Results 21 to 30 of about 51,742 (230)

Factors influencing the effectiveness of credit card fraud prevention in Indonesian issuing banks [PDF]

open access: yesBanks and Bank Systems, 2023
The increase in online credit card transactions in the digital era has caused an increase in credit card cyber incidents. This is happening globally, including in Indonesia.
Yuli Dewi   +3 more
doaj   +1 more source

Cyber Security: Cyber Fraud on Carding: A Review

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2021
This chapter provides one person case study of Mr. Dan DeFilippi who was arrested for master card fraud by the US u. s. SS in December 2004. The episode delves into the psychology of a cybercriminal and also the inside workings of master card fraud. A background context of master card fraud is presented to border the first interview.
openaire   +1 more source

Assorted Aspects and Implementation Patterns of Artificial Intelligence to Reduce Cyber Crimes

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Cyber crime was a major problem even before the epidemic, and it skyrocketed as the globe became increasingly digital after the pandemic began. It is crucial to think about how to make the web safer in the post-pandemic period, since the number of cyber
Prof. Dr. M . Randles
doaj   +1 more source

Cyber-Fraud is One Typo Away [PDF]

open access: yes2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications, 2008
Spelling errors when typing a URL can be exploited by website-squatters: users are led to phony sites in a phenomenon we call parasitic URL naming. These phony sites imitate popular websites and try to extract personal information from unsuspecting users, or simply advertise and sell products to users. In this paper, we conduct a massive study in order
A. Banerjee   +3 more
openaire   +1 more source

The Fraud Act 2006 : The E-crime Prosecutor’s Champion or the Creator of a New Inchoate Offence? [PDF]

open access: yes, 2007
An analysis of whether the Fraud Act 2006 is sufficently rebust to be able to tackle the challenges of e-crimePeer reviewedFinal Accepted ...
Johnson, Maureen, Rogers, Kevin M.
core   +1 more source

Fraud in Academic Publishing: Researchers Under Cyber-Attacks [PDF]

open access: yesThe American Journal of Medicine, 2017
Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors.
Mehdi, Dadkhah   +2 more
openaire   +2 more sources

Cybercrime as a New Object of Statistical Analysis

open access: yesСтатистика и экономика, 2021
A global trend in recent years is the so-called digitalization of crime, that is, the use of information technology as a means and instrument of crime.
A. E. Lyapin
doaj   +1 more source

Crime scripting: A systematic review [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core   +1 more source

Prevalence and relationships of dating application usage, cyber-fraud and mental health among emerging adults in Hong Kong

open access: yesPsychiatry Research Communications
This study aimed to investigate the prevalence and relationships of cyber fraud on dating applications and mental health among emerging adults. An online survey was conducted in Hong Kong (n = 401). Results showed that 32% of the dating application users
Chee-kit Chan, Xin Wang, Xue Yang
doaj   +1 more source

Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime

open access: yesUnnes Law Journal, 2021
This research was conducted to explain the legal instrument governing Cyber terrorism from an organized transnational crime perspective as well as analyzing the modus operandi used by Cyber terrorism.
Okti Putri Andini
doaj   +1 more source

Home - About - Disclaimer - Privacy