Results 21 to 30 of about 1,938 (185)

Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime

open access: yesUnnes Law Journal, 2021
This research was conducted to explain the legal instrument governing Cyber terrorism from an organized transnational crime perspective as well as analyzing the modus operandi used by Cyber terrorism.
Okti Putri Andini
doaj   +1 more source

Prevalence and relationships of dating application usage, cyber-fraud and mental health among emerging adults in Hong Kong

open access: yesPsychiatry Research Communications
This study aimed to investigate the prevalence and relationships of cyber fraud on dating applications and mental health among emerging adults. An online survey was conducted in Hong Kong (n = 401). Results showed that 32% of the dating application users
Chee-kit Chan, Xin Wang, Xue Yang
doaj   +1 more source

Cybercrime as a New Object of Statistical Analysis

open access: yesСтатистика и экономика, 2021
A global trend in recent years is the so-called digitalization of crime, that is, the use of information technology as a means and instrument of crime.
A. E. Lyapin
doaj   +1 more source

Patterns and predictors of cyber fraud victimization: Testing routine activity theory and general theory of crime in Japan

open access: yesJournal of Economic Criminology
Although previous research on the predictors of cyber fraud victimization has provided evidence of the impact of routine activity and low self-control on the risk of cyber fraud victimization, little knowledge is available in Japan.
Ai Suzuki, Ko Shikata, Takahito Shimada
doaj   +1 more source

The psychology of the internet fraud victimization of older adults: A systematic review

open access: yesFrontiers in Psychology, 2022
Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there
Yuxi Shang   +6 more
doaj   +1 more source

Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj   +1 more source

Victims of cybercrime in Europe: a review of victim surveys

open access: yesCrime Science, 2018
Objectives Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime.
Carin M. M. Reep-van den Bergh   +1 more
doaj   +1 more source

An Action Management System Design and Case Study on Its Usage for Cyber Fraud Prevention and Risk Analysis

open access: yesJournal of Innovative Science and Engineering, 2021
Today, various types of devices are used to be connected to Internet at every moment of the life. This variety of devices present both benefits and problems to individuals and companies.
Abdulkadir BATTAL, Ruya SAMLI
doaj   +1 more source

Digital Technologies for Transparent and Sustainable Supply Chain Management: A Resource Orchestration‐Based View in the Textile Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy