Oxford Index Browse

You are looking at 1-10 of 21 items for:

Computing x Law x clear all

Refine by type

Refine by product

 

bluejacking

Overview page. Subjects: Computing — Law.

Is a process of sending a version of spam using Bluetooth technology. It involves mobile phone users who are within Bluetooth communication distance of another user sending a business card...

See overview in Oxford Index

bluesnarfing

Overview page. Subjects: Computing — Law.

An attack on a mobile phone using Bluetooth technology that makes illegal access to the data on the phone

See overview in Oxford Index

card-not-present

Overview page. Subjects: Computing — Law.

A business transaction where a credit card is not physically presented, for example when a telephone sale is made for some product or service.

See overview in Oxford Index

computer fraud

Overview page. Subjects: Law — Computing.

Any technique aimed at manipulating information within a computer system for the purpose of illicit, usually financial, gain.

See overview in Oxford Index

cracking

Overview page. Subjects: Computing — Law.

The unauthorized entry into a computer system, usually a networked system, in order to carry out some illegal act such as reading secure files or infecting the system with a virus.

See overview in Oxford Index

Critical visualization: a case for rethinking how we visualize risk and security

Peter Hall, Claude Heath and Lizzie Coles-Kemp.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 7264 words.

In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important...

Go to Oxford Journals »  full text: open access

From physical security to cybersecurity

Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Matthew Brown, Milind Tambe and Albert Xin Jiang.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 14191 words.

Security is a critical concern around the world. In many domains from cybersecurity to sustainability, limited security resources prevent complete security coverage at all times. Instead,...

Go to Oxford Journals »  full text: open access

Identifying patterns in informal sources of security information

Emilee Rader and Rick Wash.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 20810 words.

Computer users have access to computer security information from many different sources, but few people receive explicit computer security training. Despite this lack of formal education,...

Go to Oxford Journals »  full text: open access

Increasing cybersecurity investments in private sector firms

Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Lei Zhou.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 13628 words.

The primary objective of this article is to develop an economics-based analytical framework for assessing the impact of government incentives/regulations designed to offset the tendency to...

Go to Oxford Journals »  full text: open access

Internet Protocol

Overview page. Subjects: Computing — Law.

A protocol that allows traffic to pass between networks. The most widely used is IP, the Internet Protocol. See also internetworking.

See overview in Oxford Index