The big social dangerousness of cybercrime and the increase of computer misuse, demand that his problem has to be addressed on certain law provisions. So, new interventions in penal codes are needed, interventions that will deal with this activity. In order to prohibit computer crime, many states are trying to find more efficient tools, methods and acts in this direction. Firstly, it is the juridical-penal regulation that has to be done, seeing the problem as a juridical protection fro the unauthorized interventions in computer systems. There has been discussion among low-making structures, with the approval of laws that has to do with the incrimination of the act of illegal intervention, concerning the moment when that intervention starts ...
Combating cybercrime is one of the most relevant areas of the legal community development since the ...
This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line wi...
Cybercrime and attacks against information systems have a considerable cross-border dimension. Appro...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Through this thesis I would like to present to the reader information on criminal action in the comp...
The European concerns with respect to preventing and fighting cybercrime materialized in the Council...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
The significance of information and communication techno-logies has created the need to establish wo...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
The rapid rise of information and communication technologies, as well as their widespread use in pra...
Life in a modern society is determined by strategic drivers, the most important of which are the Int...
Combating cybercrime is one of the most relevant areas of the legal community development since the ...
This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line wi...
Cybercrime and attacks against information systems have a considerable cross-border dimension. Appro...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Since 2000 until 2016, the Internet has expanded at an average rate of 918,3% globally; currently, a...
Through this thesis I would like to present to the reader information on criminal action in the comp...
The European concerns with respect to preventing and fighting cybercrime materialized in the Council...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
The significance of information and communication techno-logies has created the need to establish wo...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existe...
The rapid rise of information and communication technologies, as well as their widespread use in pra...
Life in a modern society is determined by strategic drivers, the most important of which are the Int...
Combating cybercrime is one of the most relevant areas of the legal community development since the ...
This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line wi...
Cybercrime and attacks against information systems have a considerable cross-border dimension. Appro...