Results 51 to 60 of about 51,244 (207)
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
ABSTRACT Wildlife trafficking poses a critical threat to global biodiversity, contributes to organized crime, and has disproportionate impacts on underserved and Indigenous communities. Although international legal instruments, such as the Convention on International Trade in Endangered Species of Wild Fauna and Flora, and institutional collaborations,
Chad Patrick Osorio
wiley +1 more source
Cybercrime: The Dark Cloud Over Our Online Lives - Chase It Away [PDF]
Cybercrime has become a pressing global issue with significant societal consequences. This study develops a comprehensive framework to analyze cybercrime patterns and evaluate the effectiveness of cybersecurity policies through data-driven approaches.We ...
Yuan Jingming, Li Jiatang, Bu Pengyue
doaj +1 more source
ABSTRACT Mental privacy is a growing concern as neurotechnologies and digital mental health tools collect and process sensitive brain‐related data. In South Africa, cultural and religious diversity adds complexity to protecting mental privacy, with traditional healing practices, communal decision‐making, and spiritual beliefs influencing mental health ...
Marietjie Botes +4 more
wiley +1 more source
Reporting victimization to the police or one’s bank is a crucial step for victims of fraud, but many victims of fraud do not acknowledge their experiences as constituting victimization.
Cooper A. Maher, Timothy A. Engle
doaj +1 more source
The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core
ABSTRACT The cultures and governance of security markets in the United Kingdom are often characterised through a paradoxical narrative of simultaneous state retreat and progressive advance. In the face of repeated recent high‐profile security failures, and global changes in material political economy, we argue that UK security governance is adapting to
Ben Collier, Jamie Buchan
wiley +1 more source
SOCIAL-ECONOMIC ASPECTS OF CYBERCRIME
The purpose of the study is to highlight the main issues of developing countries regarding cybercrime and examine the possible link between weak economic development and escalating levels of cybercrime.
Aleksandar Ilievski, Igor Bernik
doaj +1 more source
A new Systemic Taxonomy of Cyber Criminal activity
Cybercrime commonly refers to a broad range of different criminal activities that involve computers and information systems, either as primary tools or as primary targets.
Matej Babič, Damir Purković
doaj +1 more source
Legislative Policy of the Republic Islamic of Iran on Cybercrime [PDF]
With the advancement of technology and the use of computers in all economic, military, and social affairs, various crimes can occur in the field of computers; therefore, the legislature passed the Law on Cybercrime in 56 articles in 2009 to prevent and ...
Dr. Soheil Zolfaghari (Iran) +1 more
doaj +1 more source

