Results 51 to 60 of about 51,742 (230)

1st International Workshop on Search and Mining Terrorist Online Content and Advances in Data Science for Cyber Security and Risk on the Web [PDF]

open access: yes, 2017
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on
Akhgar, B.   +5 more
core   +1 more source

Conceptualizing and measuring consumers’ negative attitudes towards online shopping

open access: yesBritish Journal of Management, EarlyView.
Abstract Despite the advantages of online shopping, increasing evidence indicates the prevalence of negative consumer attitudes towards online shopping (NATOS). Yet existing research exhibits a nearly exclusive focus on measuring positive attitudes, creating limited conceptual breadth. Moreover, despite the existence of conceptually related constructs (
Kaj‐Johanna Stichnoth   +1 more
wiley   +1 more source

Forgery in Cyberspace: The Spoof Could Be on You! [PDF]

open access: yes, 2004
Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer ...
Austria, Stephanie
core   +3 more sources

(Dis)trust in Digital Insurance: How Datafied Practices Shift Uncertainties and Reconfigure Trust Relations

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Trust is both a prerequisite and a product of insurance, as insurance contracts are built on and create trust relations that enable a risk‐averse perspective towards the future. At the same time, insurer‐policyholder relationships are characterised by a persistent distrust, rooted in insurance economics and industry reputation. In this article,
Maiju Tanninen, Gert Meyers
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

The Correlation between Social Media Use and Cyber Victimization: A Research on Generation Z in Turkey

open access: yesConnectist Istanbul University Journal of Communication Sciences, 2021
Although social media usage has many advantages, it also brings many risks. Anger, hate and bullying actions by individuals are frequently encountered on social media platforms today.
Murat Erdoğdu, Murat Koçyiğit
doaj   +1 more source

Machine Learning-Based Cyber Fraud Detection: A Comparative Study of Resampling Methods for Imbalanced Credit Card Data

open access: yesApplied Sciences
The prevalence of online transactions and extensive adoption of credit card payments have contributed to the escalation of credit card cyber fraud in modern society.
Eyad Btoush   +3 more
doaj   +1 more source

Crime and gambling: a brief overview of gambling fraud on the Internet. [PDF]

open access: yes, 2010
Although there is an association between crime and gambling there is relatively little information and research on the topic. One area that appears to have become more prevalent over the last five years is that of fraudulent gambling activities on the ...
Griffiths, MD
core  

Collaborating Across Boundaries: Toward an Integrated Cyber Risk Assessment by Internal Auditors and Cybersecurity Professionals Collaboration interprofessionnelle : vers une évaluation intégrée des cyberrisques par les auditeurs internes et les spécialistes en cybersécurité

open access: yesContemporary Accounting Research, EarlyView.
ABSTRACT Although cyber risk is widely recognized as a critical organizational threat, how firms configure internal roles and practices to address it remains poorly understood. This study offers insights into that question. In practice, two professional roles share the job of cyber risk assessment and assurance: cybersecurity specialists, who focus on ...
Sergeja Slapničar   +3 more
wiley   +1 more source

Policing Online Pharmacies: Bioterrorism Meets the War on Drugs [PDF]

open access: yes, 2001
In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones.
Sweet, Mark
core   +1 more source

Home - About - Disclaimer - Privacy