scroll to top

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Cybercrime"

1 - 10 of 460 results for
Results per page:

Promoting the Cyber Wellness of Internet Users in Papua New Guinea

Publication Type: Academic Journal

Source(s): E-Journal of Humanities, Arts and Social Sciences, Vol 4, Iss 3, Pp 276-286 (2023)

Abstract: In Papua New Guinea, there are concerns that the increase in internet accessibility has led to a rise in criminal activities in cyberspace. This paper identifies activities that constitute crimes in the cyberspace of Papua New Guinea. The main prongs o...

Hacktivists from the Inside: Collective Identity, Target Selection and Tactical Use of Media during the Quebec Maple Spring Protests

Publication Type: Academic Journal

Source(s): Rivista di Criminologia, Vittimologia e Sicurezza, Vol XVI, Iss 1-3, Pp 35-56 (2023)

Abstract: Much of the research on Anonymous has studied the group from an ethnographic perspective or focused on social media posts to learn what is most important for the movement. There have been only few attempts to analyze how hacktivists are choosing suitab...

Restrictions on digital human rights to counter terrorism

Publication Type: Academic Journal

Source(s): Известия Саратовского университета. Новая серия: Серия «Экономика. Управление. Право», Vol 23, Iss 1, Pp 48-59 (2023)

Abstract: Introduction. Russian civil legislation takes into account innovations in information exchange by fixing the concept of digital rights, while giving them an exclusively private legal understanding. The modern doctrine proceeds from the fact that develo...

Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities

Publication Type: Academic Journal

Source(s): IEEE Open Journal of the Computer Society, Vol 4, Pp 37-49 (2023)

Abstract: At present, the concept of metaverse has sparked widespread attention from the public to major industries. With the rapid development of blockchain and Web3 technologies, the decentralized metaverse ecology has attracted a large influx of users and cap...

Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime

Publication Type: Academic Journal

Source(s): Journal of Information Technology Management, Vol 15, Iss 1, Pp 135-162 (2023)

Abstract: The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court c...

Computer Crime

Publication Type: Academic Journal

Source(s): International Journal of Social Science Research and Review, Vol 6, Iss 2 (2023)


Abstract: In the last decades, we have an exceptionally large increase in computer crime, therefore, bearing in mind this fact, we have tried to present computer crime as a fairly widespread form both in Kosovo and in the region. By researching the criminality l...

Issues of Establishing the Place of Fraud Carried Out Using Information Technologies: Forensic and Criminal Procedure Aspects

Publication Type: Academic Journal

Source(s): Сибирское юридическое обозрение, Vol 19, Iss 2, Pp 156-164 (2022)

Abstract: The Author considers some debatable issues of establishing the place of fraud committed using information technology. The result of the study is the conclusion that the current development of criminal procedure legislation does not allow to adequately ...

Cyber Crime E-Commerce Business Transactions

Publication Type: Academic Journal

Source(s): SASI, Vol 28, Iss 4, Pp 589-598 (2022)


Abstract: Introduction: Law enforcement and protection for cyber cases is focused on consumers as victims of digital crimes where consumers are generally harmed when conducting business transactions digitally. Where the focus of this paper discusses the legal pr...


Publication Type: Academic Journal

Source(s): Правовое государство: теория и практика, Pp 138-144 (2022)

Abstract: The modern development of computer technologies is accompanied by an increasing immersion of a person into the virtual world, where he often spends many hours. The longer a person uses a computer and various electronic gadgets, the more traces he leave...


Publication Type: Academic Journal

Source(s): Obrana a Strategie, Vol 22, Iss 2, Pp 36-50 (2022)

Abstract: The article introduces a new meaning of the acronym M.A.D. (Mutually Assured Destruction) in the field of security. From the original connection with nuclear issues, its use is moving to the area of cyberspace. The text introduces the basic division of...