Results 51 to 60 of about 55,932 (227)

Risky online behaviors and cybercrime awareness among undergraduate students at Al Quds University: a cross sectional study

open access: yesCrime Science
The rate of cybercrime among Palestinian university students is unknown. This study is the first to examine cybercrime awareness among Palestinian undergraduate students. A cross-sectional design was used to investigate cybercrime awareness, risky online
Muna Ahmead   +2 more
doaj   +1 more source

Knowing is half the battle: Examining the association between acknowledgement of victimization and reporting of fraud

open access: yesJournal of Economic Criminology
Reporting victimization to the police or one’s bank is a crucial step for victims of fraud, but many victims of fraud do not acknowledge their experiences as constituting victimization.
Cooper A. Maher, Timothy A. Engle
doaj   +1 more source

Understanding cybercrime in Malaysia: an overview [PDF]

open access: yes, 2014
Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime.
Abdul Manaf, Azizah   +2 more
core  

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Legislative Policy of the Republic Islamic of Iran on Cybercrime [PDF]

open access: yesInternational Multidisciplinary Journal of Pure Life, 2019
With the advancement of technology and the use of computers in all economic, military, and social affairs, various crimes can occur in the field of computers; therefore, the legislature passed the Law on Cybercrime in 56 articles in 2009 to prevent and ...
Dr. Soheil Zolfaghari (Iran)   +1 more
doaj   +1 more source

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

The Role of Creativity and Innovation Management Research in Times of Changing Security and Defence Realities

open access: yesCreativity and Innovation Management, EarlyView.
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen   +4 more
wiley   +1 more source

SOCIAL-ECONOMIC ASPECTS OF CYBERCRIME

open access: yesInnovative Issues and Approaches in Social Sciences, 2016
The purpose of the study is to highlight the main issues of developing countries regarding cybercrime and examine the possible link between weak economic development and escalating levels of cybercrime.
Aleksandar Ilievski, Igor Bernik
doaj   +1 more source

A new Systemic Taxonomy of Cyber Criminal activity

open access: yesPolitehnika, 2020
Cybercrime commonly refers to a broad range of different criminal activities that involve computers and information systems, either as primary tools or as primary targets.
Matej Babič, Damir Purković
doaj   +1 more source

Home - About - Disclaimer - Privacy