Results 41 to 50 of about 2,569 (184)

KEJAHATAN DEFECTING: Studi Perbandingan antara Undang-Undang ITEdan Hukum Pidana Islam

open access: yesAl-Mazaahib, 2015
As the technology advances, the crimeis no longerjusthappeningin the real world, but itis alreadyreaching into thevirtual worldor virtual. In this case, defacing a form of cyber crimes is quite disturbing and has hurt many people.
Ahmad Muyasir
doaj   +1 more source

Effects of chemical and biological warfare agent decontaminants on trace survival: Impact on fingermarks deposited on paper

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant   +3 more
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Cybersecurity Risks: Are They Inflated? [PDF]

open access: yesSalus Journal, 2016
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj  

Cyber Crime Forensics

open access: yesInternational Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence, 2022
Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation
Saad Subair   +3 more
openaire   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Juridical Review of The Act of Virtual Money Laundering

open access: yesYurisdiksi: Jurnal Wacana Hukum dan Sains
The crime of money laundering as one type of white collar crime has actually been known since 1867. Cyber Money Laundering is money laundering carried out through cyberspace ("mayantara"), so that in addition to committing the crime of money laundering ("
Yohanes Fiodas Jaman   +2 more
doaj   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

KEBIJAKAN HUKUM PIDANA TERHADAP TINDAK PIDANA KESUSILAAN BERDASARKAN INTERNET (CYBER SEX)

open access: yesKrtha Bhayangkara, 2019
Salah satu masalah cyber crime yang juga sangat meresahkan dan mendapat perhatian berbagai pihak adalah masalah cyber crime di bidang kesusilaan (cyber pornography) khususnya child pornography dan cyber sex.
Melanie Pita Lestari
doaj   +1 more source

Parental Understandings of ‘Stranger Danger’: Balancing Fear of Victimisation by Strangers Against Enabling Autonomy and Independence in Children

open access: yesChildren &Society, EarlyView.
ABSTRACT For decades, children have been taught about ‘stranger danger’. Fear of the stranger has been associated with overly cautious parenting strategies, and the curtailing of freedoms as children transition to adolescents. This article aims to examine the extent to which parents consider this issue of stranger danger in their decisions to grant ...
Craig Collie
wiley   +1 more source

Home - About - Disclaimer - Privacy