Results 71 to 80 of about 51,244 (207)

Underground web: the cybercrime challenge [PDF]

open access: yes
The two papers in this Special Report examine the central role that cybercrime plays in modern society and how technological developments create new opportunities for criminals to exploit.
Andrew Colvin   +2 more
core  

The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]

open access: yes, 2011
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core   +1 more source

Dynamic Evolution and Transformative Trends in the Consumer Market: A Technology Paradox Perspective

open access: yesPsychology &Marketing, Volume 43, Issue 6, Page 1327-1342, June 2026.
ABSTRACT The consumer market is defined by tensions arising from the clash between technological advancement and consumer psychology. Current research lacks a unifying framework to explain these contradictions. Addressing this gap, we introduce a conceptual model based on technology paradox theory, which maps the dynamic process from antecedents ...
Chanaka Jayawardhena   +3 more
wiley   +1 more source

Exploring the Cybercrime Prevention Campaign on Twitter: Evidence from the Indonesian Government

open access: yesSmart Cities and Regional Development Journal, 2023
Cybercrime in Indonesia has recently become a significant problem in line with the increase in internet users, which is a serious issue among online community networks.
Al Fauzi RAHMAT   +2 more
doaj   +2 more sources

Comprehensive analytical review of cybercrime and cyber policy in West Africa

open access: yesJournal of Electrical Systems and Information Technology
Cybercrime is a growing concern in West Africa due to the increasing use of technology and Internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime.
Victor A. Adewopo   +5 more
doaj   +1 more source

Decoding 5G security: toward a hybrid threat ontology [version 3; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj   +1 more source

The Path of Internet Law: An Annotated Guide to Legal Landmarks [PDF]

open access: yes, 2011
The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property.
D’Angelo, Diane, Rustad, Michael L.
core   +1 more source

From Exposure to Exploitation: Understanding How Child Pornography Exposure Influences Early Sexual Behaviour and Pathways Into Transactional Sexual Exploitation and Commercial Sexual Exploitation in Sub‐Saharan Africa

open access: yesPublic Health Challenges, Volume 5, Issue 2, June 2026.
This review examines how exposure to sexually explicit content among children in sub‐Saharan Africa contributes to early sexual behaviour and pathways into transactional sexual exploitation (informal exploitation) and commercial sexual exploitation (formal exploitation).
Sylvester Kyei‐Gyamfi
wiley   +1 more source

Understanding policing of cybe-rcrime in South Africa: The phenomena, challenges and effective responses

open access: yesCogent Social Sciences, 2019
Cybercrime continues to be a detrimental problem in South Africa and continues to change in nature and sophistication. Innovations and technological advancements aimed at moving the world towards a digital age increase the risks of cybercrime ...
Siyanda Dlamini, Candice Mbambo
doaj   +1 more source

Home - About - Disclaimer - Privacy