Essays about: "cyber-crime"
Showing result 1 - 5 of 8 essays containing the word cyber-crime.
-
1. Designing a solution for automating the management of a capture the flag network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Everyday one hears about another cyber attack against a company or state. In 2023 the cost of cyber crime reached 8 trillion USD and is expected to reach 10 trillion in 2025 [1]. It is becoming increasingly clear that cyber security is important in modern society and especially in the IT industry. READ MORE
-
2. INFLUENCE OF ONLINE ROUTINE ACTIVITIES ON ONLINE PURCHASE FRAUD VICTIMIZATION : AN ANALYSIS OF THE SPECIAL EUROBAROMETER SURVEY 2018
University essay from Malmö universitet/Institutionen för kriminologi (KR)Abstract : This paper uses Routine Activity Theory to examine online routine activities and individual level guardianship and the impact on online purchase fraud victimization across Europe. The findings suggest differences between the EU member states in online purchase fraud victimization. READ MORE
-
3. Probabilistic prediction of the behaviour of cyber attackers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Probabilistic graphical models are one of the most important tools used to learnfrom data and make decisions. Data analysis and representation methods arehighly used in cyber security as a powerful way to find understanding andimprove as cyber crime advances and cyber attacks become smarter. READ MORE
-
4. “Now You See It. Now You Don't”- How Cryptocurrencies Enable Money Laundering
University essay from Malmö universitet/Fakulteten för hälsa och samhälle (HS)Abstract : Money laundering is a non-violent crime, however when successfully executed it has a negative impact on society, as it tends to support other illicit activities, including terrorism. As was the case for other financial crimes, the internet opened the door for new tools that enable criminals to launder their illicit profits. READ MORE
-
5. Insider Threat detection using Isolation Forest
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE