Results 31 to 40 of about 51,742 (230)

Patterns and predictors of cyber fraud victimization: Testing routine activity theory and general theory of crime in Japan

open access: yesJournal of Economic Criminology
Although previous research on the predictors of cyber fraud victimization has provided evidence of the impact of routine activity and low self-control on the risk of cyber fraud victimization, little knowledge is available in Japan.
Ai Suzuki, Ko Shikata, Takahito Shimada
doaj   +1 more source

The psychology of the internet fraud victimization of older adults: A systematic review

open access: yesFrontiers in Psychology, 2022
Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there
Yuxi Shang   +6 more
doaj   +1 more source

Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The aim of the study is to develop a mathematical model for determining the relationship between cyber victimhood and the character traits inherent in victims of cyber fraud.
I. V. Karpasyuk, A. I. Karpasyuk
doaj   +1 more source

Victims of cybercrime in Europe: a review of victim surveys

open access: yesCrime Science, 2018
Objectives Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime.
Carin M. M. Reep-van den Bergh   +1 more
doaj   +1 more source

An Action Management System Design and Case Study on Its Usage for Cyber Fraud Prevention and Risk Analysis

open access: yesJournal of Innovative Science and Engineering, 2021
Today, various types of devices are used to be connected to Internet at every moment of the life. This variety of devices present both benefits and problems to individuals and companies.
Abdulkadir BATTAL, Ruya SAMLI
doaj   +1 more source

Digital Technologies for Transparent and Sustainable Supply Chain Management: A Resource Orchestration‐Based View in the Textile Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley   +1 more source

Youth Identity, Peer Influence and Internet Crime Participation in Nigeria: A Reflection [PDF]

open access: yes, 2016
The increasing relevance of youth participation in the e-environment and invariably the use of cyber technology has been remarkably accentuated by many scholars. Lately, the affinity inherent in the triad of youth, cyber technology and e-business banding
Elegbeleye, A.   +2 more
core  

Artificial Intelligence–Driven and Digital Practices for Circular Business and Finance: Insights for Advancing Hubs for Circularity

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The emerging concept of Hubs for Circularity (H4Cs) presents an opportunity to create collaborative, self‐sustaining regional industrial ecosystems that drive circular economy transitions at scale. However, the operationalisation of H4Cs faces financial, organisational and data‐driven challenges.
Aditya Tripathi   +3 more
wiley   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

open access: yes, 2010
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy