To see the other types of publications on this topic, follow the link: Cyber border.

Journal articles on the topic 'Cyber border'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber border.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yongming, Zhou. "Living on the Cyber Border." Current Anthropology 46, no. 5 (2005): 779–803. http://dx.doi.org/10.1086/432453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

OKA, Nobuto, and Shuichi IWATA. "Cyber Connection for Cross-border Collaboration." Joho Chishiki Gakkaishi 17, no. 1 (2007): 32–40. http://dx.doi.org/10.2964/jsik.17.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DRAGOMIR, Andreea. "Cyber Diplomacy." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 37–50. http://dx.doi.org/10.19107/ijisc.2021.02.05.

Full text
Abstract:
The article aims to highlight issues related to the risks to both the European Union and the Member States, but at the same time seeks to highlight current legislative and political approaches applicable in cyberspace. This set of tools used in cyber diplomacy includes the concepts of cooperation and diplomatic dialogue (common cyber network of EU states, common cyber defense unit) but also measures to prevent cyber-attacks (European Union Cyber Security Strategy), as well as sanctions. Throughout this presentation, the main idea is supported by the cross-border nature of cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
4

Chatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siva Krishna Jampani. "Cross-border cybersecurity collaboration-building a global framework for threat." World Journal of Advanced Engineering Technology and Sciences 14, no. 2 (2025): 001–10. https://doi.org/10.30574/wjaets.2025.14.2.0034.

Full text
Abstract:
This research paper aims at focusing on the concepts of cross-border cybersecurity cooperation because of compounding and diversifying international threats. In the modern world, it becomes increasingly important to understand that the problem of cyber threats requires international cooperation. The paper explores the nature and patterns of cybersecurity threats and cyber aggressive actions throughout the world, types of cyber warfare attacks and penetration, and their socio-political and economic implications. Special emphasis is made on such threats as artificial intelligence-based attackers
APA, Harvard, Vancouver, ISO, and other styles
6

Rizwan Iqbal, Nadia Mustaqim Ansari, Muhammad Ismail, Maqsood ur Rehman Awan, Hassam Gul, and Muhammad Mateen. "<b>Global Cyber Security in the Age of Cross-Border Threat Intelligence: Addressing Barriers, Leveraging AI, and Defining the Next Generation of Cyber Defense</b>." Annual Methodological Archive Research Review 3, no. 4 (2025): 369–90. https://doi.org/10.63075/wnvgq911.

Full text
Abstract:
The global cybersecurity environment demands rising importance on cross-border threat intelligence combined with artificial intelligence systems because these tools help organizations protect against modern cyber threats. The study explores international cyber collaboration barriers together with AI assessment in defense as well as it defines essential strategic aspects for next-generation cybersecurity frameworks. The researchers conducted quantitative research through the collection of surveys which gathered responses from multiple nations' cybersecurity professionals working across public a
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Linqi, and Yanzhu Wang. "Cross-Border Data Flow Regulatory System under the Holistic View of National Security." International Journal of Education and Humanities 19, no. 1 (2025): 72–76. https://doi.org/10.54097/se3fsr09.

Full text
Abstract:
General Secretary Xi Jinping has repeatedly put forward the holistic view of national security and the construction of a Cyber power on multiple important occasions such as the 20th National Congress of the Communist Party of China. Improving the supervision of cross-border data flow is an inevitable measure to ensure national security and is also the inherent meaning of building a Cyber power. Under the strategic guidance of the overall national security concept, by reviewing the current practice of cross-border data flow in China and combining with foreign legislative experience, we can find
APA, Harvard, Vancouver, ISO, and other styles
8

COMAN, Iulian Marius. "Cross-Border Cyber-Attacks and Critical Infrastructure Protection." International Journal of Information Security and Cybercrime 6, no. 2 (2017): 47–52. http://dx.doi.org/10.19107/ijisc.2017.02.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pandey, Arpit. "Cyber Security: Cyber Fraud on Carding: A Review." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2525–29. http://dx.doi.org/10.22214/ijraset.2021.36882.

Full text
Abstract:
This chapter provides one person case study of Mr. Dan DeFilippi who was arrested for master card fraud by the US u. s. SS in December 2004. The episode delves into the psychology of a cybercriminal and also the inside workings of master card fraud. A background context of master card fraud is presented to border the first interview. Slightly on the identification of issues and controversies with reference to carding is then given. Finally, the convicted cybercriminal turned key informant makes advice on how to reduce the growing prevalence of cybercrime. A giant finding is that master card fr
APA, Harvard, Vancouver, ISO, and other styles
10

-, Salmiati. "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict." Jurnal Ilmu Hubungan Internasional LINO 4, no. 2 (2025): 123–46. https://doi.org/10.31605/lino.v4i2.3582.

Full text
Abstract:
Nowadays, the need for the internet is increasing as seen from China and India as the countries with the world's largest population and the world's largest internet users. In this study, entitled "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict", the researcher aims to find out how China's foreign policy strategy responds to internet censorship by India. This study uses the concepts of foreign policy, cyber attack and cyber security. This research is a descriptive research that uses literature studies and utilizes primary and secondary data obtained thro
APA, Harvard, Vancouver, ISO, and other styles
11

Wong, Ho Ming. "Research on International Cooperation in Cracking down Cross-border Cyber-telecoms Fraud." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 8–14. http://dx.doi.org/10.62051/dfk43n30.

Full text
Abstract:
Recently, the rampant criminal activities of Scam Clan in Northern Myanmar have attracted international attention. In combating such crimes, international cooperation is crucial. However, numerous challenges arise in the fight against cyber-telecoms fraud, including differences in national, difficulties in gathering criminal evidence, and inadequacy of extradition mechanisms, among others. Based on this, exploring the theoretical aspects of cross-border phone fraud crimes, reviews the current state of legal regulation both domestically and internationally, and analyzes the difficulties in crac
APA, Harvard, Vancouver, ISO, and other styles
12

یرامیس عمر, دژوار أحمد. "المواجهة الجنائية للتسول الالكتروني". Yaqeen Journal for Legal Studies 3, № 2 (2025): 44. https://doi.org/10.56599/yaqeenjournal.v3i2.94.

Full text
Abstract:
This research examines a cyber cross border begging crime exploiting digital platforms and legislative gaps, particularly in Iraqi law, which lacks explicit criminalization and regulation of digital evidence. adopting an analytical-comparative approach with Saudi legislation, the study emphasizes on amending and updating Iraqi laws to address technological complexities, enhancing international cooperation through agreements, establishing specialized courts; Additionally, adopting preventive strategies including exchanging information and awareness campaigns. Finally, this research recommends e
APA, Harvard, Vancouver, ISO, and other styles
13

Priyono, Ujang. "CYBER WARFARE AS PART OF RUSSIA AND UKRAINE CONFLICT." Jurnal Diplomasi Pertahanan 8, no. 2 (2022): 44. http://dx.doi.org/10.33172/jdp.v8i2.1005.

Full text
Abstract:
Russia and Ukraine have had tense relations since 2014, with violence erupting as a result. Cyber-attacks have become an integral aspect of this conflict, in addition to the border issue and the separatist movement in Ukraine. Tensions between the two countries grew in 2021, and a significant cyber attack on the Ukrainian government website occurred in early 2022. Because the Ukrainian government claims that Russia was the brains behind the cyber assault, it has exacerbated the dispute between the two countries. Based on the timing of the wars and cyber attacks related to Ukraine, the goal of
APA, Harvard, Vancouver, ISO, and other styles
14

Mozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.

Full text
Abstract:
Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terror
APA, Harvard, Vancouver, ISO, and other styles
15

Nidhi, Arya. "Cyber Crime Scenario in India and Judicial Response." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1108–12. https://doi.org/10.31142/ijtsrd24025.

Full text
Abstract:
The internet in India is growing rapidly. It has given rise to new opportunity in every field like - entertainment, business, sports, education etc. It is universally true that every coin has two sides, same for the internet, it uses has both advantage and disadvantage, and one of the most disadvantage is Cyber crime.1 Cyber crime is emerging as a serious threat. Worldwide governments, police departments and intelligence units have started to react2. Initiatives to curb cross border cyber threats are taking shape. Indian police has initiated special cyber cells across the country and have star
APA, Harvard, Vancouver, ISO, and other styles
16

Trofymenko, Volodymyr. "THE STATE AS A SPECIAL SUBJECT OF CYBERSPACE." Bulletin of Yaroslav Mudryi National Law University. Series: philosophy, philosophy of law, political science, sociology : The collection of scientific papers 4, no. 59 (2023): 78–92. https://doi.org/10.21564/2663-5704.59.289691.

Full text
Abstract:
The publication is devoted to the status and place of the state in cyberspace. Issues of cyber sovereignty and cyber security of the state are being raised. The special capabilities of the state to regulate cyberspace at the legislative level are outlined. The problem of states abusing the opportunities of cyberspace for their own purposes and the issue of opposing such activities is considered separately. The problem of cyberspace at the international level is described, as well as the problems of international law in regulating this sphere.
APA, Harvard, Vancouver, ISO, and other styles
17

Christian Chukwuemeka Ike, Sikirat Damilola Mustapha, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Strengthening cross-border technology integration with a collaborative cybersecurity model for U.S. and Canada." Magna Scientia Advanced Research and Reviews 12, no. 1 (2024): 275–94. https://doi.org/10.30574/msarr.2024.12.1.0153.

Full text
Abstract:
As technological advancements continue to drive cross-border collaborations between the United States and Canada, cybersecurity challenges have emerged, hindering the seamless integration of digital infrastructure. This abstract explores the need for strengthening cross-border technology integration through the development of a collaborative cybersecurity model that enhances data protection, mitigates cyber threats, and fosters innovation. The integration of emerging technologies, such as cloud computing, IoT, and artificial intelligence, has led to an increased flow of sensitive data between
APA, Harvard, Vancouver, ISO, and other styles
18

Sharipov, F. F., and M. A. Dyakonova. "Prospects for the development of cross—border electronic commerce between the Russian Federation and the People’s Republic of China." Entrepreneur’s Guide 14, no. 3 (2021): 18–28. http://dx.doi.org/10.24182/2073-9885-2021-14-3-18-28.

Full text
Abstract:
Among the trends of business development on the border territory between Russia and China, according to the authors, electronic commerce is attractive. Practical examples have identified the development of cross–border e–commerce between our countries, taking into account the variety, pricing, promotion and settlement of the delivered goods. Sales are projected to grow steadily over the next four years, considering the need to adopt the latest technologies and cyber security requirements.
APA, Harvard, Vancouver, ISO, and other styles
19

Obet, Dedy, Suharto Suharto, and Henri Mujoko. "CYBER COOPERATION IN THE FRAMEWORK OF THE ASEAN REGIME." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 2 (2021): 254. http://dx.doi.org/10.33172/jp.v7i2.1264.

Full text
Abstract:
&lt;div&gt;&lt;p class="Els-history-head"&gt;The COVID-19 pandemic has a given significant impact on both economics and internet-based digital services in Southeast Asia. It also applied to cross-border nontraditional security issues such as cyber-attacks that evolve continuously. The complexity of prevention acts towards cyber threats in Southeast Asia is quite complicated. Therefore, the ASEAN countries should form strong cooperation due to many anonymous and impromptu attacks. This research aims to analyze cyber cooperation within the ASEAN framework. The method applied in this article is t
APA, Harvard, Vancouver, ISO, and other styles
20

Ferlina Mutiara Farah and Halimatus Khalidawati Salmah. "Comparison of Criminal Provisions on Cybercrime In Indonesia and Singapore." Widya Gama Law Review 2, no. 1 (2025): 67–84. https://doi.org/10.31328/wglr.v2i1.709.

Full text
Abstract:
This article compares the cyber law frameworks of Indonesia and Singapore, two key Southeast Asian countries in the digital era. Using a normative juridical and comparative approach, the study analyzes similarities and differences in the regulation and implementation of cyber laws, focusing on the scope of cybercrime, procedures for digital evidence, personal data protection, and international cooperation. The findings show that Singapore adopts a more integrated and risk-based approach, particularly in personal data protection and critical infrastructure security, while Indonesia’s framework
APA, Harvard, Vancouver, ISO, and other styles
21

Sam, Jillet Sarah. "Caste Diasporas beyond National Boundaries: Digital Caste Networks." Perspectives on Global Development and Technology 16, no. 1-3 (2017): 145–59. http://dx.doi.org/10.1163/15691497-12341425.

