Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,689,932 papers from all fields of science
Search
Sign In
Create Free Account
Cybercrime
Known as:
Internet crimes
, Computer abuse
, Attacking users
Expand
Cybercrime, or computer crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Art Bowker
Botnet
Carding (fraud)
Cloud computing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Log Analysis Techniques using Clustering in Network Forensics
I. Riadi
,
J. E. Istiyanto
,
A. Ashari
,
Subanar
arXiv.org
2013
Corpus ID: 5941287
Internet crimes are now increasing. In a row with many crimes using information technology, in particular those using Internet…
Expand
Review
2012
Review
2012
Ethical Technology Use, Policy, and Reactions in Educational Settings
Kadir Beycioglu
2012
Corpus ID: 16903995
Kadir Beycioglu is a lecturer at Inonu University (Malatya, Turkey). He is the Editor-in-Chief of the International Journal of…
Expand
Review
2011
Review
2011
A Review of DDOS Attack and its Countermeasures in TCP Based Networks
A. Mittal
,
A. Shrivastava
,
Manish Manoria
2011
Corpus ID: 18650997
Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time…
Expand
2011
2011
Defusing the Hazards of Social Network Services
SeyedHossein Mohtasebi
,
A. Dehghantanha
2011
Corpus ID: 167515770
Over the past few years, hundreds of millions of users have employed social network services (SNS) to exchange information. In…
Expand
2009
2009
Cyber Crime in South Africa - Hacking, cracking, and other unlawful online activities
S. Snail
Journal of information, law and technology
2009
Corpus ID: 45699287
1. Introduction Computer crime or commonly referred to as Cyber Crime or ICT Crime (van der Merwe, 2008, p.61) is a new type of…
Expand
2007
2007
Forensic computing - a practitioner's guide (2. ed.)
A. J. Sammes
,
B. Jenkinson
2007
Corpus ID: 59984651
With the advancement of the digital era, the digital crime (aka cyber crime) increasing day-by-day. This lead to the era of…
Expand
2007
2007
Proposal of Digital Forensic System Using Security Device and Hysteresis Signature
Yuki Ashino
,
R. Sasaki
Intelligent Information Hiding and Multimedia…
2007
Corpus ID: 17706795
With the development of the Internet society, digital forensics, i.e., the technology and procedures used to prepare digital…
Expand
2006
2006
Computer crime law
Orin S. Kerr
2006
Corpus ID: 109430262
The third edition of Kerr's popular computer crimes text includes many updates since the second edition in 2009. New cases…
Expand
2000
2000
Crime, Abuse and the Elderly
M. Brogden
,
Preeti Nijhar
2000
Corpus ID: 142291299
Introduction 1. Abuse vs Crime in Criminological history 2. The mythologies of elderly victimisation 3. Stereotyping the elderly…
Expand
Review
1974
Review
1974
Computers in the 1980s
R. Turn
1974
Corpus ID: 60260947
The best ebooks about Computers In The 1980s that you can get for free here by download this Computers In The 1980s and save to…
Expand