Results 81 to 90 of about 51,742 (230)

KEABSAHAN ALAT BUKTI ELEKTRONIK DALAM UNDANG-UNDANG NO. 11 TAHON 2008

open access: yesMasalah-Masalah Hukum, 2011
Transactions in cyber crime and activities of illegal business, such as; fraud, piracy, interception, cyber porn, cyber sex, face books, traffickings, gambling etc, hve been phenomenon and threatening the people in overseas.
Bunadi Hidayat
doaj   +1 more source

Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe

open access: yesRisk Governance and Control: Financial Markets and Institutions, 2014
The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis.
openaire   +1 more source

CYBER FRAUD, GLOBAL TRADE AND YOUTH CRIME BURDEN: NIGERIAN EXPERIENCE [PDF]

open access: yes, 2014
This paper examines the relationship between modern technology and the multiplicity of fraud. Specifically, it argues that the involvements of sizeable Nigerians in crime is not empirically tied to their dispositions and psychopathologies, these ...
Jegede, A. E.
core  

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

Defending Against Fraud: Cyber Fraud Detection and Prevention Techniques

open access: yes
The rapid expansion of digital payments, e-commerce and connected systems has intensified the risk of cyber fraud, spanning phishing, account takeover, financial fraud and IoT/ICS manipulation. This systematic review synthesizes evidence from 105 peer-reviewed studies published between 2015 and 2025, identified through Google Scholar, Web of Science ...
Lekgau, T   +2 more
openaire   +2 more sources

Deepfakes and artificial intelligence in social engineering: Emerging threats in 21st-century cyberfraud

open access: yesRevista IUSTA
This essay will address the increasing significance of deepfakes and generative AI in the context of social engineering tactics, emphasizing their role as a developing danger in cyber fraud in the twenty-first century. Recent technological advances have
Yonni Albeiro Bermudez Bermudez
doaj   +1 more source

Cyber Frauds, Scams and their Victims

open access: yes, 2017
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.
Button, Mark, Cross, Cassandra
openaire   +1 more source

Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley   +1 more source

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]

open access: yes, 2017
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric   +2 more
core  

Home - About - Disclaimer - Privacy