Full text
Abstract:
Although castes are organizing as cross-border formations empirically, the literature seems preoccupied with analyzing caste diasporas in terms of the boundaries of the nation-state. This article examines how digital caste networks serve as border-spanning caste diaspora by drawing on Steven Vertovec’s conceptualization of a diaspora. The analysis draws on ethnographic data to analyze the case of the Cyber Thiyyars of Malabar, a digital caste network that seeks to mobilize members of the Thiyya caste by foregrounding regional affiliations with Malabar.
APA, Harvard, Vancouver, ISO, and other styles
22

Mazhorina, M. V. "Digital Platforms and International Private Law, or Is There a Future for Cyber Law?" Lex Russica, no. 2 (February 1, 2019): 107–20. http://dx.doi.org/10.17803/1729-5920.2019.147.2.107-120.

Full text
Abstract:
Modern economy and society are reconfigured in connection with the emergence and development of digital platforms, which is figuratively referred to as “uberization of everything”. This became possible with the development of information and communication technologies and the formation of cyberspace. The key problem for lawyers is the construction of the legal superstructure of cyberspace, which leads to the emergence of a number of concepts: cyberlaw, “platform law”, internet law etc. However, while science is trying to comprehend the relevant paradigm shifts, a huge array of cross-border tra
APA, Harvard, Vancouver, ISO, and other styles
23

Dr., Vinod Dnyanoba Pawar. "Indias cross border e-commerce and tread policies." International Journal of Advance and Applied Research S6, no. 16 (2025): 98–102. https://doi.org/10.5281/zenodo.15130639.

Full text
Abstract:
<em>Cross-border e-commerce is a transformative driver of global trade, enabling businesses to expand internationally and offering consumers diverse product choices. This paper explores the rapid growth of this sector, supported by technological advancements, innovative logistics, and government initiatives. It highlights its significance for SMEs, economic development, and consumer accessibility. The study also examines challenges, including regulatory complexities, data privacy, logistical bottlenecks, and cyber security threats. Regional policies from China, the EU, India, and the US are re
APA, Harvard, Vancouver, ISO, and other styles
24

Foster, Thomas. "Cyber-Aztecs and Cholo-Punks: Guillermo Gómez-Peña's Five-Worlds Theory." Publications of the Modern Language Association of America 117, no. 1 (2002): 43–67. http://dx.doi.org/10.1632/003081202x63500.

Full text
Abstract:
In the study of postmodern technocultures, including computer-mediated communication and popular narratives about cyberspace, the status of embodiment has emerged as a key question, especially in the context of popular rhetorics that imagine the Internet as a site of freedom from embodied particularity. But while analyses of gender bending and sexual performance on the Internet abound, the future of race in cyberspace has been relatively neglected. This essay traces recent developments in the work of the Mexican American performance artist Guillermo Gómez-Peña, whose earlier interests in immig
APA, Harvard, Vancouver, ISO, and other styles
25

Lubis, Ikhsan, Taufiq Siregar, Duma Indah Sari Lubis, and Andi Hakim Lubis. "Exploring the Potential of the Cyber Notary Concept in the Framework of International Transaction Settlement." Acta Law Journal 3, no. 1 (2024): 1–13. https://doi.org/10.32734/alj.v3i1.18891.

Full text
Abstract:
This article examines the potential of Cyber Notary in facilitating international transactions and the legal challenges involved. With increasing demand for swift and secure cross-border transactions, technologies like digital signatures and blockchain offer innovative solutions for faster document validation. Successful implementations of Remote Online Notarization (RON) in the United States and the eIDAS standard in Europe highlight their effectiveness in enhancing efficiency. In Indonesia, challenges such as regulatory inconsistencies, limited public trust in digital documents, and cybersec
APA, Harvard, Vancouver, ISO, and other styles
26

Rusydi, Muhammad Taufik. "Cyber Law Policy Development: Indonesia's Response to International Cybercrime Threats." Journal of Progressive Law and Legal Studies 3, no. 01 (2025): 69–85. https://doi.org/10.59653/jplls.v3i01.1365.

