Results 21 to 30 of about 51,244 (207)
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core +3 more sources
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat +3 more
doaj +1 more source
EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core
Cybercrime on the Ethereum Blockchain
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total risk-taking after losing part of their wealth, leading to ...
Lars Hornuf +3 more
openaire +4 more sources
Did cybercrime cause the crime drop?
Recent studies have hypothesised that the international crime drop was the result of the rise in cybercrime. We subject this ‘cybercrime hypothesis’ to critical assessment.
Graham Farrell, Daniel Birks
doaj +1 more source
Cross-border Access to E-Evidence: Framing the Evidence. CEPS in Liberty and Security in Europe No. 2020-02, February 2020 [PDF]
This paper aims at situating the policy discourse accompanying current European Union (EU) initiatives on facilitating access by public authorities to data held by private companies, including in scenarios regarded as crossing jurisdictional borders ...
Fuster, Gloria González +1 more
core
Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core +2 more sources
Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley +1 more source
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee +2 more
doaj +1 more source
Automatically identifying the function and intent of posts in underground forums
The automatic classification of posts from hacking-related online forums is of potential value for the understanding of user behaviour in social networks relating to cybercrime.
Andrew Caines +3 more
doaj +1 more source

