Search
Search Results
-
Computer Crime
Computer crime (or cybercrime) is a crime that involves a computer and a network. The computer may be the vehicle by which the crime is conducted. -
Geo-spatial crime density attribution using optimized machine learning algorithms
Law enforcement agencies use various crime analysis tools. A large amount of crime data has enabled crime analysis. In this paper, the proposed...
-
Designing and evaluation of a mixed reality system for crime scene investigation training: a hybrid approach
Police investigation in real-life crime scenes is an essential aspect of forensic science education. However, the practicality of bringing young...
-
Modelling Crime Dynamics and Risky Places: A Basic Combination of Crime Theories and Space Syntax to Evaluate Spatial Crime Impedance
Effectively modelling urban systems is challenging but necessary to obtain appropriate tools to consciously intervene in cities. Among urban... -
Computer Crime Investigations and Ethics
This chapter discusses what constitutes digital evidenceDigitalevidence, the collection and analysis of digital evidenceDigitalevidence, the... -
Sufficiency of Struggling with the Current Criminal Law Rules on the Use of Artificial Intelligence in Crime
Every new technologyTechnology affects crime, which is a social phenomenon. This interaction is in the form of either the emergence of new forms of... -
Exploring associations between streetscape factors and crime behaviors using Google Street View images
Understanding the influencing mechanism of the urban streetscape on crime is fairly important to crime prevention and urban management. Recently, the...
-
We have to talk about emotional AI and crime
Emotional AI is an emerging technology used to make probabilistic predictions about the emotional states of people using data sources, such as facial...
-
Model for forecasting electronic fraud threats on selected electronic payment channels using linear regression
Electronic fraud is a problem that has become a source of concern for businesses of all sizes. Electronic fraud is increasing the margin of loss as...
-
Electronic Governance
Noch nie sind die technologischen Entwicklungen und die Veränderungen der Märkte so rasant verlaufen wie heutzutage. In diesem Zusammenhang zeigen... -
-
Secure electronic monitoring of sex offenders
Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...
-
Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime
This paper is a fusion of a survey of different existing research related to web forensics, disk forensics, and email forensics and the...
-
Heightened Cyber Vulnerability to Patients with Cardiac Implantable Electronic Devices
Cardiac implantable electronic devices (CIEDs) have shown to improve autonomy, quality of life, morbidity and mortality (relative reduction of... -
How do abnormal trading behaviors diffuse in electronic markets?
Abnormal trading behavior in e-markets, also known as market manipulation, is done with the aim of deceiving traders in order to obtain unusual...
-
Advances in Digital Forensics XIX 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud... -
Electronic Performance Monitoring: Review of Theories, Conceptual Framework, and Study Proposal
Use of electronic monitoring techniques in organizational settings has significantly gained in relevance in recent years, predominantly due to the... -
Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context
Focusing on citizens’ awareness of cyber-security, this paper contributes to debates on ICTs and their contribution towards human development. The...
-
Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment
Awareness of the many cybersecurity threats, vulnerabilities, and solutions to mitigate these threats/vulnerabilities is instrumental in improving...