Combating Cyber Dependent Crimes: The Legal Framework in the UK (English)
- New search for: Sallavaci, Oriola
- New search for: Sallavaci, Oriola
In:
Global Security, Safety and Sustainability - The Security Challenges of the Connected World
1
;
53-66
;
2016
- Article/Chapter (Book) / Electronic Resource
-
Title:Combating Cyber Dependent Crimes: The Legal Framework in the UK
-
Contributors:Sallavaci, Oriola ( author )
-
Published in:Global Security, Safety and Sustainability - The Security Challenges of the Connected World , 1 ; 53-66Communications in Computer and Information Science ; 630, 1 ; 53-66
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2016-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Deconstruct and Preserve (DaP): A Method for the Preservation of Digital Evidence on Solid State Drives (SSD)Mitchell, I. / Anandaraja, T. / Hara, S. / Hadzhinenov, G. / Neilson, D. et al. | 2016
- 12
-
Bitcoin Forensics: A TutorialNeilson, David / Hara, Sukhvinder / Mitchell, Ian et al. | 2016
- 27
-
Forensic Analysis of Secure Ephemeral Messaging Applications on Android PlatformsAzhar, M. A. Hannan Bin / Barton, Thomas Edward Allen et al. | 2016
- 42
-
Digital Evidence: Disclosure and Admissibility in the United Kingdom JurisdictionMontasari, Reza et al. | 2016
- 53
-
Combating Cyber Dependent Crimes: The Legal Framework in the UKSallavaci, Oriola et al. | 2016
- 69
-
Aspects of Voice Communications FraudHelenport, Alexandre / Tait, Bobby L. et al. | 2016
- 82
-
Scalable Frameworks for Application Security and Data ProtectionKabanov, Ilya et al. | 2016
- 96
-
Balancing Targeted Delivery of Content and Personal Freedom in the Digital On-line Video Marketing LandscapeRevett, Kenneth / Magalhães, Sérgio Tenreiro / Magalhães, Maria Jose / Jahankhani, H. et al. | 2016
- 106
-
Towards an Enterprise Architecture Framework for Community PolicingGibson, Helen / Akhgar, Babak et al. | 2016
- 113
-
A Scalable Malware Classification Based on Integrated Static and Dynamic FeaturesBounouh, Tewfik / Brahimi, Zakaria / Al-Nemrat, Ameer / Benzaid, Chafika et al. | 2016
- 125
-
Source Camera Identification Using Non-decimated Wavelet TransformSoobhany, Ahmad Ryad / Sheikh-Akbari, Akbar / Schreuders, Z. Cliffe et al. | 2016
- 134
-
Content Discovery Advertisements: An Explorative AnalysisJadhav Balaji, Raghavender Rao / Baravalle, Andres / Al-Nemrat, Ameer / Falcarin, Paolo et al. | 2016
- 144
-
Phishing-Deception Data Model for Online Detection and Human ProtectionBarraclough, Phoebe / Sexton, Graham et al. | 2016
- 155
-
Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational AwarenessPournouri, Sina / Akhgar, Babak / Bayerl, Petra Saskia et al. | 2016
- 173
-
ITAOFIR: IT Asset Ontology for Information Risk in Knowledge Economy and BeyondAdesemowo, A. Kayode / Solms, Rossouw / Botha, Reinhardt A. et al. | 2016
- 191
-
Disaster Management System as an Element of Risk Management for Natural Disaster Systems Using the PESTLE FrameworkSarwar, Dilshad / Ramachandran, Muthu / Hosseinian-Far, Amin et al. | 2016
- 205
-
A Review on Privacy Issues in Hotels: A Contribution to the Definition of Information Security Policies and Marketing StrategiesMagalhães, Maria José / Magalhães, Sérgio Tenreiro / Revett, Kenneth / Jahankhani, Hamid et al. | 2016
- 218
-
Tor Marketplaces Exploratory Data Analysis: The Drugs CaseCelestini, Alessandro / Me, Gianluigi / Mignone, Mara et al. | 2016
- 230
-
User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information SecuritySeuwou, Patrice / Banissi, Ebad / Ubakanma, George et al. | 2016
- 252
-
Application of a Digraph for Behavioural Eye Tracking BiometricsTait, Bobby L. et al. | 2016
- 266
-
Behavioural Biometrics for Authentication and Stress Detection – A Case Study with ChildrenAzevedo, Ana I. / Santos, Henrique D. / Sá, Vítor J. / Lopes, Nuno V. et al. | 2016
- 281
-
Using Dual Trigger Handover Algorithm to Improve WiMAX Handover DelayKhan, Imran / Yousef, Sufian et al. | 2016
- 290
-
Social Media and E-Voting – A Secure and Trusted Political Forum for PalestineShat, Fouad / Pimenidis, Elias et al. | 2016
- 305
-
Actor-Network Theory as a Framework to Analyse Technology Acceptance Model’s External Variables: The Case of Autonomous VehiclesSeuwou, Patrice / Banissi, Ebad / Ubakanma, George / Sharif, Mhd Saeed / Healey, Ann et al. | 2016
- 321
-
The Future of Enterprise Security with Regards to Mobile Technology and ApplicationsTagoe, F. T. / Sharif, M. S. et al. | 2016
- 331
-
Chemical, Biological, Radiological and Nuclear (CBRN) Protective Clothing – A ReviewMagalhães, Maria José / Magalhães, Sérgio Tenreiro / Revett, Kenneth / Jahankhani, Hamid et al. | 2016
- 342
-
Performance Analysis for Traffics in Mobile Ad Hoc NetworkHazzaa, Firas / Yousef, Sufian et al. | 2016
- 351
-
Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning SystemsMajeed, Asim / Baadel, Said / Haq, Anwar Ul et al. | 2016
- 364
-
Efficient Energy and Processes Time Algorithm for Offloading Using Cloud ComputingAldmour, Rakan / Yousef, Sufian / Albaadani, Faris / Yaghi, Mohammad et al. | 2016
- 371
-
A Novel Anonymity Quantification and Preservation Model for UnderNet Relay NetworksEpiphaniou, Gregory / French, Tim / Al-Khateeb, Haider / Dehghantanha, Ali / Jahankhani, Hamid et al. | 2016
- 385
-
A Novel Energy Sleep Mode Based on Standard Deviation ‘ESMSD’ Algorithm for Adaptive Clustering in MANETsAl-Baadani, Faris / Yousef, Sufian / Aldmour, Rakan / Al-Jabouri, Laith / Tapaswi, Shashikala / Patnaik, Kiran Kumar / Cole, Michael et al. | 2016
- 394
-
Facial Recognition Cane for the Visually ImpairedMajeed, Asim / Baadel, Said et al. | 2016