Jardine, 2015 - Google Patents
Global cyberspace is safer than you think: Real trends in cybercrimeJardine, 2015
View PDF- Document ID
- 1890471473448859037
- Author
- Jardine E
- Publication year
- Publication venue
- Global Commission on Internet Governance Paper Series
External Links
Snippet
What are the real trends in cybercrime? Recent media coverage has been rife with stories of large-scale data breaches, hacks and online financial crime. Information technology (IT) security firms such as Norton Symantec and Kaspersky Labs publish yearly reports that …
- 230000004044 response 0 abstract description 16
Classifications
-
- G—PHYSICS
- G02—OPTICS
- G02F—DEVICES OR ARRANGEMENTS, THE OPTICAL OPERATION OF WHICH IS MODIFIED BY CHANGING THE OPTICAL PROPERTIES OF THE MEDIUM OF THE DEVICES OR ARRANGEMENTS FOR THE CONTROL OF THE INTENSITY, COLOUR, PHASE, POLARISATION OR DIRECTION OF LIGHT, e.g. SWITCHING, GATING, MODULATING OR DEMODULATING; TECHNIQUES OR PROCEDURES FOR THE OPERATION THEREOF; FREQUENCY-CHANGING; NON-LINEAR OPTICS; OPTICAL LOGIC ELEMENTS; OPTICAL ANALOGUE/DIGITAL CONVERTERS
- G02F1/00—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics
- G02F1/01—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour
- G02F1/13—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells
- G02F1/133—Constructional arrangements; Operation of liquid crystal cells; Circuit arrangements
- G02F1/1333—Constructional arrangements; Manufacturing methods
- G02F1/1343—Electrodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- G—PHYSICS
- G02—OPTICS
- G02F—DEVICES OR ARRANGEMENTS, THE OPTICAL OPERATION OF WHICH IS MODIFIED BY CHANGING THE OPTICAL PROPERTIES OF THE MEDIUM OF THE DEVICES OR ARRANGEMENTS FOR THE CONTROL OF THE INTENSITY, COLOUR, PHASE, POLARISATION OR DIRECTION OF LIGHT, e.g. SWITCHING, GATING, MODULATING OR DEMODULATING; TECHNIQUES OR PROCEDURES FOR THE OPERATION THEREOF; FREQUENCY-CHANGING; NON-LINEAR OPTICS; OPTICAL LOGIC ELEMENTS; OPTICAL ANALOGUE/DIGITAL CONVERTERS
- G02F1/00—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics
- G02F1/01—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour
- G02F1/13—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells
- G02F1/137—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells characterised by a particular electro- or magneto-optical effect, e.g. field-induced phase transition, orientation effect, guest-host interaction, dynamic scattering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Exchange, e.g. stocks, commodities, derivatives or currency exchange
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jardine | Global cyberspace is safer than you think: Real trends in cybercrime | |
US10848517B1 (en) | Cybersecurity risk assessment on an industry basis | |
Kabanda et al. | Exploring SME cybersecurity practices in developing countries | |
Broadhead | The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments | |
Jones et al. | Do business students practice smartphone security? | |
Holt et al. | Assessing the macro-level correlates of malware infections using a routine activities framework | |
US11206279B2 (en) | Systems and methods for detecting and validating cyber threats | |
Srivastava et al. | Determinants of cybercrime originating within a nation: a cross-country study | |
Kent et al. | How South African SMEs address cyber security: The case of web server logs and intrusion detection | |
Zamir | Cybersecurity and social media | |
Jain et al. | Cybersecurity solutions using AI techniques | |
Calder | Cyber Security: Essential principles to secure your organisation | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
Durai et al. | A survey on security properties and web application scanner | |
Swanzy et al. | Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud | |
AlSalamah | Security risk management in online system | |
Escoses et al. | Phisherman: Phishing link scanner | |
Bareh | Assessment of the privacy and security practices of the Indian academic websites | |
Ross | The ongoing threat of ransomware to small businesses: A qualitative case study on the impediments to the application of preventative, detective, and corrective controls | |
Normurodov et al. | Cyber security challenges of big data applications in cloud computing: A state of the art | |
Calderon et al. | Toward a Protocol for Tax Data Security | |
Shah et al. | A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts | |
Utakrit | Security awareness by online banking users in Western Australian of phishing attacks | |
Maharjan | A Study of Scams and Frauds using Social Engineering in “The Kathmandu Valley” of Nepal | |
Halouzka et al. | The impact of the Covid-19 pandemic on the evolution of cyber threats |