Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Crime
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 304–315.
Published: 09 February 2023
...Gunnar Lindqvist; Joakim Kävrestad Purpose The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness...
Journal Articles
1997 computer crime and security survey
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (2): 78–101.
Published: 01 May 1998
...David Thompson Describes how the Office of Strategic Crime Assessments (OSCA) and the Victoria Police Computer Crime Investigation Squad conducted the 1997 Computer Crime and Security Survey in order to establish some reliable base‐line information regarding the extent of computer‐related crime...
Journal Articles
Simplifying the state and federal computer crime law maze in the USA
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (1): 18–20.
Published: 01 March 1995
...Jay Bloombecker Computer fraud, Law, Procedures, Punishment, USA Outlines in chart format the definitions, prohibitions, procedures and punishments of computer crime laws in the USA. The computer crime laws currently in force in every state except Vermont and under federal jurisdiction present...
Journal Articles
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (3): 43–45.
Published: 01 August 1994
...”. Computers Crime Encryption Privacy Security Expensive, flawed technology is being aggressively proposed by the US administration which may permanently erode personal privacy and will not accomplish its stated goal. It is generically referred to as the Clipper chip. The Clipper chip...
Journal Articles
Executive Liability for Computer Crime and How to Prevent It
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (2): 29–31.
Published: 01 May 1994
...James M. Geary A new Federal regulation aimed at tackling white‐collar crime has sobering implications for CEOs, information systems managers, and other senior management. Simply stated, the regulation holds the CEO and senior management responsible for crime involving their organization. Officials...
