Results 81 to 90 of about 90,875 (224)

Two theoretical dimensions of the cyber hate crime [PDF]

open access: yes, 2017
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core  

Regulating critical technologies: National security and intellectual property

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley   +1 more source

Personal Data Breaches by Online Loans as a Form of Cyber Crime

open access: yesThe Spirit of Society Journal: International Journal of Society Development and Engagement
The rapid growth of online lending platforms in Indonesia has accelerated financial inclusion while simultaneously generating new forms of cyber crime, particularly the unlawful collection, processing, and dissemination of personal data by illegal ...
Tjahjana Budiman
doaj   +1 more source

From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025

open access: yesMiddle East Policy, EarlyView.
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley   +1 more source

Technology Intercepts for Cyber Security Applied to Critical Infrastructures [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2017
The implementation of a cyber security system for critical infrastructures requires the extensive use and the targeted application of the most modern computer and communication technologies.
Mario La Manna
doaj  

Association of Adverse Childhood Experiences and Metabolic Syndrome: A Systematic Review and Meta‐Analysis

open access: yesObesity Reviews, EarlyView.
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim   +4 more
wiley   +1 more source

Computer Crime [PDF]

open access: yes, 2005
Computer crime can be categorized as crimes of "White Colar Crime", which operates inmore use of the mind or brain. Definition of Cyber crime is any act that harm others orcertain parties who performed on digital media or with the aid of digital ...
Ristyawati, R. (Ristyawati)
core  

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj   +1 more source

PERTANGGUNGJAWABAN LEMBAGA PERBANKAN TERHADAP PENCURIAN DATA NASABAH

open access: yesDialogia Iuridica, 2018
Cyber crime or cyber crime is basically an impact of technological developments that have changed the habit of the community that was originally conventional into a more modern habits or can be called a high technology society.
Lukmanul Hakim
doaj   +1 more source

Home - About - Disclaimer - Privacy