Results 81 to 90 of about 51,244 (207)

Exploring the microfoundations of organizational risk exposure: Risk perception, risk management and cross‐level mechanisms

open access: yesJournal of Occupational and Organizational Psychology, Volume 99, Issue 2, June 2026.
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley   +1 more source

Phishing as a new information threat: a crime or mischief? [PDF]

open access: yes, 2015
Bailov A. Phishing as a new information threat: a crime or mischief? / Bailov Anton, Pinkerton Ron, Wihelm Schwebel // Теоретичні та практичні проблеми реалізації норм права : матеріали ІІ Всеукр. наук.-практ. конф. (з міжнар. участю) (м.
Bailov, A. V.   +5 more
core  

Measuring digital crime investigation capacity to guide international crime prevention strategies

open access: yes, 2013
This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect
E. Casey, G. Gogolin, H. Hekim
core   +1 more source

On the complexity of collaborative cyber crime investigations [PDF]

open access: yes, 2009
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime.
Bednar, Peter, Hennell, C., Katos, V.
core   +2 more sources

Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]

open access: yes, 2013
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats   +2 more
core   +1 more source

Regulating hate speech online [PDF]

open access: yes, 2010
The exponential growth in the Internet as a means of communication has been emulated by an increase in far-right and extremist web sites and hate based activity in cyberspace.
Banks, James
core   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Decoding 5G security: toward a hybrid threat ontology [version 2; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj   +1 more source

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]

open access: yes, 2017
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric   +2 more
core  

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy