Results 101 to 110 of about 55,932 (227)
Inducing Compliance: Shaping Audiences' Perceptions in China's Cyber Crime Enforcement
ABSTRACT Through case studies in the South Pacific and an examination of Chinese sources, this article examines two dimensions of China's cybercrime enforcement beyond its borders: how it manages to repatriate cybercriminals in the absence of formal extradition agreements, and why these repatriations are surrounded by a high degree of performativity ...
Graeme Smith
wiley +1 more source
Cyber Security’s Influence on Modern Society [PDF]
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core +1 more source
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children.
Susilowati Suparto +3 more
doaj +1 more source
The Vulnerability Of Young Women To Cybercrime: A Case Study In Penang
Norhayati Mat Ghani, Suriati Ghazali
openalex +1 more source
The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium [PDF]
The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the ...
Sussmann, Michael A.
core +1 more source
AN EXPLANATION OF THE CYBERCRIME VICTIMISATION: SELF-CONTROL AND LIFESTILE/ROUTINE ACTIVITY THEORY
The purpose of the current paper is to examine the causes of cybercrime victimisation, to highlight limitations of the existing cybercrime victimisation etiological studies and provide guidance for further research.
Aleksandar Ilievski
doaj +1 more source
Genetics Crime and Justice [PDF]
This review is unashamedly from the perspective of English law because busy United Kingdom criminal law solicitors and barristers mostly wish to know what the law states, which case is a precedent case and whether the author has provided up-to-date legal
Ramage, Sally
core
U.S./European Summit on Missing & Exploited Children [PDF]
In October 2005, representatives from 20 countries, the United Nations, European-Union institutions, and the Council of Europe participated in the first-ever U.S./European Summit on Missing and Exploited Children.
core
RANCANG BANGUN APLIKASI INFORMASI CYBERCRIME BERBASIS ANDROID [PDF]
Aplikasi berita mengenai cybercrime didunia maya mempunyai kelemahan berupa keaslian dan kelengkapan isi berita. Sehingga diperlukan sebuah system yang dapat tahan lama.
VITRIN WIJI SAPUTRA, 12111100025
core

