Showing 1 - 10 of 2,264
Persistent link: https://www.econbiz.de/10014233810
Persistent link: https://www.econbiz.de/10011607614
Persistent link: https://www.econbiz.de/10003757079
Persistent link: https://www.econbiz.de/10010437014
Recent advances in computer technology have been aiding sexual predators, stalkers, child pornographers, child traffickers, and others with the intent of exploiting children. Internet bulletin boards, chat rooms, private websites, and peer-to-peer networks are being used daily by paedophiles to...
Persistent link: https://www.econbiz.de/10012772236
Persistent link: https://www.econbiz.de/10011699140
This paper looks at the question of direct participation in cyber hostilities under the international law of armed conflict, or international humanitarian law (IHL) as it is also known. The paper examines the history and development of the concept of direct participation in hostilities by...
Persistent link: https://www.econbiz.de/10014173187
Introduction : what is Web 2.0 and how will it change my business? -- Power to the people -- Pull media, not push -- The Web as platform : the network is the computer -- Case studies : rapidly changing online landscapes -- Successful online business models for Web 2.0 and beyond -- Ten things...
Persistent link: https://www.econbiz.de/10013485414
Online sextortion is an organised form of blackmail which can have a serious financial and traumatic impact on its victims. Responding to a dearth of evidence about this crime, this study analyses patterns within a large dataset of over 23,000 anonymous victim reports, collected via an online...
Persistent link: https://www.econbiz.de/10014517138
MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is...
Persistent link: https://www.econbiz.de/10013331777