Results 81 to 90 of about 90,875 (224)
Two theoretical dimensions of the cyber hate crime [PDF]
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Personal Data Breaches by Online Loans as a Form of Cyber Crime
The rapid growth of online lending platforms in Indonesia has accelerated financial inclusion while simultaneously generating new forms of cyber crime, particularly the unlawful collection, processing, and dissemination of personal data by illegal ...
Tjahjana Budiman
doaj +1 more source
From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley +1 more source
Technology Intercepts for Cyber Security Applied to Critical Infrastructures [PDF]
The implementation of a cyber security system for critical infrastructures requires the extensive use and the targeted application of the most modern computer and communication technologies.
Mario La Manna
doaj
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source
Computer crime can be categorized as crimes of "White Colar Crime", which operates inmore use of the mind or brain. Definition of Cyber crime is any act that harm others orcertain parties who performed on digital media or with the aid of digital ...
Ristyawati, R. (Ristyawati)
core
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj +1 more source
PERTANGGUNGJAWABAN LEMBAGA PERBANKAN TERHADAP PENCURIAN DATA NASABAH
Cyber crime or cyber crime is basically an impact of technological developments that have changed the habit of the community that was originally conventional into a more modern habits or can be called a high technology society.
Lukmanul Hakim
doaj +1 more source

