Afficher la notice abrégée
dc.contributor.author |
Aty, Mourad |
|
dc.date.accessioned |
2020-09-13T07:28:53Z |
|
dc.date.available |
2020-09-13T07:28:53Z |
|
dc.date.issued |
2015-11-03 |
|
dc.identifier.uri |
http://dspace.univ-guelma.dz:8080/xmlui/handle/123456789/8658 |
|
dc.description.abstract |
Criminals committing cybercrime use a number of methods, depending on their skill-set and their goal. Here are some of the different ways cybercrime can take shape:
Theft of personal data
Copyright infringement
Fraud
Sexploitation
Cyberstalking
Bullying |
en_US |
dc.language.iso |
other |
en_US |
dc.publisher |
université 8 mai 1945 guelma |
en_US |
dc.subject |
Challenges of Encountering ISIS- Network - Algeria’s Policies - Digital Era |
en_US |
dc.title |
Challenges of Encountering ISIS Network Recruitment: Algeria’s Policies of Control and Censorship in the Digital Era |
en_US |
dc.type |
Article |
en_US |
Fichier(s) constituant ce document
Ce document figure dans la(les) collection(s) suivante(s)
Afficher la notice abrégée