Results 31 to 40 of about 51,244 (207)

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Enhancing Ransomware Threat Detection: Risk-Aware Classification via Windows API Call Analysis and Hybrid ML/DL Models

open access: yesJournal of Cybersecurity and Privacy
Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures.
Sarah Alhuwayshil   +2 more
doaj   +1 more source

Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana [PDF]

open access: yesE-Journal of Humanities, Arts and Social Sciences
The purpose of this study was to explore the prevalence and primary causes of cybercrime in Agona Swedru. Using a quantitative research survey and a simple random sampling technique, 397 individuals were surveyed.
Charles Obeng   +3 more
doaj   +1 more source

Exploring cybercrime – realities and challenges [PDF]

open access: yesContabilitate şi Informatică de Gestiune, 2017
Cybercrime is a global, transnational serious problem that needs strong technical and legal responses. The information represents an important asset that must be secured and properly used as it provides the support for value creation and sustainable ...
Victoria Stanciu, Andrei Tinca
doaj   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Exploring illicit personal information trading behind telecom fraud in China

open access: yesHumanities & Social Sciences Communications
Illicit personal information trading, a hallmark of internet dark and gray industries, has deeply infiltrated the global criminal economic system, serving as a critical driver and “raw material factory” for numerous offenses.
Guangxuan Chen   +3 more
doaj   +1 more source

Reflections on Comparative Teaching in Public Administration

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article integrates our scholarly experience of teaching comparative public administration. In doing so, we offer a unique perspective as the co‐authors carry several diverse attributes, among them their countries of origin, current country in which they are teaching, and their academic experience.
Kim Moloney   +6 more
wiley   +1 more source

Preserving evidence integrity in full file system extractions: Assessing hash inconsistencies and potential solutions

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley   +1 more source

ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations [version 2; peer review: 2 approved, 1 approved with reservations]

open access: yesOpen Research Europe, 2023
—The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article.
R. Andrew Paskauskas
doaj   +1 more source

On the use of serious games technology to facilitate large-scale training in cybercrime response [PDF]

open access: yes, 2017
As technology becomes pervasive in everyday life, there are very few crimes that don’t have some ‘cyber’ element to them. The vast majority of crime now has some digital footprint; whether it’s from a CCTV camera, mobile phone or IoT device, there exists
Coull, Natalie   +7 more
core  

Home - About - Disclaimer - Privacy