Results 31 to 40 of about 90,875 (224)
Serious, therefore organised? A critique of the emerging "cyber-organised crime" rhetoric in the United Kingdom [PDF]
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms "serious" and "organised" in policies against organised crime in the UK.
Lavorgna, A, Sergi, A
core +1 more source
PEMBAHARUAN KEBIJAKAN PENEGAKAN HUKUM PIDANA DI ERA “CYBER”
Development of information and communication technologies affect the development of crime, are not always balanced by the development of criminal law policy, reform efforts should be carried out crime prevention policy with respect to the enforcement of ...
Sy. Hasyim Azizurrahman
doaj +1 more source
Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for ...
Harel Berger +3 more
doaj +1 more source
This study empirically investigates the performance of Elastic Machine Learning, an industrial, unsupervised anomaly detection tool, in the identification of fraudulent behavior in banking transactions.
Lamprini Konsta +3 more
doaj +1 more source
The distinct setting in which cyber-dependent crime takes place may reduce the similarity in the deviance of social network members. We test this assumption by analysing the deviance of the most important social contacts of cyber-dependent offenders and ...
Ruiter, S. +2 more
core +2 more sources
Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul +4 more
core +3 more sources
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley +1 more source
Cyber Crime E-Commerce Business Transactions
Introduction: Law enforcement and protection for cyber cases is focused on consumers as victims of digital crimes where consumers are generally harmed when conducting business transactions digitally.
Fauziah Lubis
doaj +1 more source
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source

