Search Results - "computer crime"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer crimes 146
- Security measures 54
- Investigation 42
- Computer networks 38
- Computer security 38
- Prevention 38
- Internet 24
- Cyberterrorism 16
- Social aspects 12
- Computer hackers 10
- Cyberspace 10
- Data protection 10
- Evidence, Criminal 10
- Forensic sciences 10
- Information warfare 10
- Law and legislation 10
- Corporations 8
- Information technology 6
- Political aspects 6
- Standards 6
- Bullying in schools 4
- Business enterprises 4
- Computers 4
- Criminal investigation 4
- Criminology 4
- Cyberbullying 4
- Economic aspects 4
- Electronic commerce 4
- Electronic evidence 4
- Electronic surveillance 4
-
141
The Emerald international handbook of technology-facilitated violence and abuse /
Published 2021Subjects: “…Computer crimes Handbooks, manuals, etc.…”
Get full text
Electronic eBook -
142
Managing the human factor in information security how to win over staff and influence business managers /
Published 2009Subjects: “…Computer crimes Prevention.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
143
Information technology law /
Published 2017Table of Contents: “…Privacy, technology, and surveillance -- The esergence of data protection -- The scope of data protection -- Supervisory agencies -- The data protection priniciples -- Individual rights and remedies -- Sectoral aspects of data protection -- Transborder data flows -- National and international responses to computer-related crime -- Substantive criminal law provisions -- Computer fraud and forgery -- Virtual criminality -- Detecting and prosecuting computer crime -- Key elements of the patent system -- Patents -- Copyright protection -- Enforcement issues -- Protection of databases -- Design rights -- Trade mark and domain-name issues -- Internet regulation and domain names -- International and European initiatives in e-commerce -- Electronic money -- Contractual liability for defective software.…”
Book -
144
Information technology law /
Published 2017Table of Contents: “…Privacy, technology, and surveillance -- The esergence of data protection -- The scope of data protection -- Supervisory agencies -- The data protection priniciples -- Individual rights and remedies -- Sectoral aspects of data protection -- Transborder data flows -- National and international responses to computer-related crime -- Substantive criminal law provisions -- Computer fraud and forgery -- Virtual criminality -- Detecting and prosecuting computer crime -- Key elements of the patent system -- Patents -- Copyright protection -- Enforcement issues -- Protection of databases -- Design rights -- Trade mark and domain-name issues -- Internet regulation and domain names -- International and European initiatives in e-commerce -- Electronic money -- Contractual liability for defective software.…”
Book -
145
Encase computer forensics the official ENCE : Encase certified examiner study guide /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
146
Surveillance or security? the risks posed by new wiretapping technologies /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
147
Encase computer forensics the official ENCE : Encase certified examiner study guide /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
148
Surveillance or security? the risks posed by new wiretapping technologies /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
149
Wiki at war conflict in a socially networked world /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
150
Wiki at war conflict in a socially networked world /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
151
Internet and computer law : cases, comments, questions /
Published 2010Table of Contents: “…Internet and software copyright -- Patentability of computer software, programmed computers, and internet business systems -- Trade secrecy -- Trademarks, unfair competition, and unfair business practices -- Internet jurisdiction -- Electronic transactions -- Telecommunications and the internet -- Computer crime -- Antitrust -- Privacy -- Right to accuracy of information -- Regulation of internet content.…”
Book -
152
Internet and computer law : cases, comments, questions /
Published 2010Table of Contents: “…Internet and software copyright -- Patentability of computer software, programmed computers, and internet business systems -- Trade secrecy -- Trademarks, unfair competition, and unfair business practices -- Internet jurisdiction -- Electronic transactions -- Telecommunications and the internet -- Computer crime -- Antitrust -- Privacy -- Right to accuracy of information -- Regulation of internet content.…”
Book -
153
Accounting information systems : basic concepts and current issues /
Published 2013Table of Contents: “…Ais fundamentals -- Role and purpose of accounting information systems -- Transaction processing in the ais -- Internal controls -- Management concepts -- Information systems concepts -- Documentation techniques -- Flowcharting -- Data flow diagramming -- Rea modeling -- Information technology in the AIS -- XBRL -- E-business and enterprise resource planning systems -- Computer crime and information technology security -- Business processes -- Sales/collection process -- Acquisition/payment process -- Other business processes -- Other topics in AIS -- Decision-making models and knowledge management -- Professionalism, ethics, and career planning -- Auditing and evaluating the AIS -- Glossary -- Comprehensive chapter references -- Index.…”
Book -
154
Accounting information systems : basic concepts and current issues /
Published 2013Table of Contents: “…Ais fundamentals -- Role and purpose of accounting information systems -- Transaction processing in the ais -- Internal controls -- Management concepts -- Information systems concepts -- Documentation techniques -- Flowcharting -- Data flow diagramming -- Rea modeling -- Information technology in the AIS -- XBRL -- E-business and enterprise resource planning systems -- Computer crime and information technology security -- Business processes -- Sales/collection process -- Acquisition/payment process -- Other business processes -- Other topics in AIS -- Decision-making models and knowledge management -- Professionalism, ethics, and career planning -- Auditing and evaluating the AIS -- Glossary -- Comprehensive chapter references -- Index.…”
Book