Results 101 to 110 of about 51,244 (207)

AN EXPLANATION OF THE CYBERCRIME VICTIMISATION: SELF-CONTROL AND LIFESTILE/ROUTINE ACTIVITY THEORY

open access: yesInnovative Issues and Approaches in Social Sciences, 2016
The purpose of the current paper is to examine the causes of cybercrime victimisation, to highlight limitations of the existing cybercrime victimisation etiological studies and provide guidance for further research.
Aleksandar Ilievski
doaj   +1 more source

Understanding cybercrime in Malaysia: an overview [PDF]

open access: yes, 2014
Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime.
Abdul Manaf, Azizah   +2 more
core  

The economic impact of cybercrime and cyber espionage [PDF]

open access: yes
Introduction Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?” The wide range of
James Andrew Lewis, Stewart Baker
core  

Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks

open access: yesApplied Sciences
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq   +2 more
doaj   +1 more source

MalwareLab: Experimentation with Cybercrime Attack Tools [PDF]

open access: yes, 2013
Cybercrime attack tools (i.e. Exploit Kits) are reportedly responsible for the majority of attacks affecting home users. Exploit kits are traded in the black markets at different prices and advertising different capabilities and functionalities.
Allodi, Luca   +2 more
core  

Global Cyber Intermediary Liability: A Legal & Cultural Strategy [PDF]

open access: yes, 2014
This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime.
Eonas, Anthony   +2 more
core   +1 more source

Illuminating the Dark Side of the Internet with Actor-Network Theory: An Integrative Review of Current Cybercrime Research [PDF]

open access: yesGlobal Media Journal: Canadian Edition, 2014
Cybercrime is a relatively new area of research within criminology and media studies. The purpose of this paper is to pull together current research scholarship at the intersection of Actor-Network Theory (ANT) and cybercrime by addressing the following ...
Rocci Luppicini
doaj  

INTERNATIONAL AND REGIONAL ORGANIZATIONS WITH ATTRIBUTES AND PREOCCUPATIONS IN PREVENTING AND FIGHTING AGAINST CYBERCRIME AND THEIR MAIN ACCOMPLISHMENTS [PDF]

open access: yes
At global level, there are various organizations which are constantly concerned with the analysis of the latest manifestations and evolution of cybercrime, setting up work groups to develop strategies for the prevention and fight of cybercrimes.
Gheorghe-Iulian Ioniţă   +1 more
core  

Conceptual and categorical apparatus of the state criminal and legal policy of countering cybercrimes

open access: yesЕкономіка, управління та адміністрування
The article comprehensively examines the formation and genesis of the conceptual and categorical apparatus of the state criminal and legal policy of countering cybercrimes.
S.V. Korzun
doaj   +1 more source

Asia-Pacific cyber insights [PDF]

open access: yes
This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 in April 2015.
Jessica Woodall, Klee Aiken
core  

Home - About - Disclaimer - Privacy