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors.

25. CARDING CRIME IN MAKASSAR CITY: JURIDICAL REVIEW AS AN ISSUES OF CYBERCRIME.

26. TINDAK PIDANA PENYALAHGUNAAN DATA PRIBADI DALAM HUKUM SIBER INDONESIA.

27. Risk Avoidance Behavior on Darknet Marketplaces.

28. Academic misconduct, fake authorship letters, cyber fraud: Evidence from the International Political Science Review.

29. Digital Forensics in Cyber Security and Its Impact on Developing Countries.

30. Evolution of Global Digital Forensics Laws and Emergent Challenges

31. Confiscation of Electronic Evidence Cyber Crime in Business and Law Collaboration After Pandemic Achieving Sustainable Legal Development

32. Fake Profile Detection Using Image Processing and Machine Learning

33. The Effects of Cyber Crime on E-Banking

34. Email Spam Detection Using Naive Bayes and Random Forest Classifiers

36. Human Security Identification in Maqoshid Sharia Concept as Implementation in Debt Trap of Digital Finance

37. Personal Data Protection Vulnerabilities In Cybercrime Sniffing Bank Account Break-Ins

38. Potential Cybercrime and Prevention in the Overseas Official Travel Approval Letter

39. The Importance of Digital Technology in Extracting Electronic Evidence: How Can Digital Technology be used at Crime Scenes?

40. CANCEL CULTURE: CYBERBULLYING ON TWITTER SEEN FROM THE SPACE TRANSITION THEORY.

42. Paradigms on Technology Development for Security Practitioners

43. Current problems of international information security

44. The Role of Legal Digitization on Cybercrime Control in Indonesia Jenda Ingan Mahuli Faculty of Law, Universitas Pembinaan Masyarakat Indonesia, Medan, Indonesia

45. Blockchain Forensics: A Modern Approach to Investigating Cybercrime in the Age of Decentralisation.

46. A Comprehensive Study on Cyber Legislation in G20 Countries

47. The Current Situation of Internet Underground Industry Chain and Its Governance Model

48. Profiling Cyber Crimes from News Portals Using Web Scraping

50. Cyber Crime Prediction Using Machine Learning

Catalog

Books, media, physical & digital resources