Results 101 to 110 of about 90,875 (224)

Pengembangan Framework Pelaporan Cyber Crime

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2017
In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable.
Daryono Daryono, Bambang Sugiantoro
doaj   +1 more source

Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks [PDF]

open access: yes, 2016
This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight against and the prevention of cyber-attacks, including those used in ...
Hallaq, Bilal, Somer, Tiia, Watson, Tim
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Patterns and predictors of cyber fraud victimization: Testing routine activity theory and general theory of crime in Japan

open access: yesJournal of Economic Criminology
Although previous research on the predictors of cyber fraud victimization has provided evidence of the impact of routine activity and low self-control on the risk of cyber fraud victimization, little knowledge is available in Japan.
Ai Suzuki, Ko Shikata, Takahito Shimada
doaj   +1 more source

Cyber Crime – Der digitalisierte Täter

open access: yesAustrian Law Journal, 2017
Der vorliegende Kommentar bezieht sich auf den Beitrag „Cyber Crime – der digitalisierte Täter“ von Susanne Reindl-Krauskopf (ALJ 2/2017, 110). Die Computerkriminalität ist aktuell wohl eines der am schnellsten wachsenden, aber auch unterschätztesten ...
Bergauer, Christian
doaj   +1 more source

Effects of chemical and biological warfare agent decontaminants on trace survival: Impact on fingermarks deposited on paper

open access: yesJournal of Forensic Sciences, Volume 71, Issue 3, Page 1405-1419, May 2026.
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant   +3 more
wiley   +1 more source

Tinjauan Yuridis Terhadap Cyber Crime [PDF]

open access: yes, 2016
Yurisdiksi merupakan refleksi dari prinsip dasar kedaulatan negara, kedaulatan negara tidak akan diakui apabila negara tersebut tidak memiliki jurisdiksi, persamaan derajat negara dimana kedua negara yang sama-sama merdeka dan berdaulat tidak bisa ...
Ronal, R. (Ronal)
core  

Parental Understandings of ‘Stranger Danger’: Balancing Fear of Victimisation by Strangers Against Enabling Autonomy and Independence in Children

open access: yesChildren &Society, Volume 40, Issue 3, Page 503-512, May 2026.
ABSTRACT For decades, children have been taught about ‘stranger danger’. Fear of the stranger has been associated with overly cautious parenting strategies, and the curtailing of freedoms as children transition to adolescents. This article aims to examine the extent to which parents consider this issue of stranger danger in their decisions to grant ...
Craig Collie
wiley   +1 more source

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, Volume 36, Issue 3, Page 364-385, May 2026.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Laundering Money Online: a review of cybercriminals methods

open access: yes, 2013
Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms.
Richet, Jean-Loup
core  

Home - About - Disclaimer - Privacy