Results 21 to 30 of about 2,569 (184)
Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for ...
Harel Berger +3 more
doaj +1 more source
PEMBAHARUAN KEBIJAKAN PENEGAKAN HUKUM PIDANA DI ERA “CYBER”
Development of information and communication technologies affect the development of crime, are not always balanced by the development of criminal law policy, reform efforts should be carried out crime prevention policy with respect to the enforcement of ...
Sy. Hasyim Azizurrahman
doaj +1 more source
PENEGAKAN HUKUM TERHADAP CYBER CRIME DI BIDANG PERBANKAN SEBAGAI KEJAHATAN TRANSNASIONAL
Internet has been used in various fields of life, one of which is banking. Banking activities are performed through Internet-banking. Through the internet-banking service, customers can conduct financial transactions without having to come to the bank ...
Tri Kuncoro
doaj +1 more source
This study empirically investigates the performance of Elastic Machine Learning, an industrial, unsupervised anomaly detection tool, in the identification of fraudulent behavior in banking transactions.
Lamprini Konsta +3 more
doaj +1 more source
Cyber Crime E-Commerce Business Transactions
Introduction: Law enforcement and protection for cyber cases is focused on consumers as victims of digital crimes where consumers are generally harmed when conducting business transactions digitally.
Fauziah Lubis
doaj +1 more source
EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley +1 more source
Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort
Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime.
Natanael Christianto, Wiwin Sulistyo
doaj +1 more source
Cyber Crime & Warfare, Peter Warren and Michael Streeter, Hodder & Stoughton, London, UK, 2013 ISBN 9781444189988 Price £8.99 pbCybercrime – The Psychology of Online Offenders, Grainne Kirwan and Andrew Power, Cambridge University Press, Cambridge, UK, 2013 ISBN 978-0521180214 Price £23.99 pb
openaire +4 more sources
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source

