Results 101 to 110 of about 55,932 (227)

Inducing Compliance: Shaping Audiences' Perceptions in China's Cyber Crime Enforcement

open access: yesRegulation &Governance, Volume 20, Issue 1, Page 198-209, January 2026.
ABSTRACT Through case studies in the South Pacific and an examination of Chinese sources, this article examines two dimensions of China's cybercrime enforcement beyond its borders: how it manages to repatriate cybercriminals in the absence of formal extradition agreements, and why these repatriations are surrounded by a high degree of performativity ...
Graeme Smith
wiley   +1 more source

Cyber Security’s Influence on Modern Society [PDF]

open access: yes, 2020
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core   +1 more source

Consumer Protection of Girls from Cybercrime in a Gender Perspective

open access: yesJournal of Law and Legal Reform
Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children.
Susilowati Suparto   +3 more
doaj   +1 more source

The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium [PDF]

open access: yes, 1999
The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the ...
Sussmann, Michael A.
core   +1 more source

AN EXPLANATION OF THE CYBERCRIME VICTIMISATION: SELF-CONTROL AND LIFESTILE/ROUTINE ACTIVITY THEORY

open access: yesInnovative Issues and Approaches in Social Sciences, 2016
The purpose of the current paper is to examine the causes of cybercrime victimisation, to highlight limitations of the existing cybercrime victimisation etiological studies and provide guidance for further research.
Aleksandar Ilievski
doaj   +1 more source

Genetics Crime and Justice [PDF]

open access: yes, 2015
This review is unashamedly from the perspective of English law because busy United Kingdom criminal law solicitors and barristers mostly wish to know what the law states, which case is a precedent case and whether the author has provided up-to-date legal
Ramage, Sally
core  

U.S./European Summit on Missing & Exploited Children [PDF]

open access: yes, 2007
In October 2005, representatives from 20 countries, the United Nations, European-Union institutions, and the Council of Europe participated in the first-ever U.S./European Summit on Missing and Exploited Children.

core  

RANCANG BANGUN APLIKASI INFORMASI CYBERCRIME BERBASIS ANDROID [PDF]

open access: yes, 2017
Aplikasi berita mengenai cybercrime didunia maya mempunyai kelemahan berupa keaslian dan kelengkapan isi berita. Sehingga diperlukan sebuah system yang dapat tahan lama.
VITRIN WIJI SAPUTRA, 12111100025
core  

Home - About - Disclaimer - Privacy