This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n5http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n18http://localhost/temp/predkladatel/
n17http://purl.org/net/nknouf/ns/bibtex#
n19http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n20http://linked.opendata.cz/ontology/domain/vavai/
n16http://linked.opendata.cz/resource/domain/vavai/zamer/
n21http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F70883521%3A28120%2F06%3A63504926%21RIV07-MSM-28120___/
n11https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n7http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F70883521%3A28120%2F06%3A63504926%21RIV07-MSM-28120___
rdf:type
skos:Concept n20:Vysledek
dcterms:description
Příspěvek %22Současné formy počítačové kriminality%22 se zabývá vážnými problémy s identifikací hrozeb užitím některých kriminalistických technik. Nejdříve ze všeho jsou hrozby popsány, definovány a pak následuje popis kroků vedoucích k ochraně dat a prevenci před hrozbami. This contribution #Computer criminality and its present forms# is concerning about recent serious problems with identity thefts by using several criminal techniques. First of all I try to define the new modern term #identity theft# and also describe some ways how the identity theft or fraud could be comitted as well as the most favorite places for stealing personal information. The next part is concentrated on the specific types of criminal theft by using Internet and computers in general such as: social engineering, phishing and pharming. There are also showed many examples of those crimes from the real life and mentioned damages caused by fraudsters. In the end there are described some steps how to protect personal data and prevent identity theft. This contribution #Computer criminality and its present forms# is concerning about recent serious problems with identity thefts by using several criminal techniques. First of all I try to define the new modern term #identity theft# and also describe some ways how the identity theft or fraud could be comitted as well as the most favorite places for stealing personal information. The next part is concentrated on the specific types of criminal theft by using Internet and computers in general such as: social engineering, phishing and pharming. There are also showed many examples of those crimes from the real life and mentioned damages caused by fraudsters. In the end there are described some steps how to protect personal data and prevent identity theft.
dcterms:title
Computer Crime and its Present Forms Computer Crime and its Present Forms Computer Crime and its Present Forms
skos:prefLabel
Computer Crime and its Present Forms Computer Crime and its Present Forms Computer Crime and its Present Forms
skos:notation
RIV/70883521:28120/06:63504926!RIV07-MSM-28120___
n3:strany
51
n3:aktivita
n12:Z
n3:aktivity
Z(MSM 265300021)
n3:dodaniDat
n7:2007
n3:domaciTvurceVysledku
n19:7624433
n3:druhVysledku
n6:D
n3:duvernostUdaju
n13:S
n3:entitaPredkladatele
n21:predkladatel
n3:idSjednocenehoVysledku
469497
n3:idVysledku
RIV/70883521:28120/06:63504926
n3:jazykVysledku
n4:eng
n3:klicovaSlova
Identity theft; fraud (fraudster); hacker (cracker); scams; social engineering; phishing; pharming
n3:klicoveSlovo
n9:Identity%20theft n9:hacker%20%28cracker%29 n9:social%20engineering n9:fraud%20%28fraudster%29 n9:pharming n9:phishing n9:scams
n3:kontrolniKodProRIV
[3131A459D6E8]
n3:mistoKonaniAkce
Zlín
n3:mistoVydani
Zlín
n3:nazevZdroje
sborník konference Internet a bezpečnost organizací
n3:obor
n14:AH
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
1
n3:rokUplatneniVysledku
n7:2006
n3:tvurceVysledku
Jašek, Roman
n3:typAkce
n5:WRD
n3:zahajeniAkce
2006-03-14+01:00
n3:zamer
n16:MSM%20265300021
s:numberOfPages
7
n17:hasPublisher
Univerzita Tomáše Bati ve Zlíně
n11:isbn
80-7318-393-5
n18:organizacniJednotka
28120