Results 61 to 70 of about 1,938 (185)

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Defending Against Fraud: Cyber Fraud Detection and Prevention Techniques

open access: yes
The rapid expansion of digital payments, e-commerce and connected systems has intensified the risk of cyber fraud, spanning phishing, account takeover, financial fraud and IoT/ICS manipulation. This systematic review synthesizes evidence from 105 peer-reviewed studies published between 2015 and 2025, identified through Google Scholar, Web of Science ...
Lekgau, T   +2 more
openaire   +2 more sources

Deepfakes and artificial intelligence in social engineering: Emerging threats in 21st-century cyberfraud

open access: yesRevista IUSTA
This essay will address the increasing significance of deepfakes and generative AI in the context of social engineering tactics, emphasizing their role as a developing danger in cyber fraud in the twenty-first century. Recent technological advances have
Yonni Albeiro Bermudez Bermudez
doaj   +1 more source

KEABSAHAN ALAT BUKTI ELEKTRONIK DALAM UNDANG-UNDANG NO. 11 TAHON 2008

open access: yesMasalah-Masalah Hukum, 2011
Transactions in cyber crime and activities of illegal business, such as; fraud, piracy, interception, cyber porn, cyber sex, face books, traffickings, gambling etc, hve been phenomenon and threatening the people in overseas.
Bunadi Hidayat
doaj   +1 more source

Cyber Frauds, Scams and their Victims

open access: yes, 2017
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.
Button, Mark, Cross, Cassandra
openaire   +1 more source

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley   +1 more source

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Home - About - Disclaimer - Privacy