. . . . "Computer Crime and its Present Forms"@cs . "RIV/70883521:28120/06:63504926!RIV07-MSM-28120___" . . "469497" . "Computer Crime and its Present Forms" . . . . "Identity theft; fraud (fraudster); hacker (cracker); scams; social engineering; phishing; pharming"@en . "Computer Crime and its Present Forms"@en . "P\u0159\u00EDsp\u011Bvek %22Sou\u010Dasn\u00E9 formy po\u010D\u00EDta\u010Dov\u00E9 kriminality%22 se zab\u00FDv\u00E1 v\u00E1\u017En\u00FDmi probl\u00E9my s identifikac\u00ED hrozeb u\u017Eit\u00EDm n\u011Bkter\u00FDch kriminalistick\u00FDch technik. Nejd\u0159\u00EDve ze v\u0161eho jsou hrozby pops\u00E1ny, definov\u00E1ny a pak n\u00E1sleduje popis krok\u016F vedouc\u00EDch k ochran\u011B dat a prevenci p\u0159ed hrozbami."@cs . "Z(MSM 265300021)" . "80-7318-393-5" . . . . "sborn\u00EDk konference Internet a bezpe\u010Dnost organizac\u00ED" . "51" . "Zl\u00EDn" . . . "Zl\u00EDn" . "Computer Crime and its Present Forms" . "RIV/70883521:28120/06:63504926" . . "2006-03-14+01:00"^^ . . "Ja\u0161ek, Roman" . "7"^^ . "1"^^ . . . "This contribution #Computer criminality and its present forms# is concerning about recent serious problems with identity thefts by using several criminal techniques. First of all I try to define the new modern term #identity theft# and also describe some ways how the identity theft or fraud could be comitted as well as the most favorite places for stealing personal information. The next part is concentrated on the specific types of criminal theft by using Internet and computers in general such as: social engineering, phishing and pharming. There are also showed many examples of those crimes from the real life and mentioned damages caused by fraudsters. In the end there are described some steps how to protect personal data and prevent identity theft." . "Univerzita Tom\u00E1\u0161e Bati ve Zl\u00EDn\u011B" . "This contribution #Computer criminality and its present forms# is concerning about recent serious problems with identity thefts by using several criminal techniques. First of all I try to define the new modern term #identity theft# and also describe some ways how the identity theft or fraud could be comitted as well as the most favorite places for stealing personal information. The next part is concentrated on the specific types of criminal theft by using Internet and computers in general such as: social engineering, phishing and pharming. There are also showed many examples of those crimes from the real life and mentioned damages caused by fraudsters. In the end there are described some steps how to protect personal data and prevent identity theft."@en . "Computer Crime and its Present Forms"@cs . "28120" . . "1"^^ . "[3131A459D6E8]" . . "Computer Crime and its Present Forms"@en . .