Virtual crime

Results: 140



#Item
81Digital gold currencies / Currency / Payment systems / Virtual economy / Bitcoin / Peer-to-peer computing / Virtual currency / Electronic money / Money laundering / Money / Electronic commerce / Economics

а Basic Manual on the Detection And Investigation of the Laundering of Crime Proceeds Using Virtual Currencies

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2014-10-15 03:34:47
82Virtual reality / Internet safety / Crime prevention / Internet / Comment / Social networking service / Parental controls / Child grooming / Technology / Human development / Information

Parental Internet Controls Consultation Response Form The closing date is: 6 September 2012 Your comments must reach us by that date. The Government is keen to take views from information and communication businesses whi

Add to Reading List

Source URL: www.ispa.org.uk

Language: English - Date: 2014-04-25 10:05:45
83Data security / Computer security / Crime prevention / National security / Information security / Virtual private network / Backup / Router / Health Insurance Portability and Accountability Act / Computing / Computer network security / Security

Chapter 76 Information Security Rules for Taxicab Technology Service Providers

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2014-03-27 16:37:32
84Security engineering / Crime prevention / Surveillance / Critical infrastructure protection / Closed-circuit television / National security / Security / Public safety

CASE Study Virtual Perimeter Monitoring System Cost-effective Video Surveillance with Video Analytics Challenge: The U.S. Navy wanted to be able to deploy a camera surveillance system that could be easily deployed witho

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2013-06-11 12:51:54
85Crime prevention / Security engineering / Critical infrastructure protection / Closed-circuit television / Surveillance / Computer security / Security / National security / Public safety

CASE STUDY Case Study: Virtual Perimeter Monitoring System Cost-effective Video Surveillance with Video Analytics Challenge: The U.S. Navy wanted to be able to deploy a camera surveillance system that could be easily de

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2013-03-08 15:14:12
86Data security / Crime prevention / National security / Public safety / Computer security / Information security / Virtual private network / Password / Backup / Security / Computer network security / Computing

Chapter 84 Information Security Rules for Street Hail Livery Technology System Providers

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2014-03-27 16:37:25
87Science / Violence / Family therapy / Crime / Behavior / Domestic violence / University of New Brunswick / National Virtual Observatory / Data sharing / Ethics / Violence against women / Abuse

Canadian observatory on the justice system’s response to intimate partner violence Progress Report[removed]June) Canadian observatory on the justice syst em response to intimate partner violence 678 Windsor Street,

Add to Reading List

Source URL: www2.unb.ca

Language: English - Date: 2011-11-24 10:23:01
88Crime prevention / Surveillance / Internet / New media / Scientific revolution / Virtual reality / Closed-circuit television / Wiki / Security / National security / Digital media

Microsoft Word - Admin notice[removed]Phone Internet Blogging.doc

Add to Reading List

Source URL: www.antarctica.ac.uk

Language: English - Date: 2014-09-06 11:37:49
89Information society / Internet culture / Community building / Community websites / Collaboration / Virtual community / Internet forum / Learning platform / United Nations Office on Drugs and Crime / Social information processing / Virtual reality / Technology

UNODC’S COUNTER-TERRORISM LEARNING PLATFORM USER GUIDE UNODC COUNTER-TERRORISM LEARNING PLATFORM

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2012-10-18 03:50:52
90Human development / Crime / Technology / Virtual communities / Internet privacy / Online identity / Identity theft / Social networking service / Online shopping / Abuse / Bullying / Cyber-bullying

Smart Social Networking Fifteen Tips for Teens Sameer Hinduja, Ph.D. and Justin W. Patchin, Ph.D. October 2014

Add to Reading List

Source URL: www.cyberbullying.us

Language: English - Date: 2014-11-07 12:29:29
UPDATE