Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Bitcoin (1)
- Blockchain (1)
- Computer (1)
- Computer Forensics (1)
- Computer crimes Political aspects (1)
-
- Computer crimes Social aspects (1)
- Computer networks Access control Political aspects (1)
- Computer networks Security measures Political aspects (1)
- Crime (1)
- Cryptocurrency (1)
- Cyber bullying (1)
- Darknet (1)
- Data mining (1)
- Electronic contracts (1)
- Forensics (1)
- Hackers (1)
- Hacktivism (1)
- Information technology Political aspects (1)
- Information technology Social aspects (1)
- Information warfare (1)
- Information warfare. (1)
- Internet case law (1)
- Monero (1)
- Nodal governance (1)
- Online privacy policies (1)
- Online user agreements (1)
- Parenting (1)
- Policing (1)
- Privacy torts (1)
- Risk (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Law
Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman
Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman
Student Theses
This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies …
Policing Cyber Bullying: How Parents, Educators, And Law Enforcement Respond To Digital Harassment, Ryan Broll
Policing Cyber Bullying: How Parents, Educators, And Law Enforcement Respond To Digital Harassment, Ryan Broll
Electronic Thesis and Dissertation Repository
Some prior research has emphasised how adults ought to address cyber bullying, yet little is known about how they actually prevent and respond to digital harassment. This study addresses this gap in the literature by exploring the formal and informal “policing” of cyber bullying by a network of security actors: parents, teachers and school administrators, and the public police. Data were collected through a mixed methods research design consisting of semi-structured qualitative interviews with eight parents, 14 teachers, and 12 members of law enforcement (n = 34) and quantitative surveys completed by 52 parents.
Drawing upon nodal governance theory as …
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
Theses Digitization Project
This study discusses the pursuit of understanding how the discursive construction of the internet affects individuals, identities, and democracy. it also discusses the internet within theoretical positions on its history, the public sphere, and revolutionary politics. Western governments have created legislation regulating the internet for democratic purposes, and this study examines how different and often contrasting views of democracy have shaped the way those of us connected to the internet can speak about it. The Anonymous identity, articulates one such contrast. Anonymous constructs an alternative, Internet identity-one stemming from the identity of the hacker. Policies targeted at stopping hackers and …
Real World Computer Forensics, Jessica Riccio
Real World Computer Forensics, Jessica Riccio
Liberal Arts and Engineering Studies
No abstract provided.
Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs
Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs
Chancellor’s Honors Program Projects
No abstract provided.