Results 21 to 30 of about 2,569 (184)

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier

open access: yesIEEE Access, 2022
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for ...
Harel Berger   +3 more
doaj   +1 more source

PEMBAHARUAN KEBIJAKAN PENEGAKAN HUKUM PIDANA DI ERA “CYBER”

open access: yesMasalah-Masalah Hukum, 2012
Development of information and communication technologies affect the development of crime, are not always balanced by the development of criminal law policy, reform efforts should be carried out crime prevention policy with respect to the enforcement of ...
Sy. Hasyim Azizurrahman
doaj   +1 more source

PENEGAKAN HUKUM TERHADAP CYBER CRIME DI BIDANG PERBANKAN SEBAGAI KEJAHATAN TRANSNASIONAL

open access: yesJurnal Magister Hukum Udayana, 2013
Internet has been used in various fields of life, one of which is banking. Banking activities are performed through Internet-banking. Through the internet-banking service, customers can conduct financial transactions without having to come to the bank ...
Tri Kuncoro
doaj   +1 more source

Detecting Cyber Fraud in Banking Transactions via Machine Learning Techniques: Implications for Financial Stability

open access: yesFinTech
This study empirically investigates the performance of Elastic Machine Learning, an industrial, unsupervised anomaly detection tool, in the identification of fraudulent behavior in banking transactions.
Lamprini Konsta   +3 more
doaj   +1 more source

Cyber Crime E-Commerce Business Transactions

open access: yesSASI, 2022
Introduction: Law enforcement and protection for cyber cases is focused on consumers as victims of digital crimes where consumers are generally harmed when conducting business transactions digitally.
Fauziah Lubis
doaj   +1 more source

EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley   +1 more source

Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2021
Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime.
Natanael Christianto, Wiwin Sulistyo
doaj   +1 more source

CYBER CRIME

open access: yesThe Denning Law Journal, 2014
Cyber Crime & Warfare, Peter Warren and Michael Streeter, Hodder & Stoughton, London, UK, 2013 ISBN 9781444189988 Price £8.99 pbCybercrime – The Psychology of Online Offenders, Grainne Kirwan and Andrew Power, Cambridge University Press, Cambridge, UK, 2013 ISBN 978-0521180214 Price £23.99 pb 
openaire   +4 more sources

Kryptonite for Cryptocurrencies? What Are the Effects of Regulatory Controls on Bitcoin Returns and Volatility?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Home - About - Disclaimer - Privacy