Results 81 to 90 of about 51,244 (207)
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley +1 more source
Phishing as a new information threat: a crime or mischief? [PDF]
Bailov A. Phishing as a new information threat: a crime or mischief? / Bailov Anton, Pinkerton Ron, Wihelm Schwebel // Теоретичні та практичні проблеми реалізації норм права : матеріали ІІ Всеукр. наук.-практ. конф. (з міжнар. участю) (м.
Bailov, A. V. +5 more
core
Measuring digital crime investigation capacity to guide international crime prevention strategies
This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect
E. Casey, G. Gogolin, H. Hekim
core +1 more source
On the complexity of collaborative cyber crime investigations [PDF]
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime.
Bednar, Peter, Hennell, C., Katos, V.
core +2 more sources
Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats +2 more
core +1 more source
Regulating hate speech online [PDF]
The exponential growth in the Internet as a means of communication has been emulated by an increase in far-right and extremist web sites and hate based activity in cyberspace.
Banks, James
core +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure.
R. Andrew Paskauskas
doaj +1 more source
Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric +2 more
core
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source

