Results 81 to 90 of about 55,932 (227)
Comprehensive analytical review of cybercrime and cyber policy in West Africa
Cybercrime is a growing concern in West Africa due to the increasing use of technology and Internet penetration in the region. Legal frameworks are essential for guiding the control of cybercrime.
Victor A. Adewopo +5 more
doaj +1 more source
Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats +2 more
core +1 more source
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
The Path of Internet Law: An Annotated Guide to Legal Landmarks [PDF]
The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property.
D’Angelo, Diane, Rustad, Michael L.
core +1 more source
Fun, flirtation and fear: Selfies in teenage girls digital exchange cultures
Abstract This paper explores teenage girls' engagement with digital images on social media. Using new feminist materialism, we foreground digital images as an assemblage of materialities (human and more‐than‐human) filled with affective potentials that materialise in/capacities.
Raksha Janak +2 more
wiley +1 more source
Law Implementation of Cybercrime in Indonesia
Cybercrime is a criminal act that is prohibited by every country in the world. Cybercrime cases have occurred and gave negative impacts on Indonesian computer users.
I Nyoman Sukayasa, Wayan Suryathi
doaj +1 more source
Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric +2 more
core
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation
One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging ...
Afroz, Sadia +7 more
core +1 more source
Opportunities or Threats: Impact of Digital Engagement on Marginalized Women Entrepreneurs
ABSTRACT The paper explores the experiences of social marginalization and discrimination faced by women entrepreneurs, as well as their adoption of digital resources to address these disadvantages. This study employs an interpretive approach; semi‐structured interviews were conducted with 20 women entrepreneurs in Nigeria.
Imaobong James +2 more
wiley +1 more source
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj +1 more source

