
Computer-enabled crimes: virtual theft
Can you steal something that is not real? Do virtual objects have a value? How do you prove that they

Can you steal something that is not real? Do virtual objects have a value? How do you prove that they

Everybody knows what a scam is. But very few can recognize one when is directed at them. Why is that?

When it comes to computer-enabled crimes, identity theft is only the first part of a deception scheme to fraud end

If Bonnie and Clyde had lived in our times, would they have still robbed a bank the way they did?

The internet has not only changed how people communicate, but also how they radicalize, mobilize, and believe. In the digital

In a previous article, we have seen how cybercrime is, by nature, difficult to define. However, criminologists have successfully categorized

MMORPGs can attract millions of users from all over the world. These users spend hours of their lives having fun

The defining characteristic of cybercrime is that the criminal activity rests upon Internet-connected technology. The Internet is, after all, a
Last week, I attended a training session on link analysis with TXLEAN – the Texas Law Enforcement Agency Network. Link
Articles you can enjoy without specific knowledge
Start learning new topics from their basic concepts
Get into the nitty-gritty of things with advanced topics
Crack your knuckles and get ready on your terminal
PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.