Collier et al., 1992 - Google Patents
A forensic methodology for countering computer crimeCollier et al., 1992
- Document ID
- 423381174361314168
- Author
- Collier P
- Spaul B
- Publication year
- Publication venue
- Artificial intelligence review
External Links
Snippet
This paper argues that the moves by police and consultancy firms to successfully enforce recent computer misuse legislation requires the bringing together of investigative, legal, courtroom and computing skills in an extension of forensic science. The term suggested for …
- 238000000034 method 0 title description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1253—Configuration of print job parameters, e.g. using UI at the client
- G06F3/1255—Settings incompatibility, e.g. constraints, user requirements vs. device capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Smith | Investigations: Bank Fraud | |
Okpako et al. | The impact of forensic accounting on fraud detection | |
Agwu | Reputational risk impact of internal frauds on bank customers in Nigeria | |
Gordon et al. | Identity fraud: A critical national and global threat | |
Kanu et al. | Frauds and forgeries in banking industry in Africa: a content analyses of Nigeria Deposit Insurance Corporation annual crime report | |
Vitvitskiy et al. | Peculiarities of cybercrime investigation in the banking sector of Ukraine: review and analysis | |
Felix | Evidence collecting processes and fraud examination: the role of an expert forensic accountant | |
Collier et al. | A forensic methodology for countering computer crime | |
Sciglimpaglia Jr | Computer Hacking: A Global Offense | |
Tjeng et al. | The Audit Investigation and Accounting Forensicin Detecting Fraud in Digital Environment | |
Iliemena et al. | Forensic auditing as a panacea to bank failure in Nigeria | |
Гарайбех | Criminal legal protection of persons in the framework of ensuring their economic-law safety: features of implementation in jordan | |
Collier et al. | Problems in policing computer crime | |
Jurgilewicz et al. | MANAGEMENT OF INFORMATION SECURITY AND ITS PROTECTION IN IN CRIMINAL MATTERS: CASE OF POLAND. | |
Kamyshanskyi et al. | Conduct of search actions in the investigation of fraud with financial resources. | |
Nycum | Computer abuses raise new legal problems | |
Kyrychenko et al. | Fraud in the banking system of Ukraine: ways to combat taking into account foreign experience | |
Collier et al. | Information systems forensics | |
Smith | International identity crime 1 | |
Super et al. | Violence and the policing of mobility in South Africa | |
Collier et al. | Forensic science against computer crime in the United Kingdom | |
McLaughlin et al. | Computer Crime: The Ribicoff Amendment to United States Code, Title 18 | |
Yarnavskyi et al. | Combating Laundering of the Proceeds from Crime: Ukrainian and Foreign Experience | |
Mali et al. | Preventing the Banks Fraud: An Analytical Study | |
Bell | An evolving series of proceeds of crime models |