Results 51 to 60 of about 90,875 (224)
Comprehensive Approach to Increase Cyber Security and Resilience [PDF]
In this paper the initial results of the European project CAMINO in terms of the realistic roadmap to counter cyber crime and cyber terrorism are presented.
Bruna, Maria Pilar Torres +7 more
core +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime ...
Shuai Chen +7 more
doaj +1 more source
Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara [PDF]
Kecemasan terhadap cyber crime telah menjadi perhatian dunia, namun tidak semua negara di dunia ini memberikan perhatian yang lebih besar terhadap masalah cyber crime dan memiliki peraturannya kecuali negara-negara maju dan beberapa negara berkembang ...
Sa\u27diyah, N. K. (Nur) +1 more
core +3 more sources
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce.
Steve G.A. van de Weijer, Asier Moneva
doaj +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
On 3‐MMC: A Cathinone I Have Come to Know and Love
ABSTRACT This article attempts to complicate the mythology of a compound in a state of becoming. I will trace lightly its origins as a cultural disruptor and how I am implicated in this imperative. Introducing you to 3‐MMC will require multiple modes of storytelling and taking of liberties, drawing on literature reviews, practice‐based research, prose,
Carmen Ostrander
wiley +1 more source
KEJAHATAN DEFECTING: Studi Perbandingan antara Undang-Undang ITEdan Hukum Pidana Islam
As the technology advances, the crimeis no longerjusthappeningin the real world, but itis alreadyreaching into thevirtual worldor virtual. In this case, defacing a form of cyber crimes is quite disturbing and has hurt many people.
Ahmad Muyasir
doaj +1 more source
Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley +1 more source

