Showing 1 - 4 of 4
The vulnerability of today's information economy is still not sufficiently realised: The economic structure of Queensland is to a great extent made up of Small and Medium Enterprises (SME). Across all industry sectors, these businesses rapidly approach a similar level of information technology...
Persistent link: https://www.econbiz.de/10009437520
Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion, and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow criminals to accumulate and covertly control multiple Internet-connected computers. They use this network of...
Persistent link: https://www.econbiz.de/10009476126
While banking system of Kazakhstan has been reformed during the past two decades to transition to the international standards, privacy of financial information seems to be left neglected. With the advent of the technological era and, hence, the rapid growth of computer crime, privacy of...
Persistent link: https://www.econbiz.de/10009459226
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David Lilja. 1 computer file (PDF); x, 108 pages, appendix A. Includes Vita page 106.
Persistent link: https://www.econbiz.de/10009462870