Results 41 to 50 of about 51,244 (207)
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Beginner's Guide for Cybercrime Investigators [PDF]
In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data.
Sfetcu, Nicolae
core
Economic Factors of Vulnerability Trade and Exploitation
Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently
Allodi Luca, Allodi Luca
core +1 more source
Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley +1 more source
WHAT IS CYBERCRIME? PROTECTION AGAINST CYBERCRIME
In this article, the author will analyze the types of cybercrimes. It analyzes the most dangerous types of cybercrime, which are widely spread around the world and attract more and more people every year.
Mukhammatkulov Shakhrukhbek Erkin ugli +1 more
openaire +3 more sources
International Cooperation of Member Nations of the CIS on Counteracting Cybercrime
Cybercrime is the threat to national and international informational security. The objects of cyberthreats are economics security, critical information structure, information state sovereignty.
O. I. Lepeshkina
doaj +1 more source
Unpacking China's Digital Ascent in the Global South: The Case of Huawei in North Africa
ABSTRACT Despite frequent concerns in Western policy and media circles about the risks of using Chinese telecommunications suppliers, firms like Huawei have encountered little resistance from governments or citizens in the Global South. Empirical research explaining this acceptance remains limited.
Tin Hinane El Kadi
wiley +1 more source
Here there be Dragons: Evolution, Potentials and Mitigation Opportunities of Cybercrime in Nigeria
The world is becoming increasingly interconnected due to advancements in technology and the adoption of the internet. The once widely used traditional forms of communication such as parcels have become unpopular.
Attila Mate Kovacs
doaj +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
The rate of cybercrime among Palestinian university students is unknown. This study is the first to examine cybercrime awareness among Palestinian undergraduate students. A cross-sectional design was used to investigate cybercrime awareness, risky online
Muna Ahmead +2 more
doaj +1 more source

