Results 51 to 60 of about 90,875 (224)

Comprehensive Approach to Increase Cyber Security and Resilience [PDF]

open access: yes, 2015
In this paper the initial results of the European project CAMINO in terms of the realistic roadmap to counter cyber crime and cyber terrorism are presented.
Bruna, Maria Pilar Torres   +7 more
core   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China

open access: yesISPRS International Journal of Geo-Information, 2021
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime ...
Shuai Chen   +7 more
doaj   +1 more source

Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara [PDF]

open access: yes, 2016
Kecemasan terhadap cyber crime telah menjadi perhatian dunia, namun tidak semua negara di dunia ini memberikan perhatian yang lebih besar terhadap masalah cyber crime dan memiliki peraturannya kecuali negara-negara maju dan beberapa negara berkembang ...
Sa\u27diyah, N. K. (Nur)   +1 more
core   +3 more sources

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Familial concentration of crime in a digital era: Criminal behavior among family members of cyber offenders

open access: yesComputers in Human Behavior Reports, 2022
A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce.
Steve G.A. van de Weijer, Asier Moneva
doaj   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

On 3‐MMC: A Cathinone I Have Come to Know and Love

open access: yesAnthropology of Consciousness, EarlyView.
ABSTRACT This article attempts to complicate the mythology of a compound in a state of becoming. I will trace lightly its origins as a cultural disruptor and how I am implicated in this imperative. Introducing you to 3‐MMC will require multiple modes of storytelling and taking of liberties, drawing on literature reviews, practice‐based research, prose,
Carmen Ostrander
wiley   +1 more source

KEJAHATAN DEFECTING: Studi Perbandingan antara Undang-Undang ITEdan Hukum Pidana Islam

open access: yesAl-Mazaahib, 2015
As the technology advances, the crimeis no longerjusthappeningin the real world, but itis alreadyreaching into thevirtual worldor virtual. In this case, defacing a form of cyber crimes is quite disturbing and has hurt many people.
Ahmad Muyasir
doaj   +1 more source

Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar

open access: yesDevelopment and Change, EarlyView.
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley   +1 more source

Home - About - Disclaimer - Privacy