Full text
Abstract:
The rapid development of information technology has driven the growth of the digital economy but also increased the threat of cross-border cybercrime. In Indonesia, cyber law regulation still faces challenges, both in terms of legal substance, institutions, and implementation of law enforcement. This article aims to explore the strengthening of cyber law policy in Indonesia to face global challenges in cybercrime. This article identifies various weaknesses in existing policies using a juridical-normative research method and a descriptive-analytical approach. It recommends strengthening regulat
APA, Harvard, Vancouver, ISO, and other styles
27

Kashami, Ilda, and Arjan Çuri. "Cyberdeviance in the Western Balkans and ICT-Media-Based Protection." Open Journal for Information Technology 6, no. 1 (2023): 59–66. http://dx.doi.org/10.32591/coas.ojit.0601.05059k.

Full text
Abstract:
The objective of the present paper research is to explore some of the basic aspects of the relationship between cyber-deviant behaviors and the role of border security and cyber security structures that exist in the cyber-digitalization process. The present article intersects diagonal aspects of deviant cyberculture and the role of media and police officers in the screening and prevention of criminal extreme acts. The research also provides a reflective view of consumerism that digitalization brings to the constant formation of adolescents. The implementation of misguided protection strategies
APA, Harvard, Vancouver, ISO, and other styles
28

Pratap, Ajay. "Strengthening Global Cybersecurity: India’s Engagement in International Cybercrime Control." Stallion Journal for Multidisciplinary Associated Research Studies 4, no. 2 (2025): 315–19. https://doi.org/10.55544/sjmars.4.2.21.

Full text
Abstract:
In an increasingly interconnected digital world, cybercrime has emerged as a transnational threat demanding coordinated global responses. India, as one of the largest digital economies, plays a pivotal role in fostering international cooperation to combat cybercrime. This study explores India’s engagement in global cybersecurity initiatives, focusing on its bilateral and multilateral collaborations, legislative frameworks, and partnerships with international organizations such as INTERPOL, UNODC, and the Global Forum on Cyber Expertise. The paper highlights India's efforts to harmonize cyber l
APA, Harvard, Vancouver, ISO, and other styles
29

Dewi, Arie Setya, and Henny Saptatia Drajati Nugrahani. "Strengthening EU Cyber Resilience: A Critical Analysis of the Cyber Solidarity Act’s Legislative Framework." Journal of Islamic World and Politics 8, no. 2 (2024): 182–95. https://doi.org/10.18196/jiwp.v8i2.115.

Full text
Abstract:
This study aims to analyze the importance of the EU’s Bill on Cyber Solidarity Act (bill) in order to strengthen the EU’s cyber resilience by enhancing preparedness and achieving equal capacities of EU member states in dealing with significant and large-scale cyber incidents. The cross-border nature of cybersecurity incidents can be too disruptive for a single or some affected member states to tackle on its own, necessitating collective action at the EU level. This study applied the qualitative method with library research using secondary data sourced from scientific journals and official docu
APA, Harvard, Vancouver, ISO, and other styles
30

Susanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.

Full text
Abstract:
In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invali
APA, Harvard, Vancouver, ISO, and other styles
31

Strelbitskyi, Mykhailo. "THE INFORMATION SYSTEM CYBERSECURITY CONCEPT OF THE STATE BORDER GUARD SERVICE OF UKRAINE AT THE MODERNIZATION STAGE." Information systems and technologies security, no. 1 (1) (2019): 3–10. http://dx.doi.org/10.17721/ists.2019.1.3-10.

Full text
Abstract:
The article analyzes the functions of the Border Guard Service of Ukraine and its information systems. It is determined that the modernization of the components of the integrated information system causes a violation of the existing system of cyber defense. The analysis of existing approaches to ensuring the protection of information in information systems has shown a sufficiently deep study of research separately for each information system. However, unexperienced features of the interaction of these systems remain, in particular, with the modernization of certain information systems in terms
APA, Harvard, Vancouver, ISO, and other styles
32

Astuti, Sri Ayu. "Law Enforcement of Cyber Terorism in Indonesia." Rechtsidee 2, no. 2 (2015): 157. http://dx.doi.org/10.21070/jihr.v2i2.82.

Full text
Abstract:
Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving mas
APA, Harvard, Vancouver, ISO, and other styles
33

Fauzan Prasetyo Eka Putra, Dea Aulia Siswoyo, M. Idris Ainul Yaqin, and Rica Oktavia. "Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 126–34. https://doi.org/10.55606/jitek.v5i1.6141.

Full text
Abstract:
This study discusses 5G network security regulations and policies from a national and international perspective, with a focus on the challenges and handling of global cyber threats. Given the cross-border threats, security and regulation are important issues in the implementation of 5G technology. The approach used is qualitative interpretive with additional limited experiments, including cyber attack simulations. The result of the study show that cyber policies in Indonesia are not yet fully coordinated, unlike countries such as the US, the European Union, and China which have more comprehens
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.

Full text
Abstract:
Current railroad customs clearance systems are problematic in that the movement of trains is occasionally restricted for extended periods during inspections to verify cargo integrity at customs clearance. Consequently, significant human and material resources are consumed to obtain customs clearance to the destination, considering different processes exist for cross-border trade. Therefore, we developed a cross-border blockchain-based non-stop customs clearance (NSCC) system to address these delays and reduce resource consumption for cross-border trains. The integrity, stability, and traceabil
APA, Harvard, Vancouver, ISO, and other styles
35

Kasper, Agnes, Anna-Maria Osula, and Anna Molnár. "EU cybersecurity and cyber diplomacy." IDP Revista de Internet Derecho y Política, no. 34 (December 13, 2021): 1–15. http://dx.doi.org/10.7238/idp.v0i34.387469.

Full text
Abstract:
Over the last decades cybersecurity has become a cornerstone of European digital development. Alongside with the diffusion of information and communication technologies and the deepening (as well as widening) of the European Union, the initial narrow and sectoral data security policies have expanded into a comprehensive cybersecurity framework addressing issues from resilient infrastructure and technological sovereignty, through tackling cybercrime, to cyber defence capabilities and responsible state behaviour in cyberspace. In this complex web of interrelated policies a relative newcomer at t
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Chia-Mei, Zheng-Xun Cai, and Dan-Wei (Marian) Wen. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents." Journal of Global Information Management 30, no. 2 (2022): 1–19. http://dx.doi.org/10.4018/jgim.20220301.oa5.

Full text
Abstract:
The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future success of e-commerce depends on enhanced online privacy and security. However, investigating security incidents is time- and cost-intensive as identifying telltale anomalies and the source of attacks requires the use of multiple forensic tools and technologies and security domain knowledge. Prompt responses to cyber-attacks are important to reduce damage and loss and to
APA, Harvard, Vancouver, ISO, and other styles
37

Sikder, Abu Sayed, and Stephen Rolfe. "The Power of E-Commerce in the Global Trade Industry: A Realistic Approach to Expedite Virtual Market Place and Online Shopping from anywhere in the World." International Journal of Imminent Science & Technology. 1, no. 1 (2011): 79–100. https://doi.org/10.70774/ijist.v1i1.3.

Full text
Abstract:
This research paper delves into the transformative influence of e-commerce within the expansive realm of global trade. Focused on elucidating the dynamics of cross-border online shopping, the study scrutinizes the intricate interplay between consumer behavior and cybersecurity measures, crucial in fostering trust and fortifying the online marketplace. Two key domains are meticulously examined. Firstly, an in-depth analysis probes into the multifaceted realm of Consumer Behavior in Cross-Border E-commerce Transactions. Through comprehensive surveys and literature reviews, the study explores the
APA, Harvard, Vancouver, ISO, and other styles
38

Nusa, Idham Qrida, Bambang Sugiri, Yuliati Yuliati, and Faizin Sulistio. "Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers." International Journal of Islamic Education, Research and Multiculturalism (IJIERM) 7, no. 2 (2025): 776–802. https://doi.org/10.47006/ijierm.v7i2.475.

Full text
Abstract:
This journal analyzes the procedural criminal law (KUHAP) in dealing with cybercrime within formal legal law. The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. As a case study to show how cyber criminals commit cyber crimes by using computer networks, investigators still face difficulties in conducting searches and seizures to obtain evidence. The results of data theft crimes which are stored in cloud storage, make digital evidence difficult to be seized, nothing can be used as evidence. As a result, digital evidence from c
APA, Harvard, Vancouver, ISO, and other styles
39

Pritam, Subba. "SIKKIM POLICE - A STUDY OF ITS HISTORY, COMPOSITION AND CHALLENGES AHEAD." International Journal of Multidisciplinary Research and Modern Education (IJMRME) 8, no. 2 (2022): 23–28. https://doi.org/10.5281/zenodo.7494207.

Full text
Abstract:
The State of Sikkim is the smallest state of India in terms of population, but due to its sharing international border with three countries makes it strategically important. Moreover, with ever increasing population, tourists and migrant workers, increase in traditional crimes and also new age crimes like cyber offences is on a rise. The Sikkim Police, a small but capable unit since its inception 125 years ago, has been playing a vital role in maintaining law and order in the state and to a large extent has achieved that objective.&nbsp; However, times are changing and with the new challenges
APA, Harvard, Vancouver, ISO, and other styles
40

Budi, Eko, Dwi Wira, and Ardian Infantono. "Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0." Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO) 3 (December 21, 2021): 223–34. http://dx.doi.org/10.54706/senastindo.v3.2021.141.

Full text
Abstract:
Konsep Society 5.0 berpusat pada manusia dan berbasis teknologi. Dimana penggerak utama industri adalah teknologi dan masyarakat modern. Di era teknologi dan informasi berkembang dengan pesat memiliki dampak terhadap seluruh aspek kehidupan. Salah satunya adalah aspek keamanan berupa ancaman cyber crime. Oleh karena itu cyber security mempunyai peran vital untuk mencegah terjadinya cyber crime. Tujuan dari penelitian ini adalah untuk memperoleh gambaran tentang cyber crime dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka me
APA, Harvard, Vancouver, ISO, and other styles
41

Qiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu, and Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge." Applied Sciences 14, no. 14 (2024): 6189. http://dx.doi.org/10.3390/app14146189.

Full text
Abstract:
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cro
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Rui, Yingxian Chang, Lei Ma, et al. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.

Full text
Abstract:
Abstract Now the computer has been completely towards the public, the network in daily life is more and more widely used, but at the same time, the potential network security problems are also more and more serious. Some sophisticated computer people in order to make money, crack other personal users or company information, a variety of network attacks one after another. Cyber attack has become an extremely feared existence for ordinary people because of its wide range of attacks, strong attack force and obvious hiding effect, which seriously threatens the security of personal information netw
APA, Harvard, Vancouver, ISO, and other styles
43

Pleskach, Mariia, Valentyna Pleskach, Andrii Semenchenko, Danylo Myalkovsky, and Taras Stanislavsky. "Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine." Information & Security: An International Journal 45 (2020): 57–76. http://dx.doi.org/10.11610/isij.4504.

Full text
Abstract:
This article demonstrates the similarity of approaches to standardization in the field of cybersecurity carried out by international standardization organizations (ISO, ITU, ETSI), leading regional organizations and selected countries. The authors consider necessary that Ukrainian committees of standardization report on the effectiveness of adopted cybersecurity standards. The harmonization of national with the international standards is essential for saving financial resources and time, and ensuring cross-border cooperation. The article considers a number of standardization organizations and
APA, Harvard, Vancouver, ISO, and other styles
44

Sari, Neti Mustika, and Putu Samawati. "PERDAGANGAN ORANG DALAM RANAH CYBER CRIME: TANTANGAN DAN PROSPEK PENEGAKAN HUKUM DI ERA DIGITAL." Solusi 22, no. 3 (2024): 246–56. https://doi.org/10.36546/solusi.v22i3.1329.

Full text
Abstract:
Human trafficking has become one of the most disturbing transnational crimes of the 21st century. Meanwhile, advances in information and communication technology have had a significant impact on the dynamics of this crime, with cyber space becoming a new place for perpetrators to carry out human trafficking activities. In this context, this research aims to dig deeper into the criminal act of human trafficking in the realm of cyber crime, highlighting the challenges faced by law enforcement and the prospects for combating it in the digital era. Research findings show that human trafficking in
APA, Harvard, Vancouver, ISO, and other styles
45

Judijanto, Loso. "National Security Strategies Amidst Increasing Global Cyber Threats: A Multilateral Approach." Synergisia 1, no. 2 (2024): 11–18. https://doi.org/10.62872/2wph4p15.

Full text
Abstract:
In today's digital age, the development of information technology has a significant impact on various sectors, including the economy, politics and security. While technology provides opportunities for efficiency and innovation, it also introduces increasingly complex cyber threats. Cyberattacks now target not only individuals, but also large institutions, multinational corporations and governments, resulting in economic losses and threatening the socio-political stability of a country. Indonesia, like many other countries, faces growing cyber threats, including e-HAC data leaks and ransomware
APA, Harvard, Vancouver, ISO, and other styles
46

Mohite, Kalpana. "Legal Challenges and Frameworks in Cybersecurity: A Critical Analysis." International Journal of Advance and Applied Research 6, no. 25(C) (2025): 24–28. https://doi.org/10.5281/zenodo.15321440.

Full text
Abstract:
<strong>Abstract:</strong> In an increasingly digitized world, cybersecurity has become a critical domain of concern for governments, organizations, and individuals alike. This research paper critically examines the existing legal frameworks governing cybersecurity at both national and international levels. It highlights the rapid evolution of cyber threats&mdash;ranging from data breaches and ransomware to state-sponsored cyberattacks&mdash;and the corresponding legal and regulatory gaps that hinder effective responses. The paper analyses key legal instruments, evaluates enforcement challenge
APA, Harvard, Vancouver, ISO, and other styles
47

Evdokimov, Konstantin N. "CRIMINOLOGICAL AND CRIMINAL LAW ASPECTS OF COMBATING CYBER CRIME IN RUSSIA (SOCIOLOGICAL RESEARCH)." Russian investigator 11 (November 12, 2020): 41–44. http://dx.doi.org/10.18572/1812-3783-2020-11-41-44.

Full text
Abstract:
The problem of the evolution of computer crime into high-tech crime, its cross-border, transnational, organized and latent nature, requires the scientific community and law enforcement agencies to develop new conceptual approaches to counter this asocial phenomenon. In the scientific article, the author, taking into account the opinion of computer users, proposes a number of measures to prevent, combat and minimize the harmful consequences of computer crimes in the Russian Federation.
APA, Harvard, Vancouver, ISO, and other styles
48

Kim, Ahyeon. "The Impact of the USMCA Trade Agreement on the U.S.-Mexico Border Security Cooperation." Eximia 13 (December 23, 2024): 1066–69. https://doi.org/10.47577/eximia.v13i1.522.

Full text
Abstract:
The United States-Mexico-Canada Agreement (USMCA) replaced its predecessor, the North American Free Trade Agreement (NAFTA), and has provided crucial updates to make the agreement relevant to the 21st century. Developing the connection between the two bordering nations and increasing security without sacrificing trade benefits allowed for additional developments in information-sharing systems, cyber security, and AI for threat detection. This paper aims to explore the impact of the updated agreement as well as its potential future implications and ramifications.
APA, Harvard, Vancouver, ISO, and other styles
49

Lawal Qudus. "Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges." International Journal of Science and Research Archive 14, no. 1 (2025): 1146–63. https://doi.org/10.30574/ijsra.2025.14.1.0225.

Full text
Abstract:
In an increasingly interconnected world, cybercrime and data privacy challenges have escalated into critical global issues, threatening governments, organizations, and individuals alike. The proliferation of sophisticated cyberattacks, including ransomware, data breaches, and nation-state hacking, underscores the urgent need for robust cybersecurity governance. Compounding these threats are evolving regulatory landscapes and a lack of harmonized international frameworks, leaving gaps in addressing cross-border cybercrimes and ensuring data privacy. This article explores the imperative of stren
APA, Harvard, Vancouver, ISO, and other styles
50

Nurkhasanah, Kharisma Ika, and Zydane Maheswara Prasetyo. "Law Enforcement of State Jurisdiction in Hacking Crimes." Indonesian Journal of Applied and Industrial Sciences (ESA) 3, no. 3 (2024): 319–28. http://dx.doi.org/10.55927/esa.v3i3.9438.

Full text
Abstract:
Along with the development of information and communication technology, apart from having a positive impact with ease of communication and transactions, there are also negative impacts such as the emergence of crimes in cyberspace or cybercrime. Law enforcement regarding various types of cyber crime turns out to be problematic in practice, especially regarding purchasing problems. This research aims to determine and analyze law enforcement and secret regulations for hacking crimes as well as legal policies regarding the implementation of cyber law in hacking crimes in Indonesia. The author emp
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!