Results 31 to 40 of about 90,875 (224)

Serious, therefore organised? A critique of the emerging "cyber-organised crime" rhetoric in the United Kingdom [PDF]

open access: yes, 2016
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms "serious" and "organised" in policies against organised crime in the UK.
Lavorgna, A, Sergi, A
core   +1 more source

PEMBAHARUAN KEBIJAKAN PENEGAKAN HUKUM PIDANA DI ERA “CYBER”

open access: yesMasalah-Masalah Hukum, 2012
Development of information and communication technologies affect the development of crime, are not always balanced by the development of criminal law policy, reform efforts should be carried out crime prevention policy with respect to the enforcement of ...
Sy. Hasyim Azizurrahman
doaj   +1 more source

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier

open access: yesIEEE Access, 2022
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for ...
Harel Berger   +3 more
doaj   +1 more source

Detecting Cyber Fraud in Banking Transactions via Machine Learning Techniques: Implications for Financial Stability

open access: yesFinTech
This study empirically investigates the performance of Elastic Machine Learning, an industrial, unsupervised anomaly detection tool, in the identification of fraudulent behavior in banking transactions.
Lamprini Konsta   +3 more
doaj   +1 more source

Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders

open access: yes, 2019
The distinct setting in which cyber-dependent crime takes place may reduce the similarity in the deviance of social network members. We test this assumption by analysing the deviance of the most important social contacts of cyber-dependent offenders and ...
Ruiter, S.   +2 more
core   +2 more sources

Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]

open access: yes, 2018
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul   +4 more
core   +3 more sources

Kryptonite for Cryptocurrencies? What Are the Effects of Regulatory Controls on Bitcoin Returns and Volatility?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley   +1 more source

Cyber Crime E-Commerce Business Transactions

open access: yesSASI, 2022
Introduction: Law enforcement and protection for cyber cases is focused on consumers as victims of digital crimes where consumers are generally harmed when conducting business transactions digitally.
Fauziah Lubis
doaj   +1 more source

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +2 more sources

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Home - About - Disclaimer - Privacy