Results 11 to 20 of about 51,742 (230)
Predicting susceptibility to cyber-fraud victimhood [PDF]
Purpose This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood. Design/methodology/approach A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud.
openaire +3 more sources
Deconstructing a form of hybrid investment fraud: Examining ‘pig butchering’ in the United States
Cyber-enabled fraud has transformed, becoming more complex and making it harder for targets and law enforcement to detect its occurrence. This study aims to recontextualize a major manifestation of this transformation, a crime called hybrid investment ...
Marie-Helen Maras, Emily R. Ives
doaj +3 more sources
Building centaur responders: is emergency management ready for artificial intelligence? [PDF]
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Whyte C, Haupt B'.
europepmc +2 more sources
This study critically analyzes the formulation of criminal offenses related to fraud in the revised Penal Code (KUHP) within the context of contemporary technological advancements.
Abdul Wahid
doaj +1 more source
Cyber-pseudepigraphy: A New Challenge for Higher Education Policy and Management [PDF]
There is no lack of critical literature dealing with cyber-plagiarism and the implications for assessment in higher education. The practice of the selling of academic papers through the Internet is generally included under the category of plagiarism ...
Anderson GL +3 more
core +2 more sources
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources
The role of the chartered accountant in diminishing the effects of cyber fraud [PDF]
In 2017, CERT-RO processed over 138 million cyber security alerts and an exponential increase in cyber fraud is expected. By its nature, the financial sector is in danger, registering an alarming growth in recent years, and about 70% of fraud remains ...
Elena-Simona Tache (Buzățoiu) +2 more
doaj
In last three decades the attacks against the personal information, social information and financial information become more frequent and sophisticated. Initially, the purpose of cyber attack was the entertainment but as scenario has changed, internet is now seen as wonderful tool to conduct fraud or to grasp the information about anyone else.
Deepak Kumar Verma, Rajesh Kumar Goutam
openaire +1 more source
Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World [PDF]
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in ...
Wilton, Conrad
core +2 more sources
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source

