Internet security and cyber crime investigation

Pao Yue-kong Library Electronic Theses Database

Internet security and cyber crime investigation

 

Author: Wang, Yanwen
Title: Internet security and cyber crime investigation
Degree: M.Sc.
Year: 2009
Subject: Hong Kong Polytechnic University -- Dissertations.
Computer crimes -- Investigation.
Computer security.
Internet fraud.
Department: Dept. of Computing
Pages: vii, 62 leaves : ill. ; 30 cm.
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b2318165
URI: http://theses.lib.polyu.edu.hk/handle/200/4471
Abstract: This dissertation report aims to improve the safety awareness and the legal concepts of Internet users. It appeals to Internet users to effectively use the technology to jointly protect Internet security. At the same time, people are able to guarantee the use of technology governed by the law. The objective of the first part: - To show that the theft of virtual property is to bear legal responsibilities through elaboration of the legal legislation of virtual property. - To show that if people add hack - a cheating device into online games during making games, it will be violating relevant laws. - The use of electronic evidence can effectively deal with cases of cyber crime. And this dissertation report will links the characteristics of electronic commerce security up with the fact of the companies and individuals, making the investigation and analysis under the theory and practice. It will summarize the shortage and defect of network security and electronic exchange in China. And the aid of this dissertation report is trying to bring forward some measures to make Chinese electronic commerce become better and better. The objective of the second part: - Conduct a survey for university students to know about the security status in young people. - Conduct a survey for enterprise to know about the security status in enterprises. - Information security management system is important to protect information of enterprises - Information Security Management System ISO/IEC 27001:2005

Files in this item

Files Size Format
b23181655.pdf 1.562Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information