Results 61 to 70 of about 90,875 (224)
"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by ...
+5 more sources
Cybersecurity Risks: Are They Inflated? [PDF]
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj
Pembuktian dalam Hukum Pidana Indonesia terhadap Cyber Crime [PDF]
Salah satu permasalahan yang dihadapi penegak hukum untuk menjerat pelaku tindak pidana mayantara (cyber crime) adalah masalah pembuktian tentang kesalahan terdakwa.
A, M. Y. (M)
core
ABSTRACT The cultures and governance of security markets in the United Kingdom are often characterised through a paradoxical narrative of simultaneous state retreat and progressive advance. In the face of repeated recent high‐profile security failures, and global changes in material political economy, we argue that UK security governance is adapting to
Ben Collier, Jamie Buchan
wiley +1 more source
Juridical Review of The Act of Virtual Money Laundering
The crime of money laundering as one type of white collar crime has actually been known since 1867. Cyber Money Laundering is money laundering carried out through cyberspace ("mayantara"), so that in addition to committing the crime of money laundering ("
Yohanes Fiodas Jaman +2 more
doaj +1 more source
How to Demonstrate Trustworthy Use of AI in Public Services: A Case Study
ABSTRACT Government leaders across the globe are grappling with how to harness and integrate artificial intelligence (AI) to enhance public service delivery and efficiency. Yet, a key challenge faced is how to build and maintain the trust of stakeholders. Trust is critical for the acceptance and sustained adoption of AI technologies, as well as to gain
Natalie Smith +5 more
wiley +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
Franco‐British Bilateral Diplomacy After Brexit, 2020–2025: Mending the Ties That Bind
Abstract Brexit shook to its very core one of the European Union's (EU's) prominent partnerships, the Franco‐British bilateral relationship (FBBR), disrupting diplomatic routines and shattering interpersonal trust before circumstances changed and the relationship rapidly began to mend. In this article, we analyse the breakdown and restoration of Franco‐
Helen Drake, Pauline Schnapper
wiley +1 more source
Kerjasama Kepolisian Negara Republik Indonesia (Polri)- Australian Federal Police (Afp) Sektor Capacity Building Dalam Penanggulangan Tindak Pidana Cyber Crime Di Indonesia Periode 2012-2014 [PDF]
In the current era of globalization is growing at a rapid advancesin technology. One proof of the technological advances with theinternet. But technological advancements, giving a negative effectof the emergence of world crime (cyber crime).
Burhansyah A, Encik Mochammad +2 more
core
Abstract The article contributes to the emerging scholarly literature on how European democracies respond to foreign information manipulation and interference (FIMI), whilst focusing on a single case study of France. It asks how France responded to Russian FIMI and why this response has become more forceful and comprehensive over time.
Agnieszka K. Cianciara
wiley +1 more source

