Results 51 to 60 of about 51,742 (230)
1st International Workshop on Search and Mining Terrorist Online Content and Advances in Data Science for Cyber Security and Risk on the Web [PDF]
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on
Akhgar, B. +5 more
core +1 more source
Conceptualizing and measuring consumers’ negative attitudes towards online shopping
Abstract Despite the advantages of online shopping, increasing evidence indicates the prevalence of negative consumer attitudes towards online shopping (NATOS). Yet existing research exhibits a nearly exclusive focus on measuring positive attitudes, creating limited conceptual breadth. Moreover, despite the existence of conceptually related constructs (
Kaj‐Johanna Stichnoth +1 more
wiley +1 more source
Forgery in Cyberspace: The Spoof Could Be on You! [PDF]
Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer ...
Austria, Stephanie
core +3 more sources
ABSTRACT Trust is both a prerequisite and a product of insurance, as insurance contracts are built on and create trust relations that enable a risk‐averse perspective towards the future. At the same time, insurer‐policyholder relationships are characterised by a persistent distrust, rooted in insurance economics and industry reputation. In this article,
Maiju Tanninen, Gert Meyers
wiley +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Although social media usage has many advantages, it also brings many risks. Anger, hate and bullying actions by individuals are frequently encountered on social media platforms today.
Murat Erdoğdu, Murat Koçyiğit
doaj +1 more source
The prevalence of online transactions and extensive adoption of credit card payments have contributed to the escalation of credit card cyber fraud in modern society.
Eyad Btoush +3 more
doaj +1 more source
Crime and gambling: a brief overview of gambling fraud on the Internet. [PDF]
Although there is an association between crime and gambling there is relatively little information and research on the topic. One area that appears to have become more prevalent over the last five years is that of fraudulent gambling activities on the ...
Griffiths, MD
core
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar +3 more
wiley +1 more source
Policing Online Pharmacies: Bioterrorism Meets the War on Drugs [PDF]
In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones.
Sweet, Mark
core +1 more source

