Results 61 to 70 of about 51,742 (230)

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

The impact of COVID-19 lockdown on fraud in the UK

open access: yesHumanities & Social Sciences Communications
The COVID-19 pandemic profoundly altered socio-economic activities, human behaviors, and crime patterns. However, less is known about how the pandemic and associated restrictions affected cyber-enabled and traditional fraud.
Shuai Chen   +9 more
doaj   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Online Romance Fraud as a Form of Emotional and Economic Partner Violence: A Social-Ecological Framework of Enabling Factors

open access: yesNordic Journal of Studies in Policing
Online romance fraud (ORF) is a complex form of cyber-enabled fraud, characterised by manipulative techniques and dynamics akin to those observed in domestic violence, coercive control, and intimate partner violence.
Maja Feng
doaj   +1 more source

Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar

open access: yesDevelopment and Change, EarlyView.
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley   +1 more source

The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]

open access: yes, 2018
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core   +1 more source

PIN generation using EEG : a stability study [PDF]

open access: yes, 2014
In a previous study, it has been shown that brain activity, i.e. electroencephalogram (EEG) signals, can be used to generate personal identification number (PIN). The method was based on brain–computer interface (BCI) technology using a P300-based BCI
Palaniappan, Ramaswamy, Revett, Kenneth
core   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

Co‐Designing and Evaluating a Digital Competencies Toolkit for Nursing Students

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim To offer a student‐focused critical evaluation of the content and use of a digital competencies discipline‐specific toolkit that was co‐designed with students, offering ideas for training and development across several digital skills areas, such as digital creation, research, communication, innovation, and wellbeing.
Konstantina Martzoukou   +3 more
wiley   +1 more source

Le Combat contre la Criminalite Informatique dans le Contexte Europeen

open access: yesEIRP Proceedings, 2009
The article tackles the issue of cyber crime. Moreover, speaks about computer fraud, as a part ofcriminal activities wich cyber crime, generally known as computer crime, e-crime, hi-tech crime or electroniccrime too, refers to.
Nadina Velicu, Marcel Podască
doaj  

Home - About - Disclaimer - Privacy