Works matching DE "COMPUTER crime prevention"
Results: 614
Threat and Challenges of Cyber-Crime and the Response.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 4
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 1
- By:
- Publication type:
- Article
Investigating crime in an interconnected society: will the new and updated EU judicial environment remove the barriers to justice?
- Published in:
- International Review of Law, Computers & Technology, 2020, v. 34, n. 1, p. 87, doi. 10.1080/13600869.2019.1700434
- By:
- Publication type:
- Article
Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?
- Published in:
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 21, doi. 10.1080/13600869.2018.1418142
- By:
- Publication type:
- Article
Setting the minimum age of criminal responsibility for cybercrime.
- Published in:
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 2, doi. 10.1080/13600869.2018.1417764
- By:
- Publication type:
- Article
Securing cyber space: the obligation of States to prevent harmful international cyber operations.
- Published in:
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 37, doi. 10.1080/13600869.2018.1417763
- By:
- Publication type:
- Article
Challenges of protecting children from sexual abuse and exploitation on the internet: the case of Kosovo.
- Published in:
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 80, doi. 10.1080/13600869.2018.1431871
- By:
- Publication type:
- Article
INTERNET SERVICE PROVIDERS SHOULD BLOCK UNUSED PORTS, SAYS STUDY.
- Published in:
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Publication type:
- Article
Maximizing Employee Compliance with Cybersecurity Policies.
- Published in:
- MIS Quarterly Executive, 2020, v. 19, n. 3, p. 183, doi. 10.17705/2msqe.00032
- By:
- Publication type:
- Article
Digital Enterprise and Cyber Security Evolution.
- Published in:
- Macromolecular Symposia, 2021, v. 396, n. 1, p. 1, doi. 10.1002/masy.202000326
- By:
- Publication type:
- Article
Internet Ubiquity And Cybercrime Targeting Children In India.
- Published in:
- Journal of Positive School Psychology, 2022, v. 6, n. 9, p. 5103
- By:
- Publication type:
- Article
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 1, p. 7, doi. 10.3390/cryptography8010007
- By:
- Publication type:
- Article
Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning.
- Published in:
- Biomimetics (2313-7673), 2024, v. 9, n. 6, p. 307, doi. 10.3390/biomimetics9060307
- By:
- Publication type:
- Article
Children on the Internet - Law Enforcement Challenges.
- Published in:
- European Law Enforcement Research Bulletin, 2022, n. 22, p. 1
- By:
- Publication type:
- Article
Law Enforcement Agency Capacity Building as a Driver for the Adoption of European Research.
- Published in:
- European Law Enforcement Research Bulletin, 2022, n. 22, p. 23
- By:
- Publication type:
- Article
Industrial Control Systems: Cyber Policies and Strategies.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 6, p. 48, doi. 10.1002/awwa.1518
- By:
- Publication type:
- Article
Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 3, p. 70, doi. 10.1002/awwa.1466
- By:
- Publication type:
- Article
Secure Storage of Data using Hybrid Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1802
- By:
- Publication type:
- Article
Cyber Hygiene in Higher Educational Institutes.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 31
- By:
- Publication type:
- Article
Mechanism to Handle Mobile Devices in Cyber Security Investigations.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 524
- By:
- Publication type:
- Article
Responding to cybercrime: current trends.
- Published in:
- Police Practice & Research, 2018, v. 19, n. 6, p. 515, doi. 10.1080/15614263.2018.1507888
- By:
- Publication type:
- Article
A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures.
- Published in:
- Healthcare (2227-9032), 2022, v. 10, n. 2, p. N.PAG, doi. 10.3390/healthcare10020327
- By:
- Publication type:
- Article
أثر الجريمة اإللكترونية على سير المرافق العامة اإللكترونية في التشريع األردني.
- Published in:
- Zarqa Journal for Research & Studies in Humanities, 2021, v. 21, n. 2, p. 346, doi. 10.12816/0058853
- By:
- Publication type:
- Article
Automating Warfare: MonsterMind and Cloudy Diplomacy in Cyberspace.
- Published in:
- International Policy Digest, 2014, v. 1, n. 8, p. 1
- By:
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
An Operational Approach to Maritime Cyber Resilience.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 1, p. 27, doi. 10.12716/1001.15.01.01
- By:
- Publication type:
- Article
Pyramid: A Case Study of Cyber Security in India.
- Published in:
- 2015
- By:
- Publication type:
- Case Study
CYBERSECURITY CAPACITY: Does It Matter?
- Published in:
- Journal of Information Policy, 2019, v. 9, p. 280, doi. 10.5325/jinfopoli.9.2019.0280
- By:
- Publication type:
- Article
A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes.
- Published in:
- Automatisierungstechnik, 2023, v. 71, n. 9, p. 779, doi. 10.1515/auto-2023-0089
- By:
- Publication type:
- Article
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure.
- Published in:
- Crime Science, 2018, v. 7, n. 1, p. 1, doi. 10.1186/s40163-018-0090-8
- By:
- Publication type:
- Article
Did cybercrime cause the crime drop?
- Published in:
- Crime Science, 2018, v. 7, n. 1, p. 1, doi. 10.1186/s40163-018-0082-8
- By:
- Publication type:
- Article
AWARENESS OF CYBERCRIME AMONG ONLINE BANKING USERS IN NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2023, v. 42, n. 3, p. 406, doi. 10.4314/njt.v42i3.14
- By:
- Publication type:
- Article
DESIGN OF A CONCEPTUAL FRAMEWORK FOR CYBERSECURITY CULTURE AMONGST ONLINE BANKING USERS IN NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2023, v. 42, n. 3, p. 399, doi. 10.4314/njt.v42i3.13
- By:
- Publication type:
- Article
AN APPROACH TO CYBERCRIME ISSUES IN DANDUME LOCAL GOVERNMENT AREA OF KATSINA STATE, NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2023, v. 42, n. 2, p. 249, doi. 10.4314/njt.v42i2.13
- By:
- Publication type:
- Article
Appling tracking game system to measure user behavior toward cybersecurity policies.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 5, p. 5164, doi. 10.11591/ijece.v12i5.pp5164-5175
- By:
- Publication type:
- Article
Where The Money Is.
- Published in:
- CPA Journal, 2019, v. 89, n. 3, p. 61
- By:
- Publication type:
- Article
How to Protect a CPA Firm in the Digital Age.
- Published in:
- CPA Journal, 2017, v. 87, n. 3, p. 72
- By:
- Publication type:
- Article
The Past, Present, and Future of Forensic Accounting.
- Published in:
- CPA Journal, 2015, v. 85, n. 3, p. 16
- By:
- Publication type:
- Article
Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime.
- Published in:
- Brigham Young University Law Review, 2015, v. 2015, n. 1, p. 177
- By:
- Publication type:
- Article
Geographic server distribution model for key revocation.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 281, doi. 10.1007/s11235-009-9254-x
- By:
- Publication type:
- Article
Reputation and trust management in heterogeneous peer-to-peer networks.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 191, doi. 10.1007/s11235-009-9259-5
- By:
- Publication type:
- Article
A novel user’s authentication scheme for pervasive on-line media services.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 181, doi. 10.1007/s11235-009-9265-7
- By:
- Publication type:
- Article
State Activities in the Securing of Cyberspace.
- Published in:
- Internal Security, 2015, v. 7, n. 2, p. 217, doi. 10.5604/20805268.1212124
- By:
- Publication type:
- Article
Preventing Fraud Using Computer Networks.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 63, doi. 10.5604/20805268.1094062
- By:
- Publication type:
- Article
SOME OBSERVATIONS ON INTERNATIONAL COOPERATION IN THE FIELD OF COMBATING CYBERCRIME.
- Published in:
- Romanian Journal of Forensic Science, 2023, n. 134, p. 144
- By:
- Publication type:
- Article
A multi-objective framework for the identification and optimisation of factors affecting cybersecurity in the Industry 4.0 supply chain.
- Published in:
- International Journal of Production Research, 2023, v. 61, n. 15, p. 5266, doi. 10.1080/00207543.2022.2100840
- By:
- Publication type:
- Article
A linear model for optimal cybersecurity investment in Industry 4.0 supply chains.
- Published in:
- International Journal of Production Research, 2022, v. 60, n. 4, p. 1368, doi. 10.1080/00207543.2020.1856442
- By:
- Publication type:
- Article
New challenges in supply chain management: cybersecurity across the supply chain.
- Published in:
- International Journal of Production Research, 2022, v. 60, n. 1, p. 162, doi. 10.1080/00207543.2021.1984606
- By:
- Publication type:
- Article
Adversarial Active Learning for Named Entity Recognition in Cybersecurity.
- Published in:
- Computers, Materials & Continua, 2021, v. 66, n. 1, p. 407, doi. 10.32604/cmc.2020.012023
- By:
- Publication type:
- Article
Analyzing the relationship between air pollution and various types of crime.
- Published in:
- PLoS ONE, 2021, v. 16, n. 8, p. 1, doi. 10.1371/journal.pone.0255653
- By:
- Publication type:
- Article