Results 71 to 80 of about 90,875 (224)
Implementasi Penyidikan Tindak Pidana Cyber Crime Berkaitan dengan Penjualan Barang yang Tidak Sesuai dengan Perjanjian dalam Rangka Perlindungan Konsumen (Studi di Polda Jawa Timur) [PDF]
SIArtikel ini membahas mengenai dua masalah. Masalah pertama yang dibahas adalah mengenai bentuk implementasi penyidikan tindak pidana cyber crime berkaitan dengan penjualan barang yang tidak sesuai perjanjian dalam rangka perlindungan konsumen yang ...
Astuti, D. P. (Dwi)
core +1 more source
CEO social media activity and insider trading
Abstract This article studies the relationship between CEOs' social media activity and their insider trading behavior. Drawing on psychological evidence linking online activity to risk‐taking, we find that active CEOs on social media exhibit higher risk preferences and engage more in insider trading—particularly in terms of incidence, intensity, and ...
Zhichuan Li +2 more
wiley +1 more source
Le Combat contre la Criminalite Informatique dans le Contexte Europeen
The article tackles the issue of cyber crime. Moreover, speaks about computer fraud, as a part ofcriminal activities wich cyber crime, generally known as computer crime, e-crime, hi-tech crime or electroniccrime too, refers to.
Nadina Velicu, Marcel Podască
doaj
Pembuktian Terhadap Kejahatan Dunia Maya Dan Upaya Mengatasinya Menurut Hukum Positif Di Indonesia [PDF]
Tujuan dilakukannya penelitian ini adalah untuk mengetahui apakah kendala yuridis dalam pembuktian kejahatan dunia maya (cyber crime) dan bagaimanakah upaya mengatasi tindak pidana cyber crime menurut hukum positif Indonesia, yang dengan menggunakan ...
Pohajow, A. A. (Aan)
core
Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq +2 more
core +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
ABSTRACT This study investigates how ordinary Taiwanese netizens perform linguistic authority by policing others’ use of Mainland Chinese expressions in everyday online interactions not originally intended to be political and how such policing is subsequently supported, resisted, or (de)legitimized in the context of Taiwan–China relations. Three orders
Hsi‐Yao Su
wiley +1 more source
The internet is a source of mass communication all over the world. Cyber-crime is the most complicated and latest problem in the cyber world. The purpose of this paper is to determine the percentage of how many people exactly know what cyber-crime is ...
Sheikh Adnan Ahmed Usmani +1 more
doaj
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
HACKER DALAM PERSPEKTIF HUKUM INDONESIA
Hackeris a Cyber Crimes, often occurbut untilnowthere has been nolegalbasis of the mostpowerful tohandlethe cases, eventhe development of cybercrime in the world is getting fierce.
Bambang Hartono
doaj +1 more source

