Results 31 to 40 of about 2,468 (138)

International Cooperation of Member Nations of the CIS on Counteracting Cybercrime

open access: yesЕвразийская интеграция: экономика, право, политика
Cybercrime   is  the   threat  to  national  and  international  informational  security.  The  objects  of cyberthreats are economics security, critical information structure, information state sovereignty.
O. I. Lepeshkina
doaj   +1 more source

The Legal Policy of Criminal Justice Bureaucracy Cybercrime

open access: yesBestuur, 2022
Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of ...
Agus Raharjo   +3 more
doaj   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Here there be Dragons: Evolution, Potentials and Mitigation Opportunities of Cybercrime in Nigeria

open access: yesJournal of Central and Eastern European African Studies
The world is becoming increasingly interconnected due to advancements in technology and the adoption of the internet. The once widely used traditional forms of communication such as parcels have become unpopular.
Attila Mate Kovacs
doaj   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Risky online behaviors and cybercrime awareness among undergraduate students at Al Quds University: a cross sectional study

open access: yesCrime Science
The rate of cybercrime among Palestinian university students is unknown. This study is the first to examine cybercrime awareness among Palestinian undergraduate students. A cross-sectional design was used to investigate cybercrime awareness, risky online
Muna Ahmead   +2 more
doaj   +1 more source

Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley   +1 more source

Legislative Policy of the Republic Islamic of Iran on Cybercrime [PDF]

open access: yesInternational Multidisciplinary Journal of Pure Life, 2019
With the advancement of technology and the use of computers in all economic, military, and social affairs, various crimes can occur in the field of computers; therefore, the legislature passed the Law on Cybercrime in 56 articles in 2009 to prevent and ...
Dr. Soheil Zolfaghari (Iran)   +1 more
doaj   +1 more source

Unpacking China's Digital Ascent in the Global South: The Case of Huawei in North Africa

open access: yesGlobal Policy, EarlyView.
ABSTRACT Despite frequent concerns in Western policy and media circles about the risks of using Chinese telecommunications suppliers, firms like Huawei have encountered little resistance from governments or citizens in the Global South. Empirical research explaining this acceptance remains limited.
Tin Hinane El Kadi
wiley   +1 more source

Home - About - Disclaimer - Privacy