Works about CYBERCRIMINALS
1
- Convergence: The Journal of Research into New Media Technologies, 2025, v. 31, n. 3, p. 784, doi. 10.1177/13548565241303318
- Article
2
- Performance Improvement, 2016, v. 55, n. 8, p. 17, doi. 10.1002/pfi.21614
- Ritzman, Matthew E.;
- Kahle‐Piasecki, Lisa
- Article
3
- Advanced Space Law, 2020, v. 5, p. 101, doi. 10.29202/asl/2020/5/11
- Article
4
- i-Manager's Journal on Mobile Applications & Technologies, 2023, v. 10, n. 1, p. 23, doi. 10.26634/jmt.10.1.20103
- MURUGALAKSHMI S.;
- MIRIAM D., DOREEN HEPZIBAH;
- ROBIN, C. R. RENE
- Article
5
- International Journal of Knowledge Management & Practices, 2018, v. 6, n. 1, p. 21
- Article
6
- ISSA Journal, 2021, v. 19, n. 3, p. 28
- Izuakor, Chidubem Fidelis
- Article
7
- ISSA Journal, 2019, v. 17, n. 6, p. 9
- Article
8
- ISSA Journal, 2018, v. 16, n. 12, p. 23
- Article
9
- ISSA Journal, 2018, v. 16, n. 11, p. 12
- Article
10
- ISSA Journal, 2018, v. 16, n. 11, p. 5
- Article
11
- ISSA Journal, 2018, v. 16, n. 8, p. 15
- Article
12
- ISSA Journal, 2018, v. 16, n. 7, p. 44
- Article
13
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
15
- ISSA Journal, 2016, v. 14, n. 7, p. 20
- Article
16
- ISSA Journal, 2016, v. 14, n. 5, p. 22
- Article
17
- ISSA Journal, 2016, v. 14, n. 4, p. 14
- Article
18
- Journal of Strategic Studies, 2015, v. 38, n. 1/2, p. 4, doi. 10.1080/01402390.2014.977382
- Rid, Thomas;
- Buchanan, Ben
- Article
19
- Electronics (2079-9292), 2024, v. 13, n. 19, p. 3823, doi. 10.3390/electronics13193823
- Kyaw, Phyo Htet;
- Gutierrez, Jairo;
- Ghobakhlou, Akbar
- Article
20
- Defence Against Terrorism Review, 2017, v. 9, p. 35
- BRILL, Alan;
- SMOLANOFF, Jason
- Article
21
- Defence Against Terrorism Review, 2017, v. 9, p. 7
- Article
22
- Defence Against Terrorism Review, 2014, v. 6, n. 1, p. 7
- Brill, Alan;
- Keene, Lonnie
- Article
23
- Journal of Software: Evolution & Process, 2024, v. 36, n. 8, p. 1, doi. 10.1002/smr.2651
- Nabi, Maria;
- Ilyas, Muhammad;
- Ahmad, Jamil
- Article
24
- Columbia Journal of Transnational Law, 2019, v. 58, n. 1, p. 189
- Article
25
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 9, p. 165, doi. 10.14569/ijacsa.2024.0150917
- ur Rehman Shaikh, Mujeeb;
- Hassan, Mohd Fadzil;
- Akbar, Rehan;
- Ullah, Rafi;
- Savita, K. S.;
- Rehman, Ubaid;
- Yalli, Jameel Shehu
- Article
26
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1269, doi. 10.14569/ijacsa.2024.01504127
- Alqahtani, Abdulaziz Saeed;
- Altammami, Osamah A.;
- Haq, Mohd Anul
- Article
27
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 871, doi. 10.14569/ijacsa.2024.0150387
- Kale, Meenal R.;
- Deepa;
- N., Anil Kumar;
- Anantha, N. Lakshmipathi;
- Rao, Vuda Sreenivasa;
- Godla, Sanjiv Rao;
- Thenmozhi, E.
- Article
28
- PLoS ONE, 2022, v. 17, n. 7, p. 1, doi. 10.1371/journal.pone.0271436
- Fadel, Magdy M.;
- El-Ghamrawy, Sally M.;
- Ali-Eldin, Amr M. T.;
- Hassan, Mohammed K.;
- El-Desoky, Ali I.
- Article
29
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 3, p. 105, doi. 10.1080/19393555.2017.1308583
- Article
30
- Strategic Finance, 2014, v. 96, n. 1, p. 16
- Article
31
- Risk Management & Insurance Review, 2018, v. 21, n. 3, p. 435, doi. 10.1111/rmir.12109
- Marotta, Angelica;
- McShane, Michael
- Article
32
- Social Science Computer Review, 2018, v. 36, n. 5, p. 591, doi. 10.1177/0894439317730296
- Article
33
- Journal of Tax Practice & Procedure, 2017, v. 19, n. 6, p. 17
- Article
34
- Journal of Tax Practice & Procedure, 2017, v. 19, n. 3, p. 43
- Article
35
- ITNOW, 2021, v. 63, n. 3, p. 41, doi. 10.1093/itnow/bwab083
- Article
36
- ITNOW, 2020, v. 62, n. 4, p. 46, doi. 10.1093/itnow/bwaa115
- Article
37
- ITNOW, 2016, v. 58, n. 4, p. 28, doi. 10.1093/itnow/bww101
- Article
38
- ITNOW, 2016, v. 58, n. 4, p. 26, doi. 10.1093/itnow/bww100
- Article
39
- ITNOW, 2015, v. 57, n. 2, p. 38, doi. 10.1093/itnow/bwv045
- Article
40
- ITNOW, 2015, v. 57, n. 2, p. 32, doi. 10.1093/itnow/bwv042
- Walker-Osborn, Charlotte;
- McLeod, Ben
- Article
41
- Debates IESA, 2014, v. 19, n. 4, p. 86
- Article
42
- Software Quality Professional, 2016, v. 18, n. 4, p. 3
- Article
43
- Journal of Financial Planning, 2019, v. 32, n. 4, p. 26
- Article
44
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- Article
45
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 2, p. 36, doi. 10.26634/jdf.1.2.19459
- Article
46
- Network (2673-8732), 2022, v. 2, n. 1, p. 139, doi. 10.3390/network2010010
- Mistareehi, Hassan;
- Manivannan, D.
- Article
47
- Network (2673-8732), 2022, v. 2, n. 1, p. 123, doi. 10.3390/network2010009
- Akpan, Frank;
- Bendiab, Gueltoum;
- Shiaeles, Stavros;
- Karamperidis, Stavros;
- Michaloliakos, Michalis
- Article
48
- Information & Media, 2023, v. 96, p. 80, doi. 10.15388/Im.2023.96.67
- Article
49
- ScienceRise: Juridical Science, 2022, v. 19, n. 1, p. 37, doi. 10.15587/2523-4153.2022.253820
- Article
50
- Hacer Empresa, 2021, n. 116, p. 14
- Article