Results 61 to 70 of about 2,468 (138)

Decoding 5G security: toward a hybrid threat ontology [version 2; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj   +1 more source

From Exposure to Exploitation: Understanding How Child Pornography Exposure Influences Early Sexual Behaviour and Pathways Into Transactional Sexual Exploitation and Commercial Sexual Exploitation in Sub‐Saharan Africa

open access: yesPublic Health Challenges, Volume 5, Issue 2, June 2026.
This review examines how exposure to sexually explicit content among children in sub‐Saharan Africa contributes to early sexual behaviour and pathways into transactional sexual exploitation (informal exploitation) and commercial sexual exploitation (formal exploitation).
Sylvester Kyei‐Gyamfi
wiley   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Futures of Everyday Life: A Qualitative Content Analysis of Future Personas in Scenarios

open access: yesFUTURES &FORESIGHT SCIENCE, Volume 8, Issue 1, April 2026.
ABSTRACT Scenario reports, holding a long‐standing tradition in foresight and futures studies, act as an essential document for organizations to prepare for possible, plausible, and alternative futures. Focusing on descriptions and representations of everyday life, we examined 29 future persona narratives from six publications—covering a wide field ...
Gerhard Schönhofer   +3 more
wiley   +1 more source

CONSIDERATIONS ON THE EFFICIENCY OF THE ROMANIAN NEW CRIMINAL CODE IN COMBATTING CYBERCRIME [PDF]

open access: yesChallenges of the Knowledge Society, 2013
The New Criminal Code addresses in an adequate way the challenges of the cyberspace, being a useful tool in the hands of law enforcement agencies involved in combating a large spectrum of communications and cyberrelated offences. From a broad perspective,
MAXIM DOBRINOIU
doaj  

Law Implementation of Cybercrime in Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora, 2018
Cybercrime is a criminal act that is prohibited by every country in the world. Cybercrime cases have occurred and gave negative impacts on Indonesian computer users.
I Nyoman Sukayasa, Wayan Suryathi
doaj   +1 more source

Cybercrime and Digital Society in Indonesia: Legal Challenges and Public Discourse

open access: yesAdliya
Cybercrime is a communication technology offence that disrupts the public through the use of computers and the internet. It occurs due to the negative impact of technology affecting human life.
Dedek Kusnadi   +2 more
doaj   +1 more source

AN EXPLANATION OF THE CYBERCRIME VICTIMISATION: SELF-CONTROL AND LIFESTILE/ROUTINE ACTIVITY THEORY

open access: yesInnovative Issues and Approaches in Social Sciences, 2016
The purpose of the current paper is to examine the causes of cybercrime victimisation, to highlight limitations of the existing cybercrime victimisation etiological studies and provide guidance for further research.
Aleksandar Ilievski
doaj   +1 more source

Consumer Protection of Girls from Cybercrime in a Gender Perspective

open access: yesJournal of Law and Legal Reform
Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children.
Susilowati Suparto   +3 more
doaj   +1 more source

Illuminating the Dark Side of the Internet with Actor-Network Theory: An Integrative Review of Current Cybercrime Research [PDF]

open access: yesGlobal Media Journal: Canadian Edition, 2014
Cybercrime is a relatively new area of research within criminology and media studies. The purpose of this paper is to pull together current research scholarship at the intersection of Actor-Network Theory (ANT) and cybercrime by addressing the following ...
Rocci Luppicini
doaj  

Home - About - Disclaimer - Privacy