Journal articles on the topic 'Cyber border'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber border.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yongming, Zhou. "Living on the Cyber Border." Current Anthropology 46, no. 5 (2005): 779–803. http://dx.doi.org/10.1086/432453.
Full textOKA, Nobuto, and Shuichi IWATA. "Cyber Connection for Cross-border Collaboration." Joho Chishiki Gakkaishi 17, no. 1 (2007): 32–40. http://dx.doi.org/10.2964/jsik.17.32.
Full textDRAGOMIR, Andreea. "Cyber Diplomacy." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 37–50. http://dx.doi.org/10.19107/ijisc.2021.02.05.
Full textChatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.
Full textSiva Krishna Jampani. "Cross-border cybersecurity collaboration-building a global framework for threat." World Journal of Advanced Engineering Technology and Sciences 14, no. 2 (2025): 001–10. https://doi.org/10.30574/wjaets.2025.14.2.0034.
Full textRizwan Iqbal, Nadia Mustaqim Ansari, Muhammad Ismail, Maqsood ur Rehman Awan, Hassam Gul, and Muhammad Mateen. "<b>Global Cyber Security in the Age of Cross-Border Threat Intelligence: Addressing Barriers, Leveraging AI, and Defining the Next Generation of Cyber Defense</b>." Annual Methodological Archive Research Review 3, no. 4 (2025): 369–90. https://doi.org/10.63075/wnvgq911.
Full textLi, Linqi, and Yanzhu Wang. "Cross-Border Data Flow Regulatory System under the Holistic View of National Security." International Journal of Education and Humanities 19, no. 1 (2025): 72–76. https://doi.org/10.54097/se3fsr09.
Full textCOMAN, Iulian Marius. "Cross-Border Cyber-Attacks and Critical Infrastructure Protection." International Journal of Information Security and Cybercrime 6, no. 2 (2017): 47–52. http://dx.doi.org/10.19107/ijisc.2017.02.07.
Full textPandey, Arpit. "Cyber Security: Cyber Fraud on Carding: A Review." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2525–29. http://dx.doi.org/10.22214/ijraset.2021.36882.
Full text-, Salmiati. "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict." Jurnal Ilmu Hubungan Internasional LINO 4, no. 2 (2025): 123–46. https://doi.org/10.31605/lino.v4i2.3582.
Full textWong, Ho Ming. "Research on International Cooperation in Cracking down Cross-border Cyber-telecoms Fraud." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 8–14. http://dx.doi.org/10.62051/dfk43n30.
Full textیرامیس عمر, دژوار أحمد. "المواجهة الجنائية للتسول الالكتروني". Yaqeen Journal for Legal Studies 3, № 2 (2025): 44. https://doi.org/10.56599/yaqeenjournal.v3i2.94.
Full textPriyono, Ujang. "CYBER WARFARE AS PART OF RUSSIA AND UKRAINE CONFLICT." Jurnal Diplomasi Pertahanan 8, no. 2 (2022): 44. http://dx.doi.org/10.33172/jdp.v8i2.1005.
Full textMozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.
Full textNidhi, Arya. "Cyber Crime Scenario in India and Judicial Response." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1108–12. https://doi.org/10.31142/ijtsrd24025.
Full textTrofymenko, Volodymyr. "THE STATE AS A SPECIAL SUBJECT OF CYBERSPACE." Bulletin of Yaroslav Mudryi National Law University. Series: philosophy, philosophy of law, political science, sociology : The collection of scientific papers 4, no. 59 (2023): 78–92. https://doi.org/10.21564/2663-5704.59.289691.
Full textChristian Chukwuemeka Ike, Sikirat Damilola Mustapha, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Strengthening cross-border technology integration with a collaborative cybersecurity model for U.S. and Canada." Magna Scientia Advanced Research and Reviews 12, no. 1 (2024): 275–94. https://doi.org/10.30574/msarr.2024.12.1.0153.
Full textSharipov, F. F., and M. A. Dyakonova. "Prospects for the development of cross—border electronic commerce between the Russian Federation and the People’s Republic of China." Entrepreneur’s Guide 14, no. 3 (2021): 18–28. http://dx.doi.org/10.24182/2073-9885-2021-14-3-18-28.
Full textObet, Dedy, Suharto Suharto, and Henri Mujoko. "CYBER COOPERATION IN THE FRAMEWORK OF THE ASEAN REGIME." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 2 (2021): 254. http://dx.doi.org/10.33172/jp.v7i2.1264.
Full textFerlina Mutiara Farah and Halimatus Khalidawati Salmah. "Comparison of Criminal Provisions on Cybercrime In Indonesia and Singapore." Widya Gama Law Review 2, no. 1 (2025): 67–84. https://doi.org/10.31328/wglr.v2i1.709.
Full textSam, Jillet Sarah. "Caste Diasporas beyond National Boundaries: Digital Caste Networks." Perspectives on Global Development and Technology 16, no. 1-3 (2017): 145–59. http://dx.doi.org/10.1163/15691497-12341425.
