Results 61 to 70 of about 51,742 (230)
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
The impact of COVID-19 lockdown on fraud in the UK
The COVID-19 pandemic profoundly altered socio-economic activities, human behaviors, and crime patterns. However, less is known about how the pandemic and associated restrictions affected cyber-enabled and traditional fraud.
Shuai Chen +9 more
doaj +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Online romance fraud (ORF) is a complex form of cyber-enabled fraud, characterised by manipulative techniques and dynamics akin to those observed in domestic violence, coercive control, and intimate partner violence.
Maja Feng
doaj +1 more source
Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley +1 more source
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
PIN generation using EEG : a stability study [PDF]
In a previous study, it has been shown that brain activity, i.e. electroencephalogram (EEG) signals, can be used to generate personal identification number (PIN). The method was based on brain–computer interface (BCI) technology using a P300-based BCI
Palaniappan, Ramaswamy, Revett, Kenneth
core +1 more source
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
Co‐Designing and Evaluating a Digital Competencies Toolkit for Nursing Students
ABSTRACT Aim To offer a student‐focused critical evaluation of the content and use of a digital competencies discipline‐specific toolkit that was co‐designed with students, offering ideas for training and development across several digital skills areas, such as digital creation, research, communication, innovation, and wellbeing.
Konstantina Martzoukou +3 more
wiley +1 more source
Le Combat contre la Criminalite Informatique dans le Contexte Europeen
The article tackles the issue of cyber crime. Moreover, speaks about computer fraud, as a part ofcriminal activities wich cyber crime, generally known as computer crime, e-crime, hi-tech crime or electroniccrime too, refers to.
Nadina Velicu, Marcel Podască
doaj

