The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives ...
Michael Raymond Bartolacci +2 more
doaj
Cyber blackmail is a crime wherein an individual or corporation threatens to release a victim's private data on social media. As it is a type of crime that expands as technology improves, the rules governing it must be regularly updated and evaluated as
Nazura Abdul Manap, Omar Aljuboori
doaj +1 more source
‘IT Fauna’ and ‘Crime Pays’: Using Critical Design to Envision Cyber Security Futures [PDF]
The research presented is a collaboration between social scientists, designers and technologists that explored whether critical design could be used to envision cyber security futures.
Ashenden, Debi +2 more
core
Electronic Forgery As a Manifestation of Digital Corruption
This article examines the offense of cyber forgery as a major threat in the field of digital corruption. Cyber forgery demonstrates how technology can be used for illegal purposes, such as tampering with digital documents, hacking into systems, and ...
Rayane Khiari , Hayette Selmani
doaj
Abstract: Cyber crimes are illegal acts using computers and the Internet. This includes various activities such as hacking, identity theft, phishing, cyber stalking, and cyberbullying. The negative consequences of cyber crimes include financial loss, data security breaches, and psychological distress. With the rapid growth of technology, the number of
Manchekar., Dr. Srushti Shreeram +1 more
openaire +1 more source
Cyber-Sexual Crime and Social Inequality: Exploring Socioeconomic and Technological Determinants. [PDF]
Mármol CJ, Luna A, Legaz I.
europepmc +1 more source
Letter to the editor: Re-examining the role of deep learning in cyber forensics: Practical gaps beyond conceptual frameworks. [PDF]
Harihar SA, Kurhade AS, Waware SY.
europepmc +1 more source
BAKE: a novel framework for iterative security design for identifying criminally-exploitable vulnerabilities in biotechnology products. [PDF]
Elgabry M +3 more
europepmc +1 more source
Lived experiences of individuals with cyberviolence: Understanding the nature of the dark side of social media use. [PDF]
Nair AS, Anand N, Sharma MK.
europepmc +1 more source
Disproportionate Cybersexual Victimization of Women from Adolescence into Midlife in Spain: Implications for Targeted Protection and Prevention. [PDF]
Mármol CJ, Luna A, Legaz I.
europepmc +1 more source

