Results 31 to 40 of about 55,932 (227)

Enhancing Ransomware Threat Detection: Risk-Aware Classification via Windows API Call Analysis and Hybrid ML/DL Models

open access: yesJournal of Cybersecurity and Privacy
Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures.
Sarah Alhuwayshil   +2 more
doaj   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Exploring illicit personal information trading behind telecom fraud in China

open access: yesHumanities & Social Sciences Communications
Illicit personal information trading, a hallmark of internet dark and gray industries, has deeply infiltrated the global criminal economic system, serving as a critical driver and “raw material factory” for numerous offenses.
Guangxuan Chen   +3 more
doaj   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Reflections on Comparative Teaching in Public Administration

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article integrates our scholarly experience of teaching comparative public administration. In doing so, we offer a unique perspective as the co‐authors carry several diverse attributes, among them their countries of origin, current country in which they are teaching, and their academic experience.
Kim Moloney   +6 more
wiley   +1 more source

Exploring cybercrime – realities and challenges [PDF]

open access: yesContabilitate şi Informatică de Gestiune, 2017
Cybercrime is a global, transnational serious problem that needs strong technical and legal responses. The information represents an important asset that must be secured and properly used as it provides the support for value creation and sustainable ...
Victoria Stanciu, Andrei Tinca
doaj   +1 more source

Regulating hate speech online [PDF]

open access: yes, 2010
The exponential growth in the Internet as a means of communication has been emulated by an increase in far-right and extremist web sites and hate based activity in cyberspace.
Banks, James
core   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana [PDF]

open access: yesE-Journal of Humanities, Arts and Social Sciences
The purpose of this study was to explore the prevalence and primary causes of cybercrime in Agona Swedru. Using a quantitative research survey and a simple random sampling technique, 397 individuals were surveyed.
Charles Obeng   +3 more
doaj   +1 more source

Cross-border Access to E-Evidence: Framing the Evidence. CEPS in Liberty and Security in Europe No. 2020-02, February 2020 [PDF]

open access: yes, 2020
This paper aims at situating the policy discourse accompanying current European Union (EU) initiatives on facilitating access by public authorities to data held by private companies, including in scenarios regarded as crossing jurisdictional borders ...
Fuster, Gloria González   +1 more
core  

Home - About - Disclaimer - Privacy