Results 51 to 60 of about 51,244 (207)

Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange

open access: yesAbacus, EarlyView.
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew   +3 more
wiley   +1 more source

Equity considerations in the proposed wildlife protocol to the Convention against Transnational Organized Crime

open access: yesConservation Biology, EarlyView.
ABSTRACT Wildlife trafficking poses a critical threat to global biodiversity, contributes to organized crime, and has disproportionate impacts on underserved and Indigenous communities. Although international legal instruments, such as the Convention on International Trade in Endangered Species of Wild Fauna and Flora, and institutional collaborations,
Chad Patrick Osorio
wiley   +1 more source

Cybercrime: The Dark Cloud Over Our Online Lives - Chase It Away [PDF]

open access: yesSHS Web of Conferences
Cybercrime has become a pressing global issue with significant societal consequences. This study develops a comprehensive framework to analyze cybercrime patterns and evaluate the effectiveness of cybersecurity policies through data-driven approaches.We ...
Yuan Jingming, Li Jiatang, Bu Pengyue
doaj   +1 more source

Contextualising Mental Privacy in South Africa: Legal, Ethical, and Socio‐Cultural Considerations With Policy Recommendations

open access: yesDeveloping World Bioethics, EarlyView.
ABSTRACT Mental privacy is a growing concern as neurotechnologies and digital mental health tools collect and process sensitive brain‐related data. In South Africa, cultural and religious diversity adds complexity to protecting mental privacy, with traditional healing practices, communal decision‐making, and spiritual beliefs influencing mental health ...
Marietjie Botes   +4 more
wiley   +1 more source

Knowing is half the battle: Examining the association between acknowledgement of victimization and reporting of fraud

open access: yesJournal of Economic Criminology
Reporting victimization to the police or one’s bank is a crucial step for victims of fraud, but many victims of fraud do not acknowledge their experiences as constituting victimization.
Cooper A. Maher, Timothy A. Engle
doaj   +1 more source

The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]

open access: yes, 2008
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core  

Never Mind the Bollards: Exploring the Role of GCHQ, MI5, and the National Technical Authorities in UK Security Markets

open access: yesThe Howard Journal of Crime and Justice, EarlyView.
ABSTRACT The cultures and governance of security markets in the United Kingdom are often characterised through a paradoxical narrative of simultaneous state retreat and progressive advance. In the face of repeated recent high‐profile security failures, and global changes in material political economy, we argue that UK security governance is adapting to
Ben Collier, Jamie Buchan
wiley   +1 more source

SOCIAL-ECONOMIC ASPECTS OF CYBERCRIME

open access: yesInnovative Issues and Approaches in Social Sciences, 2016
The purpose of the study is to highlight the main issues of developing countries regarding cybercrime and examine the possible link between weak economic development and escalating levels of cybercrime.
Aleksandar Ilievski, Igor Bernik
doaj   +1 more source

A new Systemic Taxonomy of Cyber Criminal activity

open access: yesPolitehnika, 2020
Cybercrime commonly refers to a broad range of different criminal activities that involve computers and information systems, either as primary tools or as primary targets.
Matej Babič, Damir Purković
doaj   +1 more source

Legislative Policy of the Republic Islamic of Iran on Cybercrime [PDF]

open access: yesInternational Multidisciplinary Journal of Pure Life, 2019
With the advancement of technology and the use of computers in all economic, military, and social affairs, various crimes can occur in the field of computers; therefore, the legislature passed the Law on Cybercrime in 56 articles in 2009 to prevent and ...
Dr. Soheil Zolfaghari (Iran)   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy