Cyber Crime and Cyber Terrorism


J Jihadi Social Network website, 125 L



Download 5,67 Mb.
Pdf ko'rish
bet280/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   275   276   277   278   279   280   281   282   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

J
Jihadi Social Network website, 125
L
Law enforcement agency (LEA)
social media
blogs, 197
collaborative projects, 197
communication, 198
connection, 198
content communities, 197
content sharing, 198
crime data analysis, 208–209
criminal threats, 198
crowd-sourcing data, 209–211
demographics and cultures usage,
204–205
expert search, 198
Facebook, 200
gender impacts, 202
hostage scenario, 207–208
human trafficking, 211–213
Instagram, 200
intelligence, 214–215
LinkedIn, 198, 200
Lone-Wolf scenarios, 206–207
minority status impacts, 202
national culture impacts, 202
online profiles and networks usage, 205
open-source intelligence, 199
performative aspect, 199
personal information, 203–204
Pinterest, 200
public engagement, 213–214
rationales, 200–201
relational aspect, 199
relevance, 204
service/people attitudes, 202
social networking sites, 197
technical setup, 203
Twitter, 200
user characteristics, 201–202
users’ identity online, 198
virtual game worlds, 197
virtual social worlds, 197
Life-Style Routine Activity Theory (LRAT), 154
Logical block addressing (LBA), 81
Lone Wolves, 125–126
Low level format (LLF), 80–81
M
Mafiaboy, 114–115, 118
Malicious hacking, 72
MANET technique, 271
Master boot record (MBR), 82
Media storage. 
See
Digital evidence
Missing Child Alert (MCA) program
Child Trafficking in South East Asia
anti-trafficking initiatives, 137
CBCT response system, 142–145, 145
f
child-centered actions and information flows, 
139–142, 140
f
cross-border child trafficking, 137
data model, coded typologies, 138
government and nongovernment agencies, 
support for, 136
labor/sexual exploitation, 137
missing children, 137, 138
objectivity, consistency and credibility, 
138–139
poverty, 137
push and pull factors, 137
security challenges and vulnerabilities in, 
141–142, 142
f
systems approach, 139
trafficking, definition, 137, 138
Plan International, 136
Most recently used (MRUs) lists, 85–86
Mujahideen Secrets, 126
Multicast Ad-hoc on-demand Distance Vector 
Routing Protocol (MAODV), 271
Multi-technology communication mobile IP 
gateway (MIPGATE), 267–269
N
Nagorno-Karabakh conflict, 16
National Coordinator of Terrorist Investigations, 40
National Cyber Security Programme (NCSP), 91
Nationality theory, 3



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   275   276   277   278   279   280   281   282   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish