Works matching DE "INTERNET fraud"
Results: 499
Personal, environmental and behavioral predictors associated with online fraud victimization among adults.
- Published in:
- PLoS ONE, 2025, v. 20, n. 1, p. 1, doi. 10.1371/journal.pone.0317232
- By:
- Publication type:
- Article
Reducing Internet Abuse in the Workplace.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2003, v. 68, n. 1, p. 22
- By:
- Publication type:
- Article
Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 343
- By:
- Publication type:
- Article
Regulating behaviours on the European Union internet, the case of spam versus cookies.
- Published in:
- International Review of Law, Computers & Technology, 2017, v. 31, n. 3, p. 289, doi. 10.1080/13600869.2017.1304616
- By:
- Publication type:
- Article
Regulating the electronic marketplace through extraterritorial legislation: Google and eBay in the line of fire of French judges.
- Published in:
- International Review of Law, Computers & Technology, 2010, v. 24, n. 1, p. 39, doi. 10.1080/13600860903570152
- By:
- Publication type:
- Article
Is identity theft really theft?
- Published in:
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 77, doi. 10.1080/13600860902742596
- By:
- Publication type:
- Article
Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime.
- Published in:
- International Review of Law, Computers & Technology, 2008, v. 22, n. 1/2, p. 45, doi. 10.1080/13600860801924907
- By:
- Publication type:
- Article
The role of law in the governance of the internet.
- Published in:
- International Review of Law, Computers & Technology, 2006, v. 20, n. 1/2, p. 201, doi. 10.1080/13600860600705101
- By:
- Publication type:
- Article
Lawrence Lessig's ‘Bleak House’: A Critique of “Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity” or “How I learned to stop worrying and love internet law” 1.
- Published in:
- International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 363, doi. 10.1080/13600860500395375
- By:
- Publication type:
- Article
Development of Information and Technology Law in Asia.
- Published in:
- International Review of Law, Computers & Technology, 2005, v. 19, n. 2, p. 117, doi. 10.1080/13600860500140391
- By:
- Publication type:
- Article
Indian Information and Technology Act 2000: review of the Regulatory Powers under the Act.
- Published in:
- International Review of Law, Computers & Technology, 2005, v. 19, n. 2, p. 209, doi. 10.1080/13600860500133495
- By:
- Publication type:
- Article
Council regulation (EC) 44/2001 and internet consumer contracts: Some thoughts on article 15 and the futility of applying ‘in the box’ conflict of law rules to the ‘out of the box’ borderless world.
- Published in:
- International Review of Law, Computers & Technology, 2005, v. 19, n. 1, p. 13, doi. 10.1080/13600860500051002
- By:
- Publication type:
- Article
Correction.
- Published in:
- 2024
- Publication type:
- Correction Notice
Examining fifty cases of convicted online romance fraud offenders.
- Published in:
- Criminal Justice Studies, 2024, v. 37, n. 4, p. 328, doi. 10.1080/1478601X.2024.2429088
- By:
- Publication type:
- Article
Introduction.
- Published in:
- Criminal Justice Studies, 2023, v. 36, n. 3, p. 203, doi. 10.1080/1478601X.2023.2223455
- By:
- Publication type:
- Article
Online fraud victims' experiences of participating in qualitative interviews.
- Published in:
- Criminal Justice Studies, 2018, v. 31, n. 1, p. 95, doi. 10.1080/1478601X.2017.1396217
- By:
- Publication type:
- Article
Nachrichten.
- Published in:
- Information -- Wissenschaft und Praxis, 2024, v. 75, n. 1, p. 82, doi. 10.1515/iwp-2023-2055
- Publication type:
- Article
Rund um das aktuelle Thema Falschinformationen im Netz und in digitalen Kommunikationskanälen: Steilvorlagen für den Unternehmenserfolg 2022 und Genios Datenbankfrühstück am 19. Oktober 2022 in Frankfurt am Main.
- Published in:
- Information -- Wissenschaft und Praxis, 2023, v. 74, n. 1, p. 58, doi. 10.1515/iwp-2022-2254
- By:
- Publication type:
- Article
Identity Crisis: Choice Escrow & Land Title, LLC and the Rising Risks of Fraudulent Wire Transfers.
- Published in:
- DePaul Business & Commercial Law Journal, 2016, v. 14, n. 3, p. 387
- By:
- Publication type:
- Article
Identifying and Removing Fraudulent Attempts to Enroll in a Human Health Improvement Intervention Trial in Rural Communities.
- Published in:
- Methods & Protocols, 2024, v. 7, n. 6, p. 93, doi. 10.3390/mps7060093
- By:
- Publication type:
- Article
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 4, p. 51, doi. 10.3390/cryptography8040051
- By:
- Publication type:
- Article
THE NIGERIAN SCAM 2.0 How an improved online scam trick made an unsuspecting Dutch man over 20,000 euros poorer.
- Published in:
- Studies in Oral Folk Literature / Estudis de Literatura Oral Popular, 2022, n. 11, p. 47, doi. 10.17345/elop202247-60
- By:
- Publication type:
- Article
Credit Fraud Recognition Based on Performance Evaluation of Deep Learning Algorithm.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 1, p. 1, doi. 10.25195/ijci.v50i1.454
- By:
- Publication type:
- Article
Evaluation of pharmacists' awareness of illegal online pharmacies and perceived impact on safe access to medicines.
- Published in:
- Medicine Access @ Point of Care, 2021, p. 1, doi. 10.1177/23992026211005642
- By:
- Publication type:
- Article
SEMANTIC ANALYSIS OF FRAUDULENT ADS IN FACEBOOK.
- Published in:
- LiNGUA, 2019, v. 14, n. 1, p. 161, doi. 10.18860/ling.v14i1.6114
- By:
- Publication type:
- Article
Transact Safe: A Machine Learning Shield against Online Fraud.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3413
- By:
- Publication type:
- Article
Credit Card Fraud Detection using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 861
- By:
- Publication type:
- Article
The Internet Jurisdiction Risk of Cloud Computing.
- Published in:
- Information Systems Management, 2010, v. 27, n. 4, p. 334, doi. 10.1080/10580530.2010.514248
- By:
- Publication type:
- Article
Online payment fraud: from anomaly detection to risk management.
- Published in:
- Financial Innovation, 2023, v. 9, n. 1, p. 1, doi. 10.1186/s40854-023-00470-w
- By:
- Publication type:
- Article
Prospects Of E-Commerce In Rural Area Of Mandi District In Himachal Pradesh.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 2195
- By:
- Publication type:
- Article
CYBER SECURITY: A LONGITUDINAL EXAMINATION OF UNDERGRADUATE BEHAVIOR AND PERCEPTIONS.
- Published in:
- ASBBS eJournal, 2013, v. 9, n. 1, p. 21
- By:
- Publication type:
- Article
Pyramid: A Case Study of Cyber Security in India.
- Published in:
- 2015
- By:
- Publication type:
- Case Study
Supporting crime script analyses of scams with natural language processing.
- Published in:
- Crime Science, 2023, v. 12, n. 1, p. 1, doi. 10.1186/s40163-022-00177-w
- By:
- Publication type:
- Article
Correction: Offline crime bounces back to pre-COVID levels, cyber stays high: interrupted time-series analysis in Northern Ireland.
- Published in:
- 2022
- By:
- Publication type:
- Correction Notice
Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits.
- Published in:
- Crime Science, 2020, v. 9, n. 1, p. 1, doi. 10.1186/s40163-020-00119-4
- By:
- Publication type:
- Article
Did cybercrime cause the crime drop?
- Published in:
- Crime Science, 2018, v. 7, n. 1, p. 1, doi. 10.1186/s40163-018-0082-8
- By:
- Publication type:
- Article
Victims of cybercrime in Europe: a review of victim surveys.
- Published in:
- Crime Science, 2018, v. 7, n. 1, p. 1, doi. 10.1186/s40163-018-0079-3
- By:
- Publication type:
- Article
Study of Deterrents to Online Purchase Intentions.
- Published in:
- International Journal of Marketing & Business Communication, 2022, v. 11, n. 2/3, p. 1
- By:
- Publication type:
- Article
STUDY OF ONLINE MISREPRESENTATION, SELF-DISCLOSURE, CYBER-RELATIONSHIP MOTIVES, AND LONELINESS AMONG TEENAGERS IN TAIWAN.
- Published in:
- Journal of Educational Computing Research, 2013, v. 48, n. 1, p. 1, doi. 10.2190/EC.48.1.a
- By:
- Publication type:
- Article
A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions.
- Published in:
- Computer Journal, 2013, v. 56, n. 5, p. 646, doi. 10.1093/comjnl/bxs025
- By:
- Publication type:
- Article
Protecting Users against Phishing Attacks.
- Published in:
- Computer Journal, 2006, v. 49, n. 5, p. 554, doi. 10.1093/comjnl/bxh169
- By:
- Publication type:
- Article
The Fraud Diamond.
- Published in:
- CPA Journal, 2024, v. 94, n. 3/4, p. 16
- By:
- Publication type:
- Article
Identity-Theft Toolkit.
- Published in:
- CPA Journal, 2006, v. 76, n. 10, p. 66
- By:
- Publication type:
- Article
Internet Fraud: Federal Trade Commission Prosecutions of Online Conduct.
- Published in:
- Communications & the Law, 2001, v. 23, n. 2, p. 55
- By:
- Publication type:
- Article
Defending the weakest link: phishing websites detection by analysing user behaviours.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 215, doi. 10.1007/s11235-009-9247-9
- By:
- Publication type:
- Article
A lightweight and proactive rule-based incremental construction approach to detect phishing scam.
- Published in:
- Information Technology & Management, 2022, v. 23, n. 4, p. 271, doi. 10.1007/s10799-021-00351-7
- By:
- Publication type:
- Article
A comparison of fraud cues and classification methods for fake escrow website detection.
- Published in:
- Information Technology & Management, 2009, v. 10, n. 2/3, p. 83, doi. 10.1007/s10799-009-0059-0
- By:
- Publication type:
- Article
The Computer Fraud and Abuse Act -- A Survey of Recent Cases.
- Published in:
- Business Lawyer, 2010, v. 66, n. 1, p. 231
- By:
- Publication type:
- Article
Identifying the Identity Thief: Is it time for a (smart) Australia Card?#.
- Published in:
- International Journal of Law & Information Technology, 2008, v. 16, n. 2, p. 125, doi. 10.1093/ijlit/eam008
- By:
- Publication type:
- Article
Online Auction Fraud: Ethical Perspective.
- Published in:
- 2008
- By:
- Publication type:
- Report