Results 31 to 40 of about 51,244 (207)
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Ransomware attacks pose a serious threat to computer networks, causing widespread disruption to individual, corporate, governmental, and critical national infrastructures.
Sarah Alhuwayshil +2 more
doaj +1 more source
Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana [PDF]
The purpose of this study was to explore the prevalence and primary causes of cybercrime in Agona Swedru. Using a quantitative research survey and a simple random sampling technique, 397 individuals were surveyed.
Charles Obeng +3 more
doaj +1 more source
Exploring cybercrime – realities and challenges [PDF]
Cybercrime is a global, transnational serious problem that needs strong technical and legal responses. The information represents an important asset that must be secured and properly used as it provides the support for value creation and sustainable ...
Victoria Stanciu, Andrei Tinca
doaj +1 more source
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Exploring illicit personal information trading behind telecom fraud in China
Illicit personal information trading, a hallmark of internet dark and gray industries, has deeply infiltrated the global criminal economic system, serving as a critical driver and “raw material factory” for numerous offenses.
Guangxuan Chen +3 more
doaj +1 more source
Reflections on Comparative Teaching in Public Administration
ABSTRACT This article integrates our scholarly experience of teaching comparative public administration. In doing so, we offer a unique perspective as the co‐authors carry several diverse attributes, among them their countries of origin, current country in which they are teaching, and their academic experience.
Kim Moloney +6 more
wiley +1 more source
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley +1 more source
—The literature on 5G design and architecture numbers in the hundreds of thousands, which makes analyzing this vast corpus of technical knowledge impossible within the scope of a single article.
R. Andrew Paskauskas
doaj +1 more source
On the use of serious games technology to facilitate large-scale training in cybercrime response [PDF]
As technology becomes pervasive in everyday life, there are very few crimes that don’t have some ‘cyber’ element to them. The vast majority of crime now has some digital footprint; whether it’s from a CCTV camera, mobile phone or IoT device, there exists
Coull, Natalie +7 more
core

