Works matching DE "COMPUTER crime prevention"
Results: 615
Responsive Regulation and the Reporting of Information Security Incidents--Taiwan and China.
- Published in:
- Issues & Studies, 2012, v. 48, n. 1, p. 85
- By:
- Publication type:
- Article
Maximizing Employee Compliance with Cybersecurity Policies.
- Published in:
- MIS Quarterly Executive, 2020, v. 19, n. 3, p. 183, doi. 10.17705/2msqe.00032
- By:
- Publication type:
- Article
Is Cybersecurity a Public Good?
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Social cybersecurity: an emerging science.
- Published in:
- Computational & Mathematical Organization Theory, 2020, v. 26, n. 4, p. 365, doi. 10.1007/s10588-020-09322-9
- By:
- Publication type:
- Article
The Influences of Public and Institutional Pressure on Firms' Cybersecurity Disclosures.
- Published in:
- Journal of the Association for Information Systems, 2022, v. 23, n. 3, p. 779, doi. 10.17705/1jais.00740
- By:
- Publication type:
- Article
Presenting a method to perform cyber maneuvers.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1977, doi. 10.3906/elk-1710-266
- By:
- Publication type:
- Article
Cyber security in marine transport: opportunities and legal challenges.
- Published in:
- Scientific Journal of Maritime Research, 2021, v. 35, n. 2, p. 248, doi. 10.31217/p.35.2.7
- By:
- Publication type:
- Article
Shipboard ECDIS Cyber Security: Third-Party Component Threats.
- Published in:
- Scientific Journal of Maritime Research, 2019, v. 33, n. 2, p. 176, doi. 10.31217/p.33.2.7
- By:
- Publication type:
- Article
Embracing a New Year of Cybersecurity Innovations: Celebrating ISSA's 40th Anniversary and Exploring AI in Cybercrime Prevention.
- Published in:
- ISSA Journal, 2024, v. 22, n. 1, p. 3
- By:
- Publication type:
- Article
COVID-19's Impact on Organizational Cybersecurity Posture: Part one of this two-part article looks at some of the rapid changes that happened in the work place due to COVID-19 and their implications to cybersecurity.
- Published in:
- ISSA Journal, 2021, v. 19, n. 7, p. 16
- By:
- Publication type:
- Article
The Ethical Use of Machine Learning in Cybersecurity.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 12
- By:
- Publication type:
- Article
Immaturity & Moral Hazard in the Cyber Insurance Market.
- Published in:
- ISSA Journal, 2020, v. 18, n. 1, p. 35
- By:
- Publication type:
- Article
News That You Can Use...
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 10
- Publication type:
- Article
Immaturity & Moral Hazard in the Cyber Insurance Market.
- Published in:
- ISSA Journal, 2019, v. 17, n. 10, p. 14
- By:
- Publication type:
- Article
Cybersecurity Education: The Quest to Building "Bridge" Skills.
- Published in:
- ISSA Journal, 2019, v. 17, n. 8, p. 18
- By:
- Publication type:
- Article
Information Security Maxims.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 44
- By:
- Publication type:
- Article
Cybersecurity: A School Curriculum Necessity.
- Published in:
- ISSA Journal, 2018, v. 16, n. 1, p. 8
- By:
- Publication type:
- Article
The Race against Cyber Crime Is Lost without Artificial Intelligence.
- Published in:
- ISSA Journal, 2016, v. 14, n. 11, p. 27
- By:
- Publication type:
- Article
THE NEW PARADIGM: WHEN AUTHENTICATION BECOMES INVISIBLE TO THE USER.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- By:
- Publication type:
- Article
PROTECTING SENSOR DATA FROM MALWARE ATTACKS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- By:
- Publication type:
- Article
Improving Risk Assessment Model for Cyber Security Using Robust Aggregation Operators for Bipolar Complex Fuzzy Soft Inference Systems.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 4, p. 582, doi. 10.3390/math12040582
- By:
- Publication type:
- Article
Application of Structural Equation Modelling to Cybersecurity Risk Analysis in the Era of Industry 4.0.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 2, p. 343, doi. 10.3390/math12020343
- By:
- Publication type:
- Article
Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 6, p. 1353, doi. 10.3390/math11061353
- By:
- Publication type:
- Article
Spielend sicher: Gamification als Schlüssel zur nachhaltigen Cybersicherheit.
- Published in:
- IM + io, 2023, n. 3, p. 54
- By:
- Publication type:
- Article
Gefahr erkannt, Recht gebannt: Europas Kampf gegen Cyberbedrohungen.
- Published in:
- IM + io, 2023, n. 3, p. 50
- By:
- Publication type:
- Article
أثر الجريمة اإللكترونية على سير المرافق العامة اإللكترونية في التشريع األردني.
- Published in:
- Zarqa Journal for Research & Studies in Humanities, 2021, v. 21, n. 2, p. 346, doi. 10.12816/0058853
- By:
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
An Operational Approach to Maritime Cyber Resilience.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 1, p. 27, doi. 10.12716/1001.15.01.01
- By:
- Publication type:
- Article
Development of the Concept of Cybersecurity of the Organization.
- Published in:
- TEM Journal, 2021, v. 10, n. 3, p. 1447, doi. 10.18421/TEM103-57
- By:
- Publication type:
- Article
Expanding the Potential of the Preventive and Law Enforcement Function of the Security Police in Combating Cybercrime in Ukraine and the EU.
- Published in:
- TEM Journal, 2020, v. 9, n. 2, p. 460, doi. 10.18421/tem92-06
- By:
- Publication type:
- Article
CYBERBULLYING: SIX THINGS ADMINISTRATORS CAN DO.
- Published in:
- Education, 2014, v. 134, n. 4, p. 452
- By:
- Publication type:
- Article
ELEKTRONINĖS INFORMACIJOS SAUGOS REGLAMENTAVIMAS LIETUVOJE IR RUSIJOJE: LYGINAMIEJI ASPEKTAI.
- Published in:
- Social Technologies / Socialines Technologijos, 2012, v. 2, n. 2, p. 441
- By:
- Publication type:
- Article
Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data.
- Published in:
- Defense Counsel Journal, 2015, v. 82, n. 2, p. 143, doi. 10.12690/0161-8202-82.2.143
- By:
- Publication type:
- Article
DISTRIBUTION AND CHARACTERISTICS OF CYBER VIOLENCE AMONG ELEMENTARY SCHOOL STUDENTS - SURVEY RESULTS IN SERBIA.
- Published in:
- Journal of Psychological & Educational Research, 2017, v. 25, n. 1, p. 93
- By:
- Publication type:
- Article
An Insider Threat Neutralisation Mitigation model predicated on Cognitive Dissonance (ITNM<sup>CD</sup>).
- Published in:
- South African Computer Journal, 2015, v. 56, p. 50, doi. 10.18489/sacj.v56i1.263
- By:
- Publication type:
- Article
A Systematic Review of Cybersecurity Risks in Higher Education.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- By:
- Publication type:
- Article
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management.
- Published in:
- Future Internet, 2020, v. 12, n. 9, p. 157, doi. 10.3390/fi12090157
- By:
- Publication type:
- Article
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 62, doi. 10.3390/fi12040062
- By:
- Publication type:
- Article
Cyber Security Threat Modeling for Supply Chain Organizational Environments.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 63, doi. 10.3390/fi11030063
- By:
- Publication type:
- Article
A New LightweightWatchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs.
- Published in:
- Future Internet, 2018, v. 10, n. 1, p. 1, doi. 10.3390/fi10010001
- By:
- Publication type:
- Article
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 3, p. 519, doi. 10.3390/sym13030519
- By:
- Publication type:
- Article
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 546, doi. 10.3390/sym7020546
- By:
- Publication type:
- Article
Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 18, p. 13369, doi. 10.3390/su151813369
- By:
- Publication type:
- Article
Investigating the Effect of Students' Knowledge, Beliefs, and Digital Citizenship Skills on the Prevention of Cybercrime.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 15, p. 11512, doi. 10.3390/su151511512
- By:
- Publication type:
- Article
An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 14, p. N.PAG, doi. 10.3390/su14148319
- By:
- Publication type:
- Article
Cybersecurity Skills among European High-School Students: A New Approach in the Design of Sustainable Educational Development in Cybersecurity.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 8, p. N.PAG, doi. 10.3390/su14084763
- By:
- Publication type:
- Article
Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 24, p. 13761, doi. 10.3390/su132413761
- By:
- Publication type:
- Article
Methodological Perspective for Assessing European Consumers' Awareness of Cybersecurity and Sustainability in E-Commerce.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 20, p. 11343, doi. 10.3390/su132011343
- By:
- Publication type:
- Article
An ISM Modeling of Barriers for Blockchain/Distributed Ledger Technology Adoption in Supply Chains towards Cybersecurity.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 9, p. 4672, doi. 10.3390/su13094672
- By:
- Publication type:
- Article
The Perceived Importance of Cybercrime Control among Police Officers: Implications for Combatting Industrial Espionage.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 8, p. 4351, doi. 10.3390/su13084351
- By:
- Publication type:
- Article