Full textMazhorina, M. V. "Digital Platforms and International Private Law, or Is There a Future for Cyber Law?" Lex Russica, no. 2 (February 1, 2019): 107–20. http://dx.doi.org/10.17803/1729-5920.2019.147.2.107-120.
Full textDr., Vinod Dnyanoba Pawar. "Indias cross border e-commerce and tread policies." International Journal of Advance and Applied Research S6, no. 16 (2025): 98–102. https://doi.org/10.5281/zenodo.15130639.
Full textFoster, Thomas. "Cyber-Aztecs and Cholo-Punks: Guillermo Gómez-Peña's Five-Worlds Theory." Publications of the Modern Language Association of America 117, no. 1 (2002): 43–67. http://dx.doi.org/10.1632/003081202x63500.
Full textLubis, Ikhsan, Taufiq Siregar, Duma Indah Sari Lubis, and Andi Hakim Lubis. "Exploring the Potential of the Cyber Notary Concept in the Framework of International Transaction Settlement." Acta Law Journal 3, no. 1 (2024): 1–13. https://doi.org/10.32734/alj.v3i1.18891.
Full textRusydi, Muhammad Taufik. "Cyber Law Policy Development: Indonesia's Response to International Cybercrime Threats." Journal of Progressive Law and Legal Studies 3, no. 01 (2025): 69–85. https://doi.org/10.59653/jplls.v3i01.1365.
Full textKashami, Ilda, and Arjan Çuri. "Cyberdeviance in the Western Balkans and ICT-Media-Based Protection." Open Journal for Information Technology 6, no. 1 (2023): 59–66. http://dx.doi.org/10.32591/coas.ojit.0601.05059k.
Full textPratap, Ajay. "Strengthening Global Cybersecurity: India’s Engagement in International Cybercrime Control." Stallion Journal for Multidisciplinary Associated Research Studies 4, no. 2 (2025): 315–19. https://doi.org/10.55544/sjmars.4.2.21.
Full textDewi, Arie Setya, and Henny Saptatia Drajati Nugrahani. "Strengthening EU Cyber Resilience: A Critical Analysis of the Cyber Solidarity Act’s Legislative Framework." Journal of Islamic World and Politics 8, no. 2 (2024): 182–95. https://doi.org/10.18196/jiwp.v8i2.115.
Full textSusanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.
Full textStrelbitskyi, Mykhailo. "THE INFORMATION SYSTEM CYBERSECURITY CONCEPT OF THE STATE BORDER GUARD SERVICE OF UKRAINE AT THE MODERNIZATION STAGE." Information systems and technologies security, no. 1 (1) (2019): 3–10. http://dx.doi.org/10.17721/ists.2019.1.3-10.
Full textAstuti, Sri Ayu. "Law Enforcement of Cyber Terorism in Indonesia." Rechtsidee 2, no. 2 (2015): 157. http://dx.doi.org/10.21070/jihr.v2i2.82.
Full textFauzan Prasetyo Eka Putra, Dea Aulia Siswoyo, M. Idris Ainul Yaqin, and Rica Oktavia. "Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 126–34. https://doi.org/10.55606/jitek.v5i1.6141.
Full textKim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.
Full textKasper, Agnes, Anna-Maria Osula, and Anna Molnár. "EU cybersecurity and cyber diplomacy." IDP Revista de Internet Derecho y Política, no. 34 (December 13, 2021): 1–15. http://dx.doi.org/10.7238/idp.v0i34.387469.
Full textChen, Chia-Mei, Zheng-Xun Cai, and Dan-Wei (Marian) Wen. "Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents." Journal of Global Information Management 30, no. 2 (2022): 1–19. http://dx.doi.org/10.4018/jgim.20220301.oa5.
Full textSikder, Abu Sayed, and Stephen Rolfe. "The Power of E-Commerce in the Global Trade Industry: A Realistic Approach to Expedite Virtual Market Place and Online Shopping from anywhere in the World." International Journal of Imminent Science & Technology. 1, no. 1 (2011): 79–100. https://doi.org/10.70774/ijist.v1i1.3.
Full textNusa, Idham Qrida, Bambang Sugiri, Yuliati Yuliati, and Faizin Sulistio. "Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers." International Journal of Islamic Education, Research and Multiculturalism (IJIERM) 7, no. 2 (2025): 776–802. https://doi.org/10.47006/ijierm.v7i2.475.
Full textPritam, Subba. "SIKKIM POLICE - A STUDY OF ITS HISTORY, COMPOSITION AND CHALLENGES AHEAD." International Journal of Multidisciplinary Research and Modern Education (IJMRME) 8, no. 2 (2022): 23–28. https://doi.org/10.5281/zenodo.7494207.
Full textBudi, Eko, Dwi Wira, and Ardian Infantono. "Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0." Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO) 3 (December 21, 2021): 223–34. http://dx.doi.org/10.54706/senastindo.v3.2021.141.
Full textQiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu, and Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge." Applied Sciences 14, no. 14 (2024): 6189. http://dx.doi.org/10.3390/app14146189.
Full textWang, Rui, Yingxian Chang, Lei Ma, et al. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.
Full textPleskach, Mariia, Valentyna Pleskach, Andrii Semenchenko, Danylo Myