Results 41 to 50 of about 2,569 (184)
KEJAHATAN DEFECTING: Studi Perbandingan antara Undang-Undang ITEdan Hukum Pidana Islam
As the technology advances, the crimeis no longerjusthappeningin the real world, but itis alreadyreaching into thevirtual worldor virtual. In this case, defacing a form of cyber crimes is quite disturbing and has hurt many people.
Ahmad Muyasir
doaj +1 more source
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant +3 more
wiley +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Cybersecurity Risks: Are They Inflated? [PDF]
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj
Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation
Saad Subair +3 more
openaire +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Juridical Review of The Act of Virtual Money Laundering
The crime of money laundering as one type of white collar crime has actually been known since 1867. Cyber Money Laundering is money laundering carried out through cyberspace ("mayantara"), so that in addition to committing the crime of money laundering ("
Yohanes Fiodas Jaman +2 more
doaj +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
KEBIJAKAN HUKUM PIDANA TERHADAP TINDAK PIDANA KESUSILAAN BERDASARKAN INTERNET (CYBER SEX)
Salah satu masalah cyber crime yang juga sangat meresahkan dan mendapat perhatian berbagai pihak adalah masalah cyber crime di bidang kesusilaan (cyber pornography) khususnya child pornography dan cyber sex.
Melanie Pita Lestari
doaj +1 more source
ABSTRACT For decades, children have been taught about ‘stranger danger’. Fear of the stranger has been associated with overly cautious parenting strategies, and the curtailing of freedoms as children transition to adolescents. This article aims to examine the extent to which parents consider this issue of stranger danger in their decisions to grant ...
Craig Collie
wiley +1 more source

