Results 41 to 50 of about 55,932 (227)

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]

open access: yes, 2008
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core  

Understanding variation in juvenile life without parole legislation following Miller

open access: yesCriminology &Public Policy, EarlyView.
Abstract Research Summary Miller v. Alabama and Montgomery v. Louisiana restricted states’ ability to impose life without parole for youth under age 18 (henceforth JLWOP). Since Miller, 46 pieces of legislation across 34 states and the District of Columbia have altered JLWOP sentencing policies.
Leah Ouellet   +8 more
wiley   +1 more source

International Cooperation of Member Nations of the CIS on Counteracting Cybercrime

open access: yesЕвразийская интеграция: экономика, право, политика
Cybercrime   is  the   threat  to  national  and  international  informational  security.  The  objects  of cyberthreats are economics security, critical information structure, information state sovereignty.
O. I. Lepeshkina
doaj   +1 more source

The Legal Policy of Criminal Justice Bureaucracy Cybercrime

open access: yesBestuur, 2022
Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of ...
Agus Raharjo   +3 more
doaj   +1 more source

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley   +1 more source

Global Cyber Intermediary Liability: A Legal & Cultural Strategy [PDF]

open access: yes, 2014
This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime.
Eonas, Anthony   +2 more
core   +1 more source

Unpacking China's Digital Ascent in the Global South: The Case of Huawei in North Africa

open access: yesGlobal Policy, EarlyView.
ABSTRACT Despite frequent concerns in Western policy and media circles about the risks of using Chinese telecommunications suppliers, firms like Huawei have encountered little resistance from governments or citizens in the Global South. Empirical research explaining this acceptance remains limited.
Tin Hinane El Kadi
wiley   +1 more source

Home - About - Disclaimer - Privacy