Results 71 to 80 of about 55,932 (227)

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Sociological and Criminological Research of Victimization Issues: Preliminary Stage and New Sphere of Cybercrime Categorization

open access: yesJournal of Digital Technologies and Law
Objective: to identify the main issues of victimization as a result of cybercrime growth in the world in general and in Nigerian society in particular from the standpoint of sociological approaches, using a Tripartite Cybercrime Framework (TCF), which ...
A. M. Auwal, S. Lazarus
doaj   +1 more source

Kasus Cybercrime di Indonesia [PDF]

open access: yes, 2011
At the beginning was found, Computer is a huge machine with limited ability, but in recent years after manyupgrade and update Computer become a popular machine which many ability, men become amused and addictwith It.
Arifah, D. A. (Dista)
core  

Futures of Everyday Life: A Qualitative Content Analysis of Future Personas in Scenarios

open access: yesFUTURES &FORESIGHT SCIENCE, Volume 8, Issue 1, April 2026.
ABSTRACT Scenario reports, holding a long‐standing tradition in foresight and futures studies, act as an essential document for organizations to prepare for possible, plausible, and alternative futures. Focusing on descriptions and representations of everyday life, we examined 29 future persona narratives from six publications—covering a wide field ...
Gerhard Schönhofer   +3 more
wiley   +1 more source

Understanding policing of cybe-rcrime in South Africa: The phenomena, challenges and effective responses

open access: yesCogent Social Sciences, 2019
Cybercrime continues to be a detrimental problem in South Africa and continues to change in nature and sophistication. Innovations and technological advancements aimed at moving the world towards a digital age increase the risks of cybercrime ...
Siyanda Dlamini, Candice Mbambo
doaj   +1 more source

Crisis Preparedness and Systemic Risk: The Role of Municipal Leaders in Disaster Risk Governance in Norway

open access: yesScandinavian Journal of Psychology, Volume 67, Issue 1, Page 115-128, February 2026.
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund   +3 more
wiley   +1 more source

Exploring the Cybercrime Prevention Campaign on Twitter: Evidence from the Indonesian Government

open access: yesSmart Cities and Regional Development Journal, 2023
Cybercrime in Indonesia has recently become a significant problem in line with the increase in internet users, which is a serious issue among online community networks.
Al Fauzi RAHMAT   +2 more
doaj   +2 more sources

Decoding 5G security: toward a hybrid threat ontology [version 2; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj   +1 more source

Complex Trauma and Growth in Men Who Have Been Abused as Children and Perpetrated Domestic Violence as Adults

open access: yesChild Abuse Review, Volume 35, Issue 1, January/February 2026.
ABSTRACT Men who have experienced childhood victimisation are at greater risk of perpetrating domestic violence (DV). While trauma and growth theories have focused on victims' and perpetrators' reactions to traumatic events, how these mechanisms interact is unknown.
Jean‐Luc Arrigo   +3 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy