Results 71 to 80 of about 2,569 (184)

Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes

open access: yesFiat Justisia, 2019
The advancement of information technology is changing the pattern of radical group propaganda from conventional methods to the ways they use today, namely using the media and cyberspace, or what is also called as cyber-terrorism.
Nadiah Khaeriah Kadir   +2 more
doaj   +1 more source

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso

open access: yesReview of Development Economics, EarlyView.
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley   +1 more source

Sweeter than honey: Are Gmail accounts associated with greater rewards at a higher risk of hijacking?

open access: yesComputers in Human Behavior Reports
Objectives: This study investigates the effect of advertised rewards in credential leaks on the likelihood and speed of account hijacking. Methods: In an online field experiment, we created 176 honey Gmail accounts and randomly assigned them to eight ...
Danielle Stibbe   +3 more
doaj   +1 more source

The Labor Market Effects of Occupational Licensing in the Public Sector

open access: yesIndustrial Relations: A Journal of Economy and Society, Volume 65, Issue 2, Page 200-229, April 2026.
ABSTRACT In the United States, occupational licensing is about twice as prevalent in the public sector as in the private sector. However, the influence of occupational regulation for public sector workers and how it compares with that of private sector workers has not been analyzed in detail.
Morris M. Kleiner, Wenchen Wang
wiley   +1 more source

Patterns and predictors of cyber fraud victimization: Testing routine activity theory and general theory of crime in Japan

open access: yesJournal of Economic Criminology
Although previous research on the predictors of cyber fraud victimization has provided evidence of the impact of routine activity and low self-control on the risk of cyber fraud victimization, little knowledge is available in Japan.
Ai Suzuki, Ko Shikata, Takahito Shimada
doaj   +1 more source

Pengembangan Framework Pelaporan Cyber Crime

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2017
In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable.
Daryono Daryono, Bambang Sugiantoro
doaj   +1 more source

6G-Enabled AI–Driven Technology for Real-Time Ecosystem Monitoring and Analysis in Mining Regions

open access: yesIET Signal Processing
For effective management of the ecological balance of natural resources, it is crucial to conduct real-time environmental monitoring in the context of mining activities.
Meijing Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy