Contents
Academic literature on the topic 'Cybercriminalité – Lutte contre'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybercriminalité – Lutte contre.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybercriminalité – Lutte contre"
Freyssinet, Éric. "Transformation numérique de la gendarmerie nationale." Sécurité et stratégie 31, no. 3 (March 19, 2024): 20–24. http://dx.doi.org/10.3917/sestr.031.0020.
Full textQuéméner, Myriam. "Pour une lutte plus efficace contre la cybercriminalité." Sécurité globale 15, no. 3 (2018): 5. http://dx.doi.org/10.3917/secug.183.0005.
Full textCassuto, Thomas. "Nouvelles perspectives dans la lutte contre la cybercriminalité." Sécurité globale 15, no. 3 (2018): 29. http://dx.doi.org/10.3917/secug.183.0029.
Full textQuéméner, Myriam. "Concilier la lutte contre la cybercriminalité et l’éthique de liberté." Sécurité et stratégie 5, no. 1 (2011): 56. http://dx.doi.org/10.3917/sestr.005.0056.
Full textBerthelet, Pierre. "Aperçus de la lutte contre la cybercriminalité dans l'Union européenne." Revue de science criminelle et de droit pénal comparé N° 1, no. 1 (2018): 59. http://dx.doi.org/10.3917/rsc.1801.0059.
Full textPereira, Brigitte. "La lutte contre la cybercriminalité : de l’abondance de la norme à sa perfectibilité." Revue internationale de droit économique XXX, no. 3 (2016): 387. http://dx.doi.org/10.3917/ride.303.0387.
Full textAghroum, Christian. "La lutte contre la cybercriminalité : la France au c?ur du concert européen..." Sécurité globale 6, no. 4 (2008): 35. http://dx.doi.org/10.3917/secug.006.0035.
Full textStéphane Bondallaz. "La lutte contre la cybercriminalité au travers des noms de domaine Internet en droit suisse." Jusletter, no. 1115 (2022). http://dx.doi.org/10.38023/70d8bde6-07b0-48ee-83ad-10edd483788c.
Full textBarlatier, Jerome. "Le renseignement criminel au service de la lutte contre la cybercriminalité : l’exemple français de la gendarmerie nationale." Rivista di Criminologia, Vittimologia e Sicurezza, XVI, 1-3, 2022 (December 2022). http://dx.doi.org/10.14664/rcvs/244.
Full textBerthelet, Pierre. "La lutte contre la cybercriminalité à l’échelle de l’Union : analyse de l’évolution juridique d’un phénomène à la confluence de plusieurs agendas institutionnels." Revue québécoise de droit international, 2018, 25. http://dx.doi.org/10.7202/1067257ar.
Full textDissertations / Theses on the topic "Cybercriminalité – Lutte contre"
Boos, Romain. "La lutte contre la cybercriminalité au regard de l’action des États." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0158/document.
Full textThe twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences
Freyssinet, Eric. "Lutte contre les botnets : analyse et stratégie." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066390.
Full textBotnets, or networks of computers infected with malware and connected to a command and control system, is one of the main tools for criminal activities on the Internet today. They allow the development of a new type of crime: crime as a service (CaaS). They are a challenge for law enforcement. First by the importance of their impact on the security of networks and the commission of crimes on the Internet. Next, with regards to the extremely international dimension of their dissemination and therefore the enhanced difficulty in conducting investigations. Finally, through the large number of actors that may be involved (software developers, botnet masters, financial intermediaries, etc.). This thesis proposes a thorough study of botnets (components, operation, actors), the specificaion of a data collection method on botnet related activities and finally the technical and organizational arrangements in the fight against botnets; it concludes on proposals on the strategy for this fight. The work carried out has confirmed the relevance, for the effective study of botnets, of a model encompassing all their components, including infrastructure and actors. Besides an effort in providing definitions, the thesis describes a complete model of the life cycle of a botnet and offers methods for categorization of these objects. This work shows the need for a shared strategy which should include the detection elements, coordination between actors and the possibility or even the obligation for operators to implement mitigation measures
Iler, Betul. "Réflexions sur les politiques françaises et européennes de lutte contre la cybercriminalité." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTD029.
Full textGlobalization and technological progress constantly challenge the adaptation capacity of government policies. Cyberspace is a new freedom space and a new danger space giving birth to a new form of original crime called cybercrime. The regulation of this cross-border, fast and technical space, is not easy for States. The fight against cybercrime generates political, legal and technical problems. Cyberspace shows deficiencies of our current legal systems.The criminal law and criminal procedure’s adaptation to cybercrime should be done in Human rights’ respect. This balance between security and freedom is particularly hard in a virtual space. The legislator, the judge and the policeman are faced with the constant evolution of cybercrime methods requiring a coordinated and fast international judicial action. These requirements are difficult to achieve in a context of heterogeneity remains of judicial systems and no comprehensive and harmonized strategy has emerged. This fight raises questions about states sovereignty and requires rethinking current models
Freyssinet, Eric. "Lutte contre les botnets : analyse et stratégie." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066390/document.
Full textBotnets, or networks of computers infected with malware and connected to a command and control system, is one of the main tools for criminal activities on the Internet today. They allow the development of a new type of crime: crime as a service (CaaS). They are a challenge for law enforcement. First by the importance of their impact on the security of networks and the commission of crimes on the Internet. Next, with regards to the extremely international dimension of their dissemination and therefore the enhanced difficulty in conducting investigations. Finally, through the large number of actors that may be involved (software developers, botnet masters, financial intermediaries, etc.). This thesis proposes a thorough study of botnets (components, operation, actors), the specificaion of a data collection method on botnet related activities and finally the technical and organizational arrangements in the fight against botnets; it concludes on proposals on the strategy for this fight. The work carried out has confirmed the relevance, for the effective study of botnets, of a model encompassing all their components, including infrastructure and actors. Besides an effort in providing definitions, the thesis describes a complete model of the life cycle of a botnet and offers methods for categorization of these objects. This work shows the need for a shared strategy which should include the detection elements, coordination between actors and the possibility or even the obligation for operators to implement mitigation measures
Tourny, Eve. "La lutte contre la criminalité informatique bancaire : approches de droit comparé et de droit international." Nice, 2011. http://www.theses.fr/2011NICE0014.
Full textSouvignet, Thomas. "L'expertise et la lutte contre la fraude monétique." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020091.
Full textEvery year, payment card fraud exceeds 1.5 billion euros in Europe. Organised crime groups are exploiting any vulnerability possible to take a piece of this lucrative activity. Even though the five principal entities in the payment card industry (cardholders, issuers,acceptors, acquirers and payment system providers) are implementing binding security measures through out standardized systems and networks, fraud continues to increase. Efforts by the state, industry collaboration, and individuals have been unsuccessful in decreasing criminal advances. Having analysed the elements of payment card fraud, this thesis proposes several actions (passive, reactive and proactive) to help improve the fight against this fraud. First, itis relevant to gain knowledge of the source of the card details and not to focus only on its reuse. Next, forensic assessment has to be improved, for example by developing an increased scientific understanding of the technology. Such an expertise should then be passed on to investigators through effective training and knowledge transfer. Investigations should also be made more dynamic with reactive operations conducted in concert by investigators and technicians. Finally, in an ideal proactive spirit, future investigations and assessments should be oriented and facilitated by studying and influencing current payment card technology developments
Aguilon, Alban. "Les modes de traitement de la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0067.
Full textCybercriminality evolved in the same way to the development of the new technologies of information and communication. The criminal law overhauled itself with some troubles, because this kind of delinquency use and create many new concepts. Cybercriminality transcends customary delinquency social manners as well as the borders, whereas applied law systems are based on the principles of national sovereignty, independence and territoriality. Others difficulties consist in the slowness of criminal law and the high confidentiality level insured by new technologies. Finally, the legal systems are ordinary applied to tangibles objects. About the internal law, it will be essential to rationalize the technical means and the cooperation between the protagonists, to perform the procedural dispositions and the judicial system efficiency. The international community cooperate actively, as attest many international agreements and the badly coordinated contribution of numerous specialized institutions. Moreover, private actors must collaborate and cooperate with institutional actors within a system which efficiently integrate paralegal modes of crime regulation
Ouchene, Nadir. "L’applicabilité de la loi pénale à l’endroit de la cybercriminalité dissimulée." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020077.
Full textThe "Deep web" is a part of the web which isn't referenced by usual search engines. According to Chris Sherman and Gary Price, these only refer to 3 to 10% of the pages. The rest which isn't accessible to regular web users consists in the "Deep Web" and more than one billion hidden datas remain. In a few cases, the documents are too heavy, or the databases are too complicated to have their contents indexed, but in other cases, individuals decide not to reference their websites in order to make the information private. We can consider this as the tip of the Internet. It hosts several black market types such as, drugs, weapons or human trafficking. On a judicial point of view, this topic is quite meaningful and raises a lot of questions. The main issue is to determine how to organise the repression on that medium. This leads us to think about the application of the law through different countries, how can the international law comprehend the phenomenon effectively. How the different states should coordinate their repressive measures and agree on the proper procedural rules to apply. We could ask ourselves rather regular law enforcements are relevant enough to allow an adequate repression, or if specific infractions should be created. So the topic deals with essential thoughts on the international law
Tano-Bian, Anmonka Jeanine-Armelle. "La répression de la cybercriminalité dans les Etats de l’Union européenne et de l’Afrique de l’Ouest." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015PA05D005/document.
Full textEach party of the space, realized by the ground, maritime or air borders is desired by the nations which succeed in making it private grounds with the exception of a single component: the cyberspace. This place of exchanges and circulation of information freed itself from this cornering. It is what makes it real for the uses which it allows (sendings of messages, broadcasting) of real-time information, trainings and virtual (as far as the digital networks follow with difficulty localizable paths) in the point to generate difficulties as for its frame by the law. From then on, the cyberspace sets up itself as a space where it is easy to cultivate illegal activities considering the opportunities which it offers. The illegal activities marry forms pluridimensionnelles and complex which we group under the generic naming of cybercrime. Due to its nature and its subdivisions, the cybercrime is the object of reflections, studies, searches, implementations of politics and of actions in a national and international scale to reach in his eradication. The actions are led in way coordinated between States and institutions. The fight against this interplanetary phenomenon requires the mutualization of the efforts on behalf of the actors of telecommunications, computing, all the professional layers as well as her on behalf of the consumers under reserve that they are informed well about the risks connected for the cyberspace. The study compared by the systems of repression implemented in the European and West-African spaces will allow to understand better the exercise of the penal sovereign right in front of the cybercrime and the importance of collaborations between these two community spaces
Skaf, Faten. "La justice pénale face à la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.
Full textNowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
Books on the topic "Cybercriminalité – Lutte contre"
Algiers, Algeria) Lutte contre la cybercriminalité (Conference) (2010. La lutte contre la cybercriminalité: Muḥārabat al-jarīmah al-maʻlūmātīyah : actes du séminaire international, Alger le 5-6 mai 2010. Algérie: Centre de recherche juridique et judiciaire, 2012.
Find full text