Results 21 to 30 of about 51,244 (207)

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication

open access: yesSensors, 2020
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat   +3 more
doaj   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Cybercrime on the Ethereum Blockchain

open access: yesSSRN Electronic Journal, 2023
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total risk-taking after losing part of their wealth, leading to ...
Lars Hornuf   +3 more
openaire   +4 more sources

Did cybercrime cause the crime drop?

open access: yesCrime Science, 2018
Recent studies have hypothesised that the international crime drop was the result of the rise in cybercrime. We subject this ‘cybercrime hypothesis’ to critical assessment.
Graham Farrell, Daniel Birks
doaj   +1 more source

Cross-border Access to E-Evidence: Framing the Evidence. CEPS in Liberty and Security in Europe No. 2020-02, February 2020 [PDF]

open access: yes, 2020
This paper aims at situating the policy discourse accompanying current European Union (EU) initiatives on facilitating access by public authorities to data held by private companies, including in scenarios regarded as crossing jurisdictional borders ...
Fuster, Gloria González   +1 more
core  

Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]

open access: yes, 2020
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core   +2 more sources

Unlocking the Future of Insurance: The Power of Open Data, Digital Transformation, and Human Talent

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite rapid technological advancement in insurance, there remains a critical gap in understanding how open data initiatives affect employee digital competencies and organizational transformation. This research investigates this relationship through a systematic review of 51 scholarly articles published between 2018 and 2024, using structured
Narongsak Sukma, Siriporn Yamnill
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

Automatically identifying the function and intent of posts in underground forums

open access: yesCrime Science, 2018
The automatic classification of posts from hacking-related online forums is of potential value for the understanding of user behaviour in social networks relating to cybercrime.
Andrew Caines   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy