Results 81 to 90 of about 55,932 (227)

Comprehensive analytical review of cybercrime and cyber policy in West Africa

open access: yesJournal of Electrical Systems and Information Technology
Cybercrime is a growing concern in West Africa due to the increasing use of technology and Internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime.
Victor A. Adewopo   +5 more
doaj   +1 more source

Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]

open access: yes, 2013
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats   +2 more
core   +1 more source

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

The Path of Internet Law: An Annotated Guide to Legal Landmarks [PDF]

open access: yes, 2011
The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property.
D’Angelo, Diane, Rustad, Michael L.
core   +1 more source

Fun, flirtation and fear: Selfies in teenage girls digital exchange cultures

open access: yesChildren &Society, Volume 40, Issue 1, Page 8-24, January 2026.
Abstract This paper explores teenage girls' engagement with digital images on social media. Using new feminist materialism, we foreground digital images as an assemblage of materialities (human and more‐than‐human) filled with affective potentials that materialise in/capacities.
Raksha Janak   +2 more
wiley   +1 more source

Law Implementation of Cybercrime in Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora, 2018
Cybercrime is a criminal act that is prohibited by every country in the world. Cybercrime cases have occurred and gave negative impacts on Indonesian computer users.
I Nyoman Sukayasa, Wayan Suryathi
doaj   +1 more source

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]

open access: yes, 2017
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric   +2 more
core  

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation

open access: yes, 2017
One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging ...
Afroz, Sadia   +7 more
core   +1 more source

Opportunities or Threats: Impact of Digital Engagement on Marginalized Women Entrepreneurs

open access: yesGender, Work &Organization, Volume 33, Issue 1, Page 164-180, January 2026.
ABSTRACT The paper explores the experiences of social marginalization and discrimination faced by women entrepreneurs, as well as their adoption of digital resources to address these disadvantages. This study employs an interpretive approach; semi‐structured interviews were conducted with 20 women entrepreneurs in Nigeria.
Imaobong James   +2 more
wiley   +1 more source

Decoding 5G security: toward a hybrid threat ontology [version 3; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj   +1 more source

Home - About - Disclaimer - Privacy