Academic literature on the topic 'Computer crimes – European Union countries'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer crimes – European Union countries.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer crimes – European Union countries"

1

Sukawati, Maheswara Perbawa. "European Union Policy on Artificial Intelligence Related to Cyber Crime." Hang Tuah Law Journal 4, no. 1 (August 4, 2020): 40. http://dx.doi.org/10.30649/htlj.v4i1.169.

Full text
Abstract:
<p>Abstract: </p><p><em>Artificial Intelligence is one of the sector in Revolution Industry 4.0 that become serious topic to discuss in every countries in the world including the European Union itself. They believe that Artificial Intelligence can make the good benefit for the society, however the using of Artificial Intelligence usually make a negative impact for the society therefore the European Union made some Policy about the Artificial Intelligence to support about the Revolution Industry 4.0. The Policy about Artificial Intelligence have the purpose to regulate about using Artificial Intelligence in European Union basically for the members, everything about Artificial Intelligence have the relation with the Technology that have been develop nevertheless everything about technology, internet, computer, and data have already regulated in Convention on Cyber Crime Budapest 2001 therefore everything about Artificial Intelligence including the Policy of Artificial Intelligence in European Union have to related with the Convention on Cyber Crime.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
2

Rqiq, Yassine, Jesus Beyza, Jose M. Yusta, and Ricardo Bolado-Lavin. "Assessing the Impact of Investments in Cross-Border Pipelines on the Security of Gas Supply in the EU." Energies 13, no. 11 (June 6, 2020): 2913. http://dx.doi.org/10.3390/en13112913.

Full text
Abstract:
The European Union (EU) is highly dependent on external natural gas supplies and has experienced severe gas cuts in the past, mainly driven by the technical complexity of the high-pressure natural gas system and political instability in some of the supplier countries. Declining indigenous natural gas production and growing demand for gas in the EU has encouraged investments in cross-border transmission capacity to increase the sharing of resources between the member states, particularly in the aftermath of the Russia–Ukraine gas crisis in January 2009. This article models the EU interconnected natural gas system to assess the impact of investments in the gas transmission network by comparing the performance of the system for scenarios of 2009 and 2017, using a mathematical optimization approach. The model uses the technical data of the infrastructures, such as production, storage, regasification, and exchange capacity through cross-border pipelines, and proposes an optimal collaborative strategy which ensures the best possible coverage of overall demand. The actual peak demand situations of the extreme cases of 2009 and 2017 are analyzed under hypothetical supply crises caused by geopolitical or commercial disputes. The application of the proposed methodology leads to results which show that the investments made in this system do not decongest the cross-border pipeline network but improve the demand coverage. Countries such as Spain and Italy experience a lower impact on gas supply due to the variety of mechanisms available to cover their demand. Furthermore, the findings prove that cooperation facilitates the supply of demand in crisis situations.
APA, Harvard, Vancouver, ISO, and other styles
3

Hsieh, Jin-chi, Ching-cheng Lu, Ying Li, Yung-ho Chiu, and Ya-sue Xu. "Environmental Assessment of European Union Countries." Energies 12, no. 2 (January 18, 2019): 295. http://dx.doi.org/10.3390/en12020295.

Full text
Abstract:
This study utilizes the dynamic data envelopment analysis (DEA) model by considering time to measure the energy environmental efficiency of 28 countries in the European Union (EU) during the period 2006–2013. There are three kinds of variables: input, output, and carry-over. The inputs are labor, capital, and energy consumption (EC). The undesirable outputs are greenhouse gas emissions (GHE) and sulfur oxide (SOx) emissions, and the desirable output variable is gross domestic product (GDP). The carry-over variable is gross capital formation (GCF). The empirical results show that first the dynamic DEA model can measure environment efficiency and provide optimum improvement for inefficient countries, as more than half of the EU countries should improve their environmental efficiency. Second, the average overall scores of the EU countries point out that the better period of performance is from 2009 to 2012. Third, the output variables of GHE, SOx, and GDP exhibit a significant impact on environmental efficiency. Finally, the average value of others is significantly better than high renewable energy utilization (HRE) with the Wilcoxon test. Thus, the EU’s strategy for environmental energy improvement should be to pay attention to the benefits of renewable energy (RE) utilization, reducing greenhouse gas emissions (GHE), and enhancing the development of RE utilization to help achieve the goal of lower GHE.
APA, Harvard, Vancouver, ISO, and other styles
4

Ishchenko, Ivan, Kostiantyn Buhaichuk, Olha Tokarchuk, Kateryna Rudoi, and Iryna Tsareva. "European experience of preventive activities performed by law enforcement agencies: administrative aspect and theoretical-legal aspect." Cuestiones Políticas 40, no. 75 (December 29, 2022): 263–73. http://dx.doi.org/10.46398/cuestpol.4075.17.

Full text
Abstract:
The aim of the research was to reveal the peculiarities of preventive activities carried out by law enforcement agencies in the countries of the European Union. Attention is paid to the known methods of preventive work carried out by the police of different countries, which make it possible to prevent crimes and arrest criminals when they are still preparing to commit a crime. In this regard, models of preventive activities used in continental European countries are described. The methodological basis of the research is presented in comparative-legal and systematic analysis, formal-legal method, method of interpretation, hermeneutic method, as well as methods of analysis and synthesis. In the conclusions attention is paid to the peculiarities of prevention applied by individual members of the European Union, in particular, the policy of prevention by the Polish police, in terms of recidivism of persons who have already committed crimes. This policy is developed by borrowing from the European experience, because in some countries the emphasis is on extending the powers of police officers, in others - on maximum interaction with the society involved to help implement some police functions.
APA, Harvard, Vancouver, ISO, and other styles
5

Cherniei, Volodymyr, Serhii Cherniavskyi, Alexander Dzhuzha, and Viktoria Babanina. "Combating credit fraud: experience of Ukraine and some other European Countries." Revista Amazonia Investiga 10, no. 42 (July 30, 2021): 93–102. http://dx.doi.org/10.34069/ai/2021.42.06.9.

Full text
Abstract:
The article is devoted to the study of the peculiarities of combating fraud in the field of finance, in particular, combating crimes in the field of lending. The experience of Ukrainian law enforcement agencies in combating credit fraud has been studied. The experience of some European Union countries in combating financial fraud is analyzed. To achieve the goal of the paper a set of general scientific and special methods was used, such as method of system-structural analysis, dogmatic (formal-logical), historical, general sociological, comparative-legal method and others. It is concluded in the article that the rules of criminal law of Ukraine establish more severe penalties for some crimes compared to EU countries. For example, this applies to crimes in the field of money laundering. On the other hand, some offenses that do not qualify as crimes in Ukraine are recognized as criminal offenses in the EU. For example, this applies to abuses in the field of insurance. According to the results of the study, the solution of some important issues is proposed such as improvement of the current legislation in the field of credit and financial relations, adaptation of the legislation of Ukraine to international norms and standards in the system of credit and financial relations.
APA, Harvard, Vancouver, ISO, and other styles
6

Vavrek, Roman, and Jana Chovancová. "Energy Performance of the European Union Countries in Terms of Reaching the European Energy Union Objectives." Energies 13, no. 20 (October 13, 2020): 5317. http://dx.doi.org/10.3390/en13205317.

Full text
Abstract:
European energy policy, especially the project of the Energy Union, is one of the most rapidly developing areas of the EU, and one through which European institutions are obtaining gradually more extensive power over the performance of the national energy sectors. The paper focuses on an analysis of the energy performance of EU member states (MS) with regard to the priorities of the European Energy Union. For an assessment of the energy performance of EU countries, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) was chosen, using the Coefficient of Variation method (CV) as an objective method for determining the weights of eight input indicators, including CO2 intensity, electricity and gas price, energy productivity, energy dependence, consumption of renewables and research and development. The analysis for the period from 2008 to 2016 showed significant changes in the input indicators, which directly influenced the results of both methods mentioned above. Long-term differences between the best- and worst-rated countries are seen mainly in CO2 emissions, energy imports and total consumption of renewable energy sources. It is these aspects of comprehensive energy performance and their convergence at the level of EU countries that we believe should be addressed in the near future.
APA, Harvard, Vancouver, ISO, and other styles
7

Steponavičiūtė, Ramunė. "The scope of criminal liability for misappropriation of authorship in EU countries: comparative analysis." Vilnius University Open Series, no. 6 (December 28, 2020): 192–217. http://dx.doi.org/10.15388/os.law.2020.17.

Full text
Abstract:
Intellectual property legal protection is undoubtedly one of the most important factors and conditions of effective economic, social and cultural development in modern society. According to researchers, absolute majority of countries in the world have set criminal liability for certain crimes against intellectual property rights, including all of the European Union (hereinafter – EU) countries. One of those crimes is misappropriation of authorship. Yet the criminal laws of EU countries criminalise misappropriation of authorship very differently - some protect not only author rights but also related rights, the conditions for criminal liability in the general corpus delicti are of a very different scope as well as the punishments for those crimes differ significantly. This analysis will present the scope of criminal liability in all the EU countries, including the reasons why, as well as will try to find the answer whether ways of coping with these difficulties exist.
APA, Harvard, Vancouver, ISO, and other styles
8

Josipović, Ivo. "Responsibility for war crimes before national courts in Croatia." International Review of the Red Cross 88, no. 861 (March 2006): 145–68. http://dx.doi.org/10.1017/s1816383106000099.

Full text
Abstract:
This article analyses problems with which the Republic of Croatia, as a country in transition, has to contend during war crimes proceedings. A major characteristic of the recent wars waged on the territory of the former Yugoslavia is that war crimes were committed, though on a different scale, by all parties involved, irrespective of the political and other motives that prompted them to engage in armed conflict. Political unwillingness is the principal reason why national courts, including those in the Republic of Croatia, did not prosecute war crimes in accordance with internationally acceptable standards. The international community responded by setting up the International Criminal Tribunal for the former Yugoslavia (ICTY), the main objectives of which are to establish justice, render justice to victims and determine the historical truth. Implicitly, despite political and other opposition to its work, the ICTY is helping to define legal and ethical standards appropriate for a democratic society in the countries established on the territory of the former Yugoslavia. This is particularly important for the reason that all these countries aspire to membership of the European Union. The work of the ICTY, as well as proceedings before domestic courts, is therefore an important legal, political and moral catalyst on their way towards accession to the European Union. This is fully confirmed by the example of the Republic of Croatia.
APA, Harvard, Vancouver, ISO, and other styles
9

Picchi, Marta. "Violence against Women and Domestic Violence: The European Commission’s Directive Proposal." Athens Journal of Law 8, no. 4 (September 30, 2022): 395–408. http://dx.doi.org/10.30958/ajl.8-4-3.

Full text
Abstract:
The Commission proposed to enshrine in the law of the European Union minimum standards to criminalise certain forms of violence against women; protect victims and improve access to justice; support victims and ensure coordination between relevant services; and prevent these types of crimes from happening in the first place. In particular, the Commission’s proposal would make it possible, on the one hand, to surmount the gaps existing in some Member States and, on the other hand, to standardise the various national legislations with a single discipline valid in all the countries of the European Union. This paper focuses on the contents of the European Commission’s proposal by highlighting and reflecting on the key points. Keywords: Violence against women; Domestic violence; Directive proposal; European Commission; Minimum standards
APA, Harvard, Vancouver, ISO, and other styles
10

Іван Васильович Яковюк, Артем Павлович Волошин, and Антон Олексійович Шовкун. "Legal aspects of counteracting phishing: the European Union experience." Problems of Legality, no. 149 (June 9, 2020): 8–23. http://dx.doi.org/10.21564/2414-990x.149.200028.

Full text
Abstract:
Cybersecurity is increasingly seen as a fundamental problem of the state, which comprehensively affects its security and defense, economy, certain spheres of public life, in particular energy, health care and others. Reliable operation of data networks, computer systems and mobile devices is a prerequisite for the effective state and society functioning, an individual’s life. The reliability of key public information systems depends on many factors: cyberattacks, hardware and software failures, and all kinds of errors. The significant increase in the number of incidents in cyberspace necessitates a systematic analysis of sources of threats, the first place among which is phishing. The introduction of criminal responsibility for phishing is complicated by the fact that "phishing" is an "umbrella" concept that covers a number of launched or committed crimes. From criminal law point of view, phishing attacks can correspond to different categories of crimes (extortion, fraud, blackmail, offenses related to the processing of personal data, etc.). The attempt by some states to impose criminal penalties for phishing at the national level does not solve the problem, since it is not difficult for phishers who work worldwide to cross national barriers. That is still the reason why counteracting cybercrime requires significant efforts not only by individual states but also by international organizations, in particular by the European Union.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer crimes – European Union countries"

1

Cochrane, Brandy Marie. "Drowning In It: State Crime and Refugee Deaths in the Borderlands." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/772.

Full text
Abstract:
This paper examines the current state of border hardening against refugees in the European Union and Australia through the lens of state crime. Border hardening strategies are described for both of these areas and a theoretical basis of state crime victimology is used to examine the refugees who encounter this border hardening. The present study analyzes two data sets on border deaths, one for the European Union and one for Australia, to examine the demographics of the refugees who perish while attempting to transgress the border. Results indicated that there remains a significant amount of missing data, suggesting that official methods of record-keeping are necessary to determine the most basic demographics, such as gender and age, so analyses can be run to determine significance in this area. One clear finding was that migrants most frequently die from drowning (EU: 83.6%; AU: 93%) compared to any other cause. Also, there is indication that those from disadvantaged areas of origin (such as the Middle East and Africa) are more likely to die in the borderlands than others in the dataset. Practical implications of the findings are discussed along with suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
2

BLASI, CASAGRAN Cristina. "Towards a global data protection framework in the field of law enforcement : an EU perspective." Doctoral thesis, 2015. http://hdl.handle.net/1814/36995.

Full text
Abstract:
Defence date: 8 June 2015
Examining Board: Professor Marise Cremona, European University Institute (Supervisor); Professor Gregorio Garzón Clariana, Autonomous University of Barcelona; Dr. Maria O’Neill, University of Abertay Dundee; Professor Martin Scheinin, European University Institute.
This thesis seeks to examine the existing EU frameworks for data-sharing for law enforcement purposes, both within the EU and between the EU and third countries, the data protection challenges to which these give rise, and the possible responses to those challenges at both EU and global levels. The analysis follows a bottom-up approach, starting with an examination of the EU internal data-sharing instruments. After that, it studies the data transfers conducted under the scope of an international agreement; and finally, it concludes by discussing the current international initiatives for creating universal data protection standards. As for the EU data-sharing instruments, this thesis demonstrates that these systems present shortcomings with regard to their implementation and usage. Moreover, each instrument has its own provisions on data protection and, despite the adoption of a Framework Decision in 2008, this has not brought about a convergence of data protection rules in the JHA field. A similar multiplicity of instruments is also found when the EU transfers data to third countries for the purpose of preventing and combating crimes. This is evident from examining the existing data-sharing agreements between the EU and the US. Each agreement has a section on data protection and data security rules, which again differ from the general clauses of the 2008 Framework Decision. This study demonstrates the influence of US interests on such agreements, as well as on the ongoing negotiations for an umbrella EU-US Data Protection Agreement. One possible way to ensure a high level of EU data protection standards in the field of law enforcement in the face of US pressure is by enhancing the role of Europol. This EU Agency shares information with EU member states and third countries. This thesis demonstrates that Europol has a full-fledged data protection framework, which is stronger than most of the member states’ privacy laws. However, taking Europol rules as a reference for global standards would only partially achieve the desired result. The exchange of data for security purposes does not only involve law enforcement authorities, but also intelligence services. The recent NSA revelations have shown that the programmes used by these bodies to collect and process data can be far more intrusive and secretive than any current law enforcement system. In view of the above, this thesis explores the potential of CoE Convention 108 for the Protection of Individuals with regard to the Automatic Processing of Personal Data and ii the Cybercrime Convention as the basis for a global regime for data protection in law enforcement. This thesis concludes that an optimum global data protection framework would entail a combination of the 108 CoE Data Protection Convention and the Cybercrime Convention. The cumulative effect of these two legal instruments would bind both law enforcement and intelligence services in the processing of data. In sum, by promoting the Europol approach to data protection and existing Council of Europe rules, the EU could play a crucial role in the creation of global data protection standards.
APA, Harvard, Vancouver, ISO, and other styles
3

PORCEDDA, Maria Grazia. "Data protection and the prevention of cybercrime : a dual role for security policy in the EU?" Doctoral thesis, 2012. http://hdl.handle.net/1814/26594.

Full text
Abstract:
Supervisor: Prof. Giovanni Sartor, EUI
Award date: 13 February 2012
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. As such, the subject falls in the ‘security vs. privacy’ debate. The objective of this study is twofold. On the one hand, it is descriptive: it aims to cast light on the (legal substantive) nature of, and relationship between, cybercrime and cyber security, which are currently ‘terms of hype’. On the other, it explores the possibility of reconciling data protection and privacy with the prevention of cybercrime and the pursuit of a cyber-security policy, and therefore wishes to explore causation. The latter is a subset of the wider question of whether it is possible to build ‘human rights by design’, i.e. a security policy that reconciles both security and human rights. I argue that narrow or online crimes and broad or off-line crimes are profoundly different in terms of underlying logics while facing the same procedural challenges, and that only narrow cybercrime pertains to cyber-security, understood as a policy. Yet, the current policy debate is focussing too much on broad cybercrimes, thus biasing the debate over the best means to tackle ICT-based crimes and challenging the liberties involved. I then claim that the implementation of data protection principles in a cyber-security policy can act as a proxy to reduce cyber threats, and in particular (narrow) cybercrime, provided that the following caveats are respected: i) we privilege a technical computer security notion; ii) we update the data protection legislation (in particular the understanding of personal data); and iii) we adopt a core-periphery approach to human rights. The study focuses on the EU. Due to time constraints, the interaction between privacy and data protection and other liberties involved, as well as purely procedural issues are outside of the scope of this research.
APA, Harvard, Vancouver, ISO, and other styles
4

PORCEDDA, Maria Grazia. "Cybersecurity and privacy rights in EU law : moving beyond the trade-off model to appraise the role of technology." Doctoral thesis, 2017. http://hdl.handle.net/1814/45944.

Full text
Abstract:
Defence date: 30 March 2017
Examining Board: Professor Marise Cremona, EUI (Supervisor); Professor Deirdre Curtin, EUI; Professor Anne Flanagan, Queen Mary University of London; Professor Ronald Leenes, Tilburg University
This thesis concerns a specific instance of the trade-off between security and ‘privacy rights’, namely cybersecurity, as it applies to EU Law. The research question is whether, and how, the pursuit of cybersecurity can be reconciled with the protection of personal data and respect for private and family life, which I treat as two independent rights. Classic legal argumentation is used to support a normative critique against the trade-off; an in-depth scrutiny of ‘(cyber)security’ and ‘privacy’ further shows that the trade-off is methodologically flawed: it is an inappropriate intellectual device that offers a biased understanding of the subject matter. Once the terms of discussion are reappraised, the relationship between cybersecurity and privacy appears more nuanced, and is mediated by elements otherwise overlooked, chiefly technology. If this fatally wounds the over-simplistic trade-off model, and even opens up avenues for integration between privacy and cybersecurity in EU law, on the other hand it also raises new questions. Looked at from the perspective of applicable law, technology can both protect and infringe privacy rights, which leads to the paradox of the same technology being both permissible and impermissible, resulting in a seeming impasse. I identify the problem as lying in the combination of technology neutrality, the courts’ avoidance in pronouncing on matters of technology, and the open-ended understanding of privacy rights. To appraise whether cybersecurity and privacy rights can be reconciled, I develop a method that bridges the technological and legal understandings of information security and privacy, based on the notions/methods of protection goals, attributes and core/periphery or essence, and which has the advantage of highlighting the independence of the two privacy rights. A trial run of the method discloses aspects of the ‘how’ question that were buried under the trade-off debate, viz. the re-appropriation of the political and judicial process vis-àvis technology.
Chapter 4 draws upon an article in Neue Kriminalpolitik 4/2013
APA, Harvard, Vancouver, ISO, and other styles
5

KIES, Raphaël. "Promises and limits of web-deliberation." Doctoral thesis, 2008. http://hdl.handle.net/1814/10477.

Full text
Abstract:
Defence date: 09 June 2008
Examining Board: Prof. Peter Wagner, University of Trento and EUI Supervisor Prof. Alexander Trechsel, EUI Prof. Jürg Steiner, University of Carolina Prof. Hanspeter Kriesi, University of Zürich
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
In this work we will attempt to evaluate which of these scenarios is most likely to become prominent in the future by focusing essentially on three issues: 1) the usage of the online forum by observing how diffuse the phenomenon is and who the users of the online debates are; 2) The offer of the online political forum, by analyzing which are the political actors (civil society, media, institutional actors) who are more susceptible to host the online political debates; and 3) the quality of the online debates by assessing their deliberativeness. By elaborating a sophisticated method for measuring the deliberativeness of the online debates and by analyzing a great variety of online debates our objective is to provide an appreciation of the deliberative potential of the web-debates that avoids shortcuts and inappropriate generalizations, but that recognizes that this may be determined by a multiplicity of factors. From a theoretical perspective the results obtained through our investigations contribute to evaluate whether the deliberative model of democracy could be fostered by the virtualization of the political debates and, more generally, it should also contribute to the elaboration of a deliberative model of democracy that is grounded not only on theoretical principles and suppositions, as this tends to be the case, but also on empirical studies that test its adaptability to the 'real life politics'.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer crimes – European Union countries"

1

Sloan, Barbara. Accessing European Union information. Washington, D.C: Delegation of the European Commission, Office of Press & Public Affairs, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ryan, Michael H. The EU regulatory framework for electronic communications handbook. 2nd ed. London: Bloomsbury Professional, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Christou, George. Cyber security in the European Union: Resilience and adaptability in governance policy. Houndmills, Basingstoke Hampshire: Palgrave Macmillan, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Broderick, Terry R. Regulation of information technology in the European Union. London: Kluwer Law International, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

EU digital copyright law and the end-user. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cristina, Capineri, and Rietveld Piet, eds. Networks in transport and communications: A policy approach. Aldershot: Ashgate, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cappel, Alexander. Grenzen auf dem Weg zu einem europäischen Untreuestrafrecht: Das Mannesmann-Verfahren und [Paragraph] 266 StGB als Beispiele eines expansiven Wirtschaftsstrafrech. Frankfurt am Main: P. Lang, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Europe, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington: U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Europe, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington: U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baber, Graeme Scott. European Union and the Global Financial Crisis: A View from 2016. Nova Science Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer crimes – European Union countries"

1

Radoniewicz, Filip. "International Regulations of Cybersecurity." In Cybersecurity in Poland, 53–71. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_5.

Full text
Abstract:
AbstractThere is no doubt that, due to the global nature of modern ICT networks, international cooperation plays a key role in ensuring cybersecurity, including in the fight against cybercrime.This chapter describes initiatives taken within international organizations to ensure cybersecurity and the prevention of cybercrime. The presentation will start with the initiatives of the OECD and the Council of Europe. This is due not only to some kind of “Eurocentrism” but above all to the fact that these two organisations were the first to address cybersecurity and cybercrime issues. In addition, the Council of Europe Convention 185 on CyberCrime of November the 23rd, 2001, an international agreement concluded in the Council of Europe, is a milestone in the prevention of computer crime, remaining the only binding act of international law to combat it. Its importance is best demonstrated by the constantly growing number of signatories (and countries that model without signatures after the provisions, e.g. Pakistan) and the fact that international organisations, or recommend that their members accept (UN, G7/G8, European Union) or “copy” provisions, creating their own model legal acts (e.g. Commonwealth).
APA, Harvard, Vancouver, ISO, and other styles
2

"Emissions Trading Scheme: Evidence from the European Union Countries." In Communications in Computer and Information Science, 204–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23766-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martinho, Vítor João Pereira Domingues. "Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 483–99. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch030.

Full text
Abstract:
The main objective of this chapter is to analyze the crimes related to the new information technologies in the European Union using the data provided by the European Commission and the spatial econometrics approaches. The data were analyzed with several tests, namely the Moran´s I, to verify the existence of global (for all countries of the European Union) and local spatial autocorrelation. The presence of spatial autocorrelation in the data means that the variable analyzed in a determined country is auto correlated with the same variable in the neighboring countries. The data analysis was complemented with some cross-section estimations, considering namely the Lagrange Multiplier tests, to examine the spatial lag and the spatial error autocorrelation. The spatial autocorrelation is a statistical infraction, so the consideration of these subjects prevents result bias and on the other hand allows some conclusions important to help in the definition of adjusted policies.
APA, Harvard, Vancouver, ISO, and other styles
4

Madai, Sándor. "The Impact of Economic Policy on Economic Crime." In Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 361–70. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_12.

Full text
Abstract:
This study presents the parallelism of the characteristics of the economic crimes of the Central and Eastern-European countries participating in the project. That is, it notes aspects of criminal law that clearly show that such countries in the past decade employed (and still employ) similar regulatory principles, owing to reasons such as geographical proximity and others. This study provides an over- view of the regulatory directions of the countries after World War II, which, from the Soviet sphere of interest, were common. We then review the main steps in the field of action against economic crimes, which can be perceived as stemming from democratization. Notably, most of the examined countries are European Union members, and more countries want to join. Therefore, among the countries, the integration process indeed reveals a similar legal and political background. Consider- ing the limitations of the study, it was not possible to examine the changes in the regulations of each country in detail. Thus, we only tried to draw attention to the similarities of common processes and characteristics.
APA, Harvard, Vancouver, ISO, and other styles
5

Violeta Achim, Monica, Sorin Nicolae Borlea, Viorela Ligia Văidean, Decebal Remus Florescu, Eugenia Ramona Mara, and Ionut Constantin Cuceu. "Economic and Financial Crimes and the Development of Society." In Standard of Living, Wellbeing, and Community Development [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96269.

Full text
Abstract:
The purpose of this chapter is to study the detailed dynamics of economic and financial crimes within the European Union member states, namely corruption, shadow economy, tax evasion, money laundering, cybercrime and financial frauds. Our econometric modelling focuses on the impact of the vector of financial and economic crime proxies upon economic prosperity and human development. In accordance to the reviewed literature, for our sample of European Union countries, corruption and shadow economy have a negative effect upon the vector of development proxies while money laundering and cybercrimes belonging to “white collars” are positively correlated with the vector of development proxies that we analyze. All the data are interpreted and discussed, and then conclusions are drawn. Governmental policies on economic prosperity and societal wellbeing should focus on reducing corruption and shadow economy, in order to favour benefits in the field of economic and human development.
APA, Harvard, Vancouver, ISO, and other styles
6

Rossel, Lucia, Brigitte Unger, Jason Batchelor, and Jan van Koningsveld. "The Implications of Making Tax Crimes a Predicate Crime for Money Laundering in the EU." In Combating Fiscal Fraud and Empowering Regulators, 236–71. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198854722.003.0013.

Full text
Abstract:
This chapter sheds light on the divergence of tax crimes and money laundering laws across Europe after the implementation of the 4th Anti Money Laundering Directive. Laws are a crucial part of the tax environment as they are one of the rules under which the tax ecosystem operates. Taxpayers should pay their taxes following the law, and tax experts should advise them within the realm of it. The chapter sees the 4th AMLD as a shock that put money laundering regulation inside the tax ecosystem, and the way that countries implement this in their regulation is the response to this shock; it uses an innovative comparative approach that involves the analysis of tax evasion through an empirical legal lens. The chapter includes a dataset built by the authors with the legislation of all European Union countries regarding tax crimes and money laundering, as well as other relevant legal variables.
APA, Harvard, Vancouver, ISO, and other styles
7

Zakharko, Andrii, and Oleksii Boiko. "THE STATUS OF IMPLEMENTATION OF THE CYBER CRIME CONVENTION IN EASTERN EUROPE." In Science, technology, and innovation: the experience of European countries and prospects for Ukraine. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-190-9-7.

Full text
Abstract:
The monograph analyzes the status of reform of criminal procedure legislation of Ukraine and other Eastern European countries to implement the procedural provisions of the International Convention on Cybercrime in order to determine the procedural powers of pre-trial investigation authorities to collect electronic evidence. The relevance of the research topic is substantiated by statistical data on the rapid growth of the number of criminal offenses, the method of committing which is inextricably linked with the use of computers and computer data processing. The monograph consists a systematic analysis of the procedural powers of pre-trial investigation bodies which are provided for in the Convention on Cybercrime and aimed at increasing the effectiveness of pre-trial investigation bodies in documenting criminal activity, taking into account the specific form of factual data that need to be collected as evidence in these investigations. It is stated that the need to supplement the procedural powers of pre-trial investigation bodies in the investigation of computer crimes is determined by such factors as: technological ability to change, distort, modify and destroy electronic data quickly after using them in computer crimes; technological possibility of placing such electronic data outside the territorial jurisdictions of individual states and outside the location of continents, etc. It has been established that in order to ensure the effectiveness of pre-trial investigations into computer crimes, the powers of the prosecution need to be supplemented by the following procedural possibilities, provided for in the Cybercrime Convention: the possibility for the competent authority to issue an order for the urgent retention of certain computer data, including data on the movement of information stored by the computer system, in particular when there are grounds to believe that such computer data is particularly vulnerable to loss or modification; the obligation of the person who controls the relevant computer data to kept and maintain the integrity of such computer data for a certain period of time which is necessary to obtain permission from the competent authority to disclose such data; the obligation of the person who must keep such computer data on the order of the competent authority, to maintain the confidentiality of the fact of such procedures for a certain period; ensuring the possibility of urgent storage of data on the movement of information, regardless of the number of service providers involved in the transmission of such information; ensuring the possibility of urgent disclosure of information on the movement of information, to the competent authority. Such amount of information is sufficient to identify service providers and the route of the information`s transmission; search and seizure of computer data, etc. A systematic analysis of the criminal procedure legislation of Eastern European countries has shown that Ukraine’s neighbors have also not fully signed and ratified the procedural provisions of the Convention on Cybercrime. Only Hungary, Romania and the Republic of Bulgaria have secured the most effective powers of the analyzed states. In particular, the criminal procedure law of these states provides for such powers of the prosecution as: issuing a warrant for the urgent preservation of certain e-data; the person’s responsibility to maintain the integrity of stored e-data; seizure of data, computer system, part or medium; copying and saving a copy of such e-data; preserving the integrity of stored e-data; extracting e-data from a computer system, etc.
APA, Harvard, Vancouver, ISO, and other styles
8

Miheș, Cristian Dumitru. "Romania: National Regulations in the Shadow of a Common Past." In Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 125–55. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_5.

Full text
Abstract:
The rule of law is very difficult to enforce during periods of dictatorship or war. We can have a justice system that functions, as we had before 1989, but that system was confined to upholding the regime in power. Romania experienced a dictatorship for a very long period of time. In the first phase, there was a royal dictatorship from 1938, then a military one, followed by the communist regime until the end of 1989. Since 1945, Romania has been a part of the world where the communist system imposed by the Soviet Union left its mark on criminal justice. The authors of the 1968 Penal Code considered that code to have been adopted “with the purpose of solving uniformly the vast problematic of pre- venting and punishing the crimes.” In a practical regard, the entire legislation was a tool to ensure the success of the regime of communist oppression. In these circumstances, the events that took place in 1989 liberated the spirit of freedom; meanwhile, the consequences of those events took the citizens of the Central and East European countries by surprise, and they were unprepared for the struggle toward democracy and the rule of law. This was the case in Romania when, finally, in 2014, the process of enforcing all fundamental codes was established. In fact, the reform was deeper than the adoption of a new Penal Code, the Code of Criminal Procedure, and the Law on the Execution of Sentences, Educational Measures, and Judicial Measures during Criminal Proceedings. This study presents the main principles, legal institutions, and operational characteristics of the new laws.
APA, Harvard, Vancouver, ISO, and other styles
9

Ragusa, Angela T., and Emma Steinke. "Studying Locally, Interacting Globally." In Computer-Mediated Communication across Cultures, 344–68. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-60960-833-0.ch022.

Full text
Abstract:
The general trend towards freely circulating capital, goods and services, coupled with changes in the openness of labour markets, has translated into growing demands for an international dimension of education and training. Indeed, as world economies become increasingly inter-connected, international skills have grown in importance for operating on a global scale. Globally oriented firms seek internationally-competent workers versed in foreign languages and having mastered basic inter-cultural skills to successfully interact with international partners. Governments as well as individuals are looking to higher education to play a role in broadening students’ horizons and allowing them to develop a deeper understanding of the world’s languages, cultures and business methods. One way for students to expand their knowledge of other societies and languages, and hence leverage their labour market prospects, is to study in tertiary educational institutions in countries other than their own. Several OECD [Organisation for Economic Co-operation and Development] governments – especially in countries of the European Union (EU) – have set up schemes and policies to promote mobility as a means of fostering intercultural contacts and building social networks for the future. (Organisation for Economic Co-operation and Development, 2009, p. 310)
APA, Harvard, Vancouver, ISO, and other styles
10

Págio, Leonardo Saraiva. "UMA NOVA ORDEM JURÍDICA FISCAL INTERNACIONAL ATRAVÉS DA COOPERAÇÃO ELETRÔNICA DE INFORMAÇÕES FINANCEIRAS-FISCAIS." In Fronteiras de acesso à Justiça: Processo e Meios Alternativos na Democracia no Século XXI, 35–53. JUS.XXI, 2022. http://dx.doi.org/10.51389/qdkv9608.

Full text
Abstract:
In a Portuguese-Brazilian dialogue, confronting the realities of the American and European continents, it is clear that the European Union, through the OECD with the support of the United States through FATCA, contributes to international cooperation with respect to providing legal conditions and procedures favorable to an information technology integrated in the scope of their respective financial-fiscal systems to attend to the control and inspection of facts that generate taxable wealth and, in this way, realize distributive justice at the international level, strengthening all countries. It is notorious the existence of a significant portion of the population using the culture of avoiding taxation as an advantageous means to indulge themselves and have greater gains against competitors in an unfair way. This posture on the part of natural and legal persons in American and European countries directly harms the collection, the provision of public services and the democratic process for the effective reduction of social inequalities. Confronting this nefarious and improper conduct of omissive tax exemption, which directly affects the implementation of international fiscal and human rights standards, is in line with a promising legal regime for exchanges at a technological level of financial-tax information in the fight against fraud and tax evasion. In addition to eliminating terrorist financing, preventing aggressive tax planning, money laundering and eliminating criminal organizations that engage in money laundering and other crimes against public order. The theme of exchanging tax information has been widely debated and new paradigms have been adopted, namely due to the international context we have lived in the last decades characterized by the phenomenon of globalization of national economies, technological advances, the role of the Social State and several unexpected events and impacting of a natural or induced nature, it has favored a new posture of adaptation, improvement and integration of countries and their administrative operation systems and, above all, fiscal. The activities in this legal exchange regime, according to the author, are the responsibility of an international organization with specialized technical coordination (European Commission/WTO) with power to make decisions regarding the promotion or economic administrative restrictions in favor of the public interest, in the rigorous and sophisticated regulation of the entire flow of information generated in each tax system in the European Union, Mercosur and all countries in the world, so that taxpayers are under monitoring and security regarding their valued income and acquisitions, given the globalized economy, as this deepens scientific research in his master's thesis in legal and business sciences in Portugal. The European Union, like Mercosur and other intergovernmental organizations for economic integration, are advancing with the objective of transparency and improvement of processes that will benefit the State's revenue and establish fiscal rules that favor the exchange of financial information between countries for an advanced control and inspection of the tax system, in the face of that omissive sovereign State, which perhaps does not respect or is unable to preserve the rights constitutionally guaranteed to all its citizens. The cooperation system in the exchange of financial-fiscal information at a universal level, between the tax administrations integrated to the competition bodies, will enable the execution of investigation, analysis, control and financial-fiscal-market assessment of all taxpayers and companies in a certain territory, so that it does not happen that a given company decides to transfer to another country to carry out its operations, based on privileged and selective conditions granted to it, without taking into account the damage to competitors, to the taxpayers and the State.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer crimes – European Union countries"

1

Antonoaie, Cristina, and Camelia Bucur. "CONSIDERATIONS CONCERNING ICT SPECIALISTS IN EUROPE." In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-002.

Full text
Abstract:
Today we need more than basic skills to use a computer. Due also to the current pandemic situation we have a lot of on-line activities - starting from school, work, training, shopping, paying the bills, exercising, watching a movie and many others. Fortunately, the Internet is offering us the possibility to stay safe. That is why we need to obtain digital skills - information, communication, problem-solving, and software skills. For that, besides the infrastructure, we need specialists that will be able in the end to also teach the large population to properly use a computer. We have analyzed in this paper six indicators referring to individuals' level of digital skills, the ways to obtaining ICT skills, the number of employed ICT specialists, the education attainment level of those specialists, and their age. We did that with the help of the data from the Eurostat database. We selected for the graphical analysis 5 countries with different national cultures and different companies cultures, as identified with Hofstede's Model: Romania, Bulgaria, Poland, Germany, Finland, and we also use the composite index EU-27 for the remaining 27 countries in the European Union. Unfortunately, for the moment, the ICT specialists are representing only a maximum of 7% of the employed persons. For sure this percent will become higher because society needs to adapt to the new realities, the new and dangerous crises. The discrepancies between the urban and the rural population, and of course, between the rich and the poor will be more accentuated.
APA, Harvard, Vancouver, ISO, and other styles
2

Kolumber, David. "Protistátní trestné činy v moderních kodifikacích." In Protistátní trestné činy včera a dnes. Brno: Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.p210-9976-2021-4.

Full text
Abstract:
The contribution “Anti-state Crimes in Modern Codifications” deals with the topic of anti-state crimes during centuries. Firstly, legal concepts in the pre-state period are mentioned. Then the attention is paid on the evolution of this institute in the Euro-Atlantic area. From this point of view, there are mentioned mainly regulations from England (1351), France (1810), Germany (1871) and Soviet Union (1958) which could be remarked as the most important for the development of other countries. On the other hand, it also reminds the development of codifications in Czechoslovakia, the Czech Republic and Slovakia, which were affected by the Austro-Hungarian legislations as well as German and Soviet approaches. The Czech current arrangement generally does not depart from the other European samples, but it cannot be omitted that in the Czech Republic it is distinguished the penal concept of the high treason (Landesverrat, vlastizrada) from the constitutional concept (Hochverrat, velezrada) which is dedicated to the presidential anti-state activities. The contribution also indicates that the concept of anti-state crimes in countries has not been unified and it has been varying according to various experiences and attitudes.
APA, Harvard, Vancouver, ISO, and other styles
3

Nichoga, Vitalij, Petro Dub, and Eugeniusz Grudzinski. "Peculiarities of European Union Countries and Ukraine Approach to Estimation of Technogenic Electromagnetic Fields Influence on Bioecosystems." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sloka, Biruta, Ieva Brence, and Henrijs Kalkis. "Application of information technologies for social inclusion: current trends and future prospective." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002652.

Full text
Abstract:
Remote work and remote studies has increased in great extent the requirements of information technologies use and skills to apply information technologies. In European Union countries annually it is checked the availability of computer software as well as skills of information technologies use: there are annually conducted surveys on survey on use of information and communication technologies (ICT) in households and by individuals. The aim of the paper is to research theoretical aspects and to analyze internet use in regions of Latvia for checking on whether there is statistically significant use. The source of the data is the questionnaire No. ICT-persons “Use of computers and the internet in households”. As well as Labor Force Surveys, EU-SILC survey data. Research methods applied: scientific publication analysis, time-series analysis of internet use in Baltic countries, analysis of data on differences of availability of computers in households by regions of Latvia by analysis if variance or ANOVA, by territories (urban and rural) by t – test and by household size by ANOVA.
APA, Harvard, Vancouver, ISO, and other styles
5

Molnar, Jozef, Marek Pecka, and Jaroslav Kment. "SCORPIO-VVER: Two Decades of Experience and Enhancements in Reactor Core Monitoring and Surveillance in Central Europe." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66867.

Full text
Abstract:
During the years 1970–80’ in the satellite countries of the former Soviet Union more than 24 new reactor builds were started. In the former Czechoslovakia, the new builds were realized with a high degree of input from the local engineers and the local industry. This territory up to today has an indigenous nuclear industry, machinery and nuclear engineering background. Starting with the year 1972, on the territory of Czechoslovakia (now on the territory of the Czech and Slovak Republic) 12 new units of the VVER-440 type of reactors were started to build. Nowadays the 2 oldest units were already shutdown in Slovakia, 4+4 units are still operating in both countries, and 2 units of VVER-440 model V213 are still under construction in Slovakia. The reactors designed lifetime in original configuration are 30 years. During these units’ operation period, wide range of modifications and upgrades were performed to strengthen the nuclear safety and the reactors operability. In 2015/16, activities related to the unit operation licenses extension were carried out in both of countries. In scope of strengthening the reactor’s core monitoring and surveillance, at Dukovany NPP (CZ, 1998) and at Bohunice NPP (SK, 2001) the original Russian VK3 computation system was completely replaced with an alternative advanced Core Monitoring and Surveillance System (CMS) SCORPIO-VVER. In Hungary, a locally developed “Verona”, and on the units under construction in Slovakia the Russian “Kruiz” CMS is used. Nowadays the SCORPIO-VVER CMS presents a nuclear fuel type and fuel vendor independent, advanced computer based reactor core monitoring system with an open and flexible framework, including the latest achievements in the fields of N/F and T/H for reliable and safe reactor operation with high efficiency of fuel cycle. The system’s framework governing the know-how and knowledge of 5 European institutes with proven experiences with reactor operation, fuel pattern and fuel campaign design and with utilizing the existing unit’s project reserves to increase the reactor operation and fuel campaign efficiency. Since the first installation the SCORPIO-VVER CMS system has a remarkable operating history and experience. More than 18 years of experiences at 6 units of VVER-440 type of reactors in two different countries helps to put the system to a very high level of usability and reliability. Even if the SCORPIO-VVER is installed only on VVER-440 reactors, it could be adapted to the needs of other VVER type of reactors and to needs of education and training centers too.
APA, Harvard, Vancouver, ISO, and other styles
6

Vilinová, Katarína, Lucia Petrikovičová, and Laura Babjaková. "Práca s internetom ako indikátor počítačovej gramotnosti obyvateľstva Slovenska." In XXIII. mezinárodní kolokvium o regionálních vědách / 23rd International Colloquium on Regional Sciences. Brno: Masaryk University Press, 2020. http://dx.doi.org/10.5817/cz.muni.p210-9610-2020-37.

Full text
Abstract:
Computer literacy affects all areas of human life, and our subsequent control is almost inevitable nowadays. Due to the rapid growth of scientific knowledge and development of information and communication technologies, significant changes are taking place in individual countries. New technologies are coming to the fore through which there is an increase in country's economy, employment as well as labor productivity. To some extent, this fact is influenced by the ability of basic computer skills. This aspect is also important in terms of regional development at the national, regional and local level. The aim of the paper is to characterize selected indicator of computer literacy - internet work at three levels of Slovakia (state, district and municipality). The paper will be based by data from the Statistical Office of the European Union and Statistical Office of the Slovak republic. The methods of analysis, synthesis as well as graphical and cartographic methods will be the main methods used in the paper. Based on the achieved results, it can be stated that Slovakia achieved an average of 51.4 % in the development of internet use. It is very just above the EU average. At the regional level, the highest rate of internet use is manifested in the western part of Slovakia. At the local level in the case of the Nitra district, the internet was mostly used in the hinterland of the city of Nitra.
APA, Harvard, Vancouver, ISO, and other styles
7

Wahba, Khaled, and Sherif Kamel. "A Virtual Research Model to Help Academics Face the Challenges of the 21st Century." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2401.

Full text
Abstract:
The academic career and the stages of promotion of teachers and field researchers at the Egyptian universities as well as at many research centers available in Egypt's 26 provinces is guided by a set of rules and regulations that mainly depend on the number of publications that the researcher is producing in a specific period of time. It is also important to note that such publications should be published in well-known and accredited journals, transactions, and conference proceedings amongst others. These publications could be produced jointly with other institutions both locally and internationally. In all scenarios, one common problem always prevails, that is resources and funding. As for funding it is occasionally provided through international donors such as the European Union and the National Science Foundation. However, the problem remains in the local segment where various barriers are slowing down if not blocking the production of up-to-standard publications and research projects that are needed to contribute to the overall development of various sectors both quantitatively and qualitatively. Example barriers would include financial resources, required specialized equipment, as well as computing (hardware and software) and communication resources. In that respect, Scientific Computer Software Applications (SCSA) is becoming frequently the workhorse of research and development activities. Many software packages have been released to help researchers analyze and produce scientific publications. Most of these packages have a complicated design as well as expensive making it difficult to buy and not easy to understand by the user. Egypt, a developing country, lacks funding for research and development activities as compared to the United States and other European countries. The lack of financial resources and the scarcity of required resources make it difficult for academic researchers to build and excel in their academic careers. This paper demonstrates a new model namely; Virtual Research System (VRS), that is free from limitations of spatial distance and time and based mainly on information and communication technologies including the Internet to help leverage the quality and the quantity of academic researchers in Egyptian universities both locally as well as through collaborative work with other international research institutions. The paper provides an opportunity to share a wealth of information and knowledge that was never tapped before through the old accustomed to traditional techniques. The paper also demonstrates that new information and communication technologies are creating many challenges and opportunities for growth in different disciplines including research and development.
APA, Harvard, Vancouver, ISO, and other styles
8

Vlada, Marin, and Adrian Adascalitei. "COMPUTERS: AS DIGITAL FACILITIES FOR SCIENTIFIC RESEARCH AND AS TOOLS FOR ENHANCED LEARNING IN HIGHER EDUCATION." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-138.

Full text
Abstract:
Complexity of learning causes at all stages of development of human society, the search for new methods, new tools, new resources for relevant efficiency in education. Until now developed new theories and methods developed by educators and psychologists were reformed and modernized education systems of the countries have adapted curriculum learning goals were always set new directions in scientific research. Over time, changes in all scientific theories, methods and techniques of investigation of development of human knowledge that influence the overall development of human society. To achieve development and efficiency in life, one must continually adapt to the changes of knowledge. In education, particularly learning and improvement, the emergence of new information and communication technologies (ICT) to improve pedagogical theories and psychological forces pupils / students, teachers, parents and professionals to adapt to these changes. What do pupils and students? What do teachers and parents? What do experts? What are governments? An Example. INTIME Project (1999-2001). "The mission of INTIME is to help educators improve student learning at all levels (PK thru University work) and in all content areas. We work with PK thru 12th grade teachers and university faculty to accomplish this mission. We use contemporary technology, high quality conceptual models, online streaming videos, case studies and probing questions analysis to help educators learn the skills necessary for improving student learning". Technology as Facilitator of Quality Education Model: A Model (by William P. Callahan and Thomas J. Switzer, College of Education, University of Northern): o COMPUTER: means for forming a new vision of education, research and innovation. o TECHNOLOGY: mediator of quality education. o STUDENTS: active participants in their own learning process. Computer Aided Learning Many educational projects that use computer and software are the result of complex ideas and exploratory actions immediately after 2000. Already there were many changes in education by supporting it with systems, programs and applications, including the development of IDD shape (Open Distance Learning). At that time - the transition from Web 1.0 to Web 2.0 technology, the terms "e-Learning" and "Educational Software" appeared more often in various articles, studies, reports, etc.. Today, some experts in e-learning and educational software actually admit that at the time concepts were not clear and do not understand the context of their use in education and training. After 10 years, by following some step-difficult-sometimes even e-Learning products and educational software incorporates not only expertise in informatics and IT professionals, especially teachers and teaching scenarios for learning: IAC (Computer Aided Training). Systemic approach to learning and teaching strategy Computer assisted learning systems approach to training enables a new vision that psycho-pedagogy one theorized in recent years, but which becomes operative when teaching strategy is combined with multimedia technologies. While in training designed as a system can be determined: for the system (training objectives), the processes by which it is achieved for (type of activities, learning situations in which students must participate to achieve the targets) and the results that they want to reach (translated into effective procurement categories of students), educational software design allows even cover the main elements of the system, helping to optimize the learning process. News trends New trends in education highlights the need for a teaching tool that involves both players learning process: teachers and students.Changing the paradigm shift from learning and knowledge acquisition in the development of skills, values and attitudes necessary focus on training activities and voluntary dominant active participation of students to the needs, interests and their learning profiles. Differentiated Instruction and its contextualization is particularly useful support in using computers in the classroom. The Power of Learning "Teaching is more than imparting knowledge, it is inspiring change. Learning is more than absorbing facts, it is acquiring understanding." William Arthur Ward Knowledge and lifelong learning frees you from ignorance and superficiality. Today, technology and software resources help business efficiency and a better job in this regard. "Educational content it should encourage students to create their own knowledge by experiment, not by learning a text by heart." Radu Jugureanu The responsibility for education is nowadays shared: collaborative demarches and adequate commitment from all stakeholders is very much increasing the effects of education as a whole, oriented towards preparing competitive human resources equipped with competences for the 21st Century: cooperation, communication, critical thinking, creativity, innovation. In the United States and also in UNESCO strategies these are referred to as the 21st Century Skills. The European Union in the Lisbon framework outlines eight domains of Key Competences for Lifelong Learning. These 21st Century Skills are critically important to support the challenges of the modern workplace and its dynamic and the rapidly changing knowledge society. There is a growing and widely accepted understanding that a different set of skills need to be developed by our students in our school systems. Highly structured and disciplined schooling systems do not necessarily prepare students well for the dynamics and challenges of the 21st century workplace and society. For Dr. Howard Gardner (American Psychologist and Educator), intelligence is (Building the 21st-Century Mind: www.howardgardner.com, Gardner, 2009): o the ability to create an effective product or offer a service that is valued in a culture; o a set of skills that make it possible for a person to solve problems in life; o the potential for finding or creating solutions for problems, which involves gathering new knowledge. Skills are critically important to support the challenges of the modern workplace and its dynamic and the rapidly changing knowledge society. There is a growing and widely accepted understanding that a different set of skills need to be developed by our students in our school systems. Highly structured and disciplined schooling systems do not necessarily prepare students well for the dynamics and challenges of the 21st century workplace and society. More self-motivated, individualized, group and collaborative learning processes, supported by ICT will contribute significantly to the preparation of a more agile modern workforce (Hamilton, & O'Duffy 2009).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography