The natural consequence of development of Information Society is that investigators should be able to collect evidence in digital environment. Access to data stored on personal computers enables collection of important information about suspects - for example their plans, habits and contacts. Using hacking tools investigators can detect bank account numbers or secret pin codes. The development of Internet technologies made it possible to do it secretly, without people knowing that they are being watched. Furthermore, the methods typically used to commit crimes on the Net such as: Trojan software, keyloggers or sniffers can be also used by investigators and police to protect citizens and to fight terror effectively.Are traditional legal meas...
How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing t...
The facilities of computer technology have not come out without drawbacks. Even though it makes the ...
Several countries have recently introduced laws allowing the police to hack into suspects’ computers...
This thesis addresses the issue of on-line privacy, in an effort to identify the limits of governme...
The development of technology and online communication has also led to the appearance of what seem t...
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catch...
The conflict between individual privacy and the needs of law enforcement occurs at a number of point...
Currently, across the globe and on different levels, serious debates are held on the possibilities o...
Currently law is challenging of regulation protection of the main currency – information. Vast amoun...
Whether privacy is an adequate legal safeguard against intrusive government or private sector activi...
That scientific development in information and flow techniques in recent years, electronic revolutio...
"National security increasingly depends on computer security. Cybercrime is written by the leading a...
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government p...
Behavioural targeting, or online profiling, is at the core of many privacy problems on the Internet....
Situational crime prevention techniques are considered as fundamental elements of the cyber security...
How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing t...
The facilities of computer technology have not come out without drawbacks. Even though it makes the ...
Several countries have recently introduced laws allowing the police to hack into suspects’ computers...
This thesis addresses the issue of on-line privacy, in an effort to identify the limits of governme...
The development of technology and online communication has also led to the appearance of what seem t...
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catch...
The conflict between individual privacy and the needs of law enforcement occurs at a number of point...
Currently, across the globe and on different levels, serious debates are held on the possibilities o...
Currently law is challenging of regulation protection of the main currency – information. Vast amoun...
Whether privacy is an adequate legal safeguard against intrusive government or private sector activi...
That scientific development in information and flow techniques in recent years, electronic revolutio...
"National security increasingly depends on computer security. Cybercrime is written by the leading a...
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government p...
Behavioural targeting, or online profiling, is at the core of many privacy problems on the Internet....
Situational crime prevention techniques are considered as fundamental elements of the cyber security...
How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing t...
The facilities of computer technology have not come out without drawbacks. Even though it makes the ...
Several countries have recently introduced laws allowing the police to hack into suspects’ computers...