Results 71 to 80 of about 90,875 (224)

Implementasi Penyidikan Tindak Pidana Cyber Crime Berkaitan dengan Penjualan Barang yang Tidak Sesuai dengan Perjanjian dalam Rangka Perlindungan Konsumen (Studi di Polda Jawa Timur) [PDF]

open access: yes, 2013
SIArtikel ini membahas mengenai dua masalah. Masalah pertama yang dibahas adalah mengenai bentuk implementasi penyidikan tindak pidana cyber crime berkaitan dengan penjualan barang yang tidak sesuai perjanjian dalam rangka perlindungan konsumen yang ...
Astuti, D. P. (Dwi)
core   +1 more source

CEO social media activity and insider trading

open access: yesJournal of Financial Research, EarlyView.
Abstract This article studies the relationship between CEOs' social media activity and their insider trading behavior. Drawing on psychological evidence linking online activity to risk‐taking, we find that active CEOs on social media exhibit higher risk preferences and engage more in insider trading—particularly in terms of incidence, intensity, and ...
Zhichuan Li   +2 more
wiley   +1 more source

Le Combat contre la Criminalite Informatique dans le Contexte Europeen

open access: yesEIRP Proceedings, 2009
The article tackles the issue of cyber crime. Moreover, speaks about computer fraud, as a part ofcriminal activities wich cyber crime, generally known as computer crime, e-crime, hi-tech crime or electroniccrime too, refers to.
Nadina Velicu, Marcel Podască
doaj  

Pembuktian Terhadap Kejahatan Dunia Maya Dan Upaya Mengatasinya Menurut Hukum Positif Di Indonesia [PDF]

open access: yes, 2016
Tujuan dilakukannya penelitian ini adalah untuk mengetahui apakah kendala yuridis dalam pembuktian kejahatan dunia maya (cyber crime) dan bagaimanakah upaya mengatasi tindak pidana cyber crime menurut hukum positif Indonesia, yang dengan menggunakan ...
Pohajow, A. A. (Aan)
core  

Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]

open access: yes, 2017
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq   +2 more
core   +1 more source

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

(De)Legitimizing Language Policing: Enregisterment and Linguistic Authority in Taiwan's Digital Public

open access: yesJournal of Sociolinguistics, EarlyView.
ABSTRACT This study investigates how ordinary Taiwanese netizens perform linguistic authority by policing others’ use of Mainland Chinese expressions in everyday online interactions not originally intended to be political and how such policing is subsequently supported, resisted, or (de)legitimized in the context of Taiwan–China relations. Three orders
Hsi‐Yao Su
wiley   +1 more source

Cyber Crimes, Their Impacts On The Users Of The Face Book And Prevention From Them In The Light Of Quran And Hadith

open access: yesThe Islamic Culture, 2019
The internet is a source of mass communication all over the world. Cyber-crime is the most complicated and latest problem in the cyber world. The purpose of this paper is to determine the percentage of how many people exactly know what cyber-crime is ...
Sheikh Adnan Ahmed Usmani   +1 more
doaj  

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

HACKER DALAM PERSPEKTIF HUKUM INDONESIA

open access: yesMasalah-Masalah Hukum, 2014
Hackeris a Cyber Crimes, often occurbut untilnowthere has been nolegalbasis of the mostpowerful tohandlethe cases, eventhe development of cybercrime in the world is getting fierce.
Bambang Hartono
doaj   +1 more source

Home - About - Disclaimer - Privacy