Results 61 to 70 of about 1,938 (185)
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Defending Against Fraud: Cyber Fraud Detection and Prevention Techniques
The rapid expansion of digital payments, e-commerce and connected systems has intensified the risk of cyber fraud, spanning phishing, account takeover, financial fraud and IoT/ICS manipulation. This systematic review synthesizes evidence from 105 peer-reviewed studies published between 2015 and 2025, identified through Google Scholar, Web of Science ...
Lekgau, T +2 more
openaire +2 more sources
This essay will address the increasing significance of deepfakes and generative AI in the context of social engineering tactics, emphasizing their role as a developing danger in cyber fraud in the twenty-first century. Recent technological advances have
Yonni Albeiro Bermudez Bermudez
doaj +1 more source
KEABSAHAN ALAT BUKTI ELEKTRONIK DALAM UNDANG-UNDANG NO. 11 TAHON 2008
Transactions in cyber crime and activities of illegal business, such as; fraud, piracy, interception, cyber porn, cyber sex, face books, traffickings, gambling etc, hve been phenomenon and threatening the people in overseas.
Bunadi Hidayat
doaj +1 more source
Cyber Frauds, Scams and their Victims
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.
Button, Mark, Cross, Cassandra
openaire +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Criminal law regulation of cyber fraud crimes-from the perspective of citizens' personal information protection in the era of edge computing. [PDF]
Zhang Y, Dong H.
europepmc +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
A Real-Time Prescriptive Solution for Explainable Cyber-Fraud Detection Within the iGaming Industry. [PDF]
Farrugia D +4 more
europepmc +1 more source
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley +1 more source

