The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increased use of ICT in different areas of contemporary life, the widespread access to the Internet, and the use of social media, individuals and organisations face constant threats and challenges resulting from the bad consequences of cybercrimes. Research shows that the incidence of cybercrime is increasing. In response to these threats and challenges, government and law enforcement agencies...
Computer and Internet technology has become a vital part of a daily life for many as it has brought many enhancements to the quality of many individuals' lives. Although advances in computer and Internet technology are utilised by many people for various respectable reasons, at the same time it has become a tool in the hands of cybercriminals for various nefarious reasons. Cybercrime has become a...
The advent of Internet technologies has created global cyber crime problems. Cyber crimes affect all of us at the time when online transactions are in billions of dollars per year and cyber criminals are costing e-commerce billions of dollars in damages [1]. These are the components of cyber crime through which cyber criminals have perpetrated these areas: hacking, distributed denial-of-service, phishing,...
Germany is one of the developed capitalist countries. Computers per capita rate is very high, while computer crime is also very serious in Germany. German computer crime laws are perfect as a representative of the national civil law, which involves number of crimes, protect a wide range of interests. All these have some inspiration and reference to our country.
Online communities are just like real worlds: control is necessary to make for a pleasant society. This does not automatically imply government or company control. In many virtual communities there has been a kind of social control for many years now that adequately maintains order in their public virtual space. Does this mean that laws are unnecessary? Some people cry out for an Internet police that...
Revolution in Internet and ease in use of latest technology is significantly increasing the use of latest technology worldwide, day by day. Advancement in digital devices such as computers and cell phones also helped the people to work both from home and offices. The indispensable nature of information technology, however, has also attracted cyber terrorist to target our strategic critical information...
The unprecedented growth of 'E-banking' has nullified the traditional methods of banking and transformed the way millions of customers conduct banking transactions. E-banking has many benefits and has been created in a technological age to aid businesses (e-commerce) and to ensure economic prosperity for many. However, E-banking does have a nebulous dimension. Cyber crime is one of its major disadvantages...
Cybercrime is a worsening problem that can lead to loss of financial and personal information. However, e-crime is particular hard to detect since Internet is boundless that make evidence hard to collect. Additionally, compare to others crime issues, e-crime is an emerging crime type thus previous crime theories should be refined and new methods of predicting e-crime should be further developed. In...
The aim of this contribution is to explore the possibility of using the well known concept of network neutrality (i.e., the property of a network infrastructure ignoring the content of the data packet it manages and being independent from legislative intervention) as a regulatory principle which goes beyond the contexts in which it is usually applied (namely, communication, antitrust and contract...
Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations...
This paper focuses on consumer fraud in auction website, and finds out why consumers may cheat sellers. At present, practitioners and scholars from home and abroad lay more emphasis on how to cope with website fraud, while less attention has been put on the consumer fraud. Based on the current situation of auction website, five key factors that have impact on consumer fraud have been put forward:...
This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from a technical and legal perspective and provides general directions on how these issues can be tackled. The paper also discusses the implications of data mining techniques and the issue of privacy protection with...
The ever growing use of computers and information communication technologies in the world of "e-everything" has opened up a range of new activities for crime to take place through electronic means on a global scale, irrespective of national and transnational borders. The effective combating, investigation and prosecution of such crimes require international cooperation between countries,...
We investigate the paradigm shift from the real- world organized crime to the organized cyber crime, in particular with regard to identity theft through phishing and the methods deployed for the purpose of money laundering. Our work is based on our collaboration with banks and lawyers within the working group identity protection on the Internet (a-i3') as well as phishing victims in Germany. We report...
Child pornography is an increasingly visible problem in society today. Methods currently employed to combat it may be considered primitive and inefficient, and legal and technical issues can exacerbate the problem significantly. We explore the area from social and technical perspectives, and call for viable solutions based upon distributed network infrastructure mechanisms. We also outline the use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.