ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core
Understanding variation in juvenile life without parole legislation following Miller
Abstract Research Summary Miller v. Alabama and Montgomery v. Louisiana restricted states’ ability to impose life without parole for youth under age 18 (henceforth JLWOP). Since Miller, 46 pieces of legislation across 34 states and the District of Columbia have altered JLWOP sentencing policies.
Leah Ouellet +8 more
wiley +1 more source
International Cooperation of Member Nations of the CIS on Counteracting Cybercrime
Cybercrime is the threat to national and international informational security. The objects of cyberthreats are economics security, critical information structure, information state sovereignty.
O. I. Lepeshkina
doaj +1 more source
The Legal Policy of Criminal Justice Bureaucracy Cybercrime
Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of ...
Agus Raharjo +3 more
doaj +1 more source
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie +7 more
core +2 more sources
Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley +1 more source
Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia [PDF]
Igor Bernik +2 more
openalex +1 more source
Global Cyber Intermediary Liability: A Legal & Cultural Strategy [PDF]
This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime.
Eonas, Anthony +2 more
core +1 more source
Unpacking China's Digital Ascent in the Global South: The Case of Huawei in North Africa
ABSTRACT Despite frequent concerns in Western policy and media circles about the risks of using Chinese telecommunications suppliers, firms like Huawei have encountered little resistance from governments or citizens in the Global South. Empirical research explaining this acceptance remains limited.
Tin Hinane El Kadi
wiley +1 more source

