Metrika

  • citati u SCIndeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:24
  • preuzimanja u poslednjih 30 dana:10

Sadržaj

članak: 2 od 4  
Back povratak na rezultate
2021, vol. 76, br. 2, str. 254-261
Nove tehnologije u istragama organizovanog kriminala
Subotica

e-adresamilicadjekic82@gmail.com
Sažetak
Današnja ljudska populacija je postala zavisna od novih tehnologija koje imaju kako prednosti tako i nedostatke. Neke studije sugerišu da postoji nekoliko milijardi internet konekcija širom sveta i one nisu samo u rukama legalnih snaga već i kriminalaca i terorista. Dakle, kako smo svi mi zavisni od visokih tehnologija - naši neprijatelji su u istom položaju, takođe. Kroz ovaj istraživački članak, planiramo da pričamo o izazovima organizovanog kriminala u savremenim društvima, njihovom uticaju na svetsku populaciju, kulturu i ekonomiju i da konačno, obezbedimo neke korelacije između visokotehnološkog prostora I kriminalnog miljea sugerišući kako neki teški slučajevi u kriminologiju mogu da budu istraženi koristeći računare, web i mobilne tehnologije.
Reference
Behl, A., Behl, K. (2012) An analysis of cloud computing security issues. u: 2012 World Congress on Information and Communication Technologies, 30 Oct.-2 Nov, Trivandrum, India: Institute of Electrical and Electronics Engineers (IEEE), 109-114
Booz, H.A. (2011) Cyber operations maturity framework: A model for collaborative, dynamic cybersecurity
Charney, S. (2009) Rethinking the Cyber Threat: A Framework and Path Forward. Microsoft Corp
Delgado, A. (2015) Ensuring our Children's Safety While Connected. US Air Force Central Command, [Internet], The WEB source: http://www.afcent.af.mil/Units/379thAirExpeditionaryWing/Ne ws/Display/tabid/298/Article/622136/ensuring-ourchildrens-safety-while-connected.aspx
Đekić, M. (2011) The use of video detection as a function of traffic safety. Tehnika, vol. 66, br. 3, str. 471-475
Đekić, M.D. (2017) How a modern business could respond to the phishing attack challenges. Tehnika, vol. 72, br. 3, str. 455-459
Đekić, M.D. (2017) The application of marketing for small and medium-sized enterprises competiveness rise in the Republic of Serbia. Tehnika, vol. 72, br. 4, str. 587-590
Đekić, M.D. (2016) A smart configuration of computer as a prevention from hacking and cyber espionage. Tehnika, vol. 71, br. 5, str. 761-764
Đekić, M.D. (2016) How to create training for the IT industry's staffs?. Tehnika, vol. 71, br. 4, str. 644-647
Đekić, M.D. (2015) How to maintain a business continuity despite cyber incidents?. Tehnika, vol. 70, br. 2, str. 346-349
Đekić, M.D. (2015) Kako sačuvati kontinuitet u poslovanju uprkos cyber incidentima?. Tehnika, vol. 70, br. 2, str. 346-349
Đekić, M.D. (2016) Cyber procedure za poslovno okruženje u Srbiji. Tehnika, vol. 71, br. 3, str. 471-474
Đekić, M.D. (2018) The cloud's computing security. Tehnika, vol. 73, br. 2, str. 300-304
Đekić, M.D. (2017) The Internet of Things Security. Tehnika, vol. 72, br. 2, str. 309-312
Đekić, M.D. (2016) The commerce crime and ways of conducting a financial security. Tehnika, vol. 71, br. 5, str. 782-786
Đekić, M.D. (2016) Cyber procedures for a business environment in Serbia. Tehnika, vol. 71, br. 3, str. 471-474
Đekić, M.D. (2019) The Internet of Things cybersecurity standardization. Tehnika, vol. 74, br. 4, str. 603-607
European Police Office (Europol) (2014) The Internet Organized Crime Threat Assessment
Frye, J.N., Veitch, C.K., Mateski, M.E., Michalski, J.T., Harris, J.M., Trevino, C.M., Maruoka, S. (2012) Cyber threat metrics. United States: Sandia National Laboratories, Technical Report
Jason, H. (2015) Cloud Attack: Unsharing Your Business in The Cloud. BrightTALK
Kasac, J., Milić, V., Stepanić, J., Mester, G. (2014) A computational approach to parameter identification of spatially distributed nonlinear systems with unknown initial conditions. u: IEEE Symposium on Robotic Intelligence in Informationally Structured Space RiiSS (2014), Orlando, Florida, USA, 9-12 December, Proceedings, ISBN: 9781479944-637, p. 154, Vol. 1, pp. 55-61
Khalil, I.M., Khreishah, A., Bouktif, S., Ahmad, A. (2013) Security Concerns in Cloud Computing. u: 2013 International Conference on Information Technology: New Generations (10th), Proc, Las Vegas, NV, USA: IEEE, 411-416
Lenkala, S.R., Shetty, S., Kaiqi, X. (2013) Security Risk Assessment of Cloud Carrier. u: 2013 IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (13th), Proc, Delft, Netherlands: IEEE, 442-449
Liu, W. (2012) Research on cloud computing security problem and strategy. u: International Conference on Consumer Electronics, Communications and Networks (CECNet) (2nd), Yichang, China, Proc, pp. 1216-1219
Meghanathan, N. (2013) Review of Access Control Models for Cloud Computing. u: Computer Science & Information Technology (CS & IT), Academy & Industry Research Collaboration Center (AIRCC
Mester, G., Rodić, R. (2012) Navigation of an autonomous outdoor quadrotor helicopter. u: International Conference on Internet Society Technologie and Management ICIST (2nd), 01-03.03.2012, Kopaonik, Serbia, Proc, ISBN: 978-86-85525-10-0, pp. 259-262
Mester, G. (2009) Obstacle-slope avoidance and velocity control of wheeled mobile robots using fuzzy reasoning. u: IEEE International Conference on Intelligent Engineering Systems (13th), INES 2009, April 16-18, 2009, Barbados, Proc, IEEE, ISBN: 978-1-4244-4113-6, 245-249
Mester, G. (2015) Backstepping control for hexa-rotor microcopter. Acta Technica Corviniensis: Bulletin of Engineering, Tome VIII, Fascicule 3, pp. 121-125, July-September
Mester, G., Rodić, A. (2013) Simulation of quad-rotor flight dynamics for the analysis of control, spatial navigation and obstacle avoidance. u: The International Workshop on Advanced Computational Intelligence and Intelligent Informatics (3rd), IWACIII, October 18 to 21 in 2013, Shanghai, China, Proceedings of, ISSN: 2185-758X, pp. 1-4
Mester, G. (2016) Massive open online courses in education of robotics. Interdisciplinary Description of Complex Systems, 14(2), 182-187
Mester, G. (2013) Metode naučne metrike i rangiranja naučnih rezultata. u: ETRAN Conference (57th), Zlatibor, Serbia, 3-6. June, Proc, pp. RO3.5.1-3
Mester, G. (2015) New Trends in Scientometrics. u: SIP 2015, International Conference Science in Practice (33nd), Schweinfurt, Germany, 07-08.05.2015, Proc, pp. 22-27
Mester, G. (2015) Cloud Robotics Model. Interdisciplinary Description of Complex Systems, Vol. 13, No. 1, pp. 1-8
Mester, Gy. (2015) Modeling of autonomous hexa-rotor microcopter. u: International Conference and Workshop Mechatronics in Practice and Education (IIIrd), MechEdu 2015, Subotica, Serbia, May 14-16, Proceedings, pp. 88-91, ISBN 978-86-918815-0-4
Mester, G. (2011) Academic Ranking of World Universities 2009/2010. IPSI Journal, Transactions on Internet Research (TIR), Volume 7, Number 1, pp. 44-47
Mester, G.G. (2015) Novi trendovi naučne metrike. u: Skup (XXI) Trendovi Razvoja: 'Univerzitet u Promenama...', TREND 2015, 23-26 02.2015, Zlatibor, Serbia, Proc, ISBN 978-86-7892-680-8, paper No. UP 1-3, pp. 23-30
Mester, G.L. (2015) Merenje rezultata naučnog rada. Tehnika, vol. 70, br. 3, str. 445-454
Ngo, H.N., Wu, X., le Dung, P., Wilson, C., Srinivasan, B. (2010) Dynamic Key Cryptography and Applications. International Journal of Network Security, Vol.10, No.3, pp.161-174, May
Omari, A., Al-Kasasbeh, B., Al-Qutaish, R., Muhairat, M. (2009) DEA-RTA: A Dynamic Encryption Algorithm for the Real-Time Applications. International journal of computers, Vol. 3, Issue 1, pp. 191-199
Payne, S.C. (2007) A Guide to Security Metrics. SANS Institute
Peterson, M. (2005) Intelligence-Led Policing: The New Intelligence Architecture. Bureau of Justice Assistance
Rodic, A., Mester, G. (2013) Control of a quadrotor flight. u: ICIST Conference, 03-06.03.2013, Kopaonik, Serbia, 03-06.03.2013, Proc, ISBN: 978-86-85525-12-4, pp. 61-66
Rodić, A., Mester, G. (2011) Ambientally aware bi-functional ground-aerial robot-sensor networked system for remote environmental surveillance and monitoring tasks. u: The ETRAN Conference (55th), Section Robotics, Society for Electronics, Telecommunications, Computers, Automatic Control and Nuclear Engineering, Banja Vrućica, Bosnia and Herzegovina, Jun 6-9, Procee, Vol. RO2.5, ISBN 978-86-80509-66-2, pp. 1-4
Schulze, H. (2015) Insider Threat Report. Crowd Research Partners
White, G. (2007) The Community Cyber Security Maturity Model. u: Annual Hawaii International Conference on System Sciences (HICSS'07) (40th), Proc, Academic Press
Zhang, N., Liu, D., Zhang, Y. (2013) A Research on Cloud Computing Security. u: 2013 International Conference on Information Technology and Applications, Proc, IEEE, 370-373
 

O članku

jezik rada: engleski
vrsta rada: pregledni članak
DOI: 10.5937/tehnika2102254D
primljen: 08.01.2021.
prihvaćen: 28.01.2021.
objavljen u SCIndeksu: 07.05.2021.
Creative Commons License 4.0

Povezani članci

Tehnika (2021)
COVID-19 kao izazov za prevare
Đekić Milica D., i dr.

Tehnika (2021)
Razumevanje novih tehnologija u fizičkom smislu
Đekić Milica D., i dr.

Tehnika (2021)
Korišćenje samovozećih vozila u transportu
Pisarov Jelena L., i dr.

prikaži sve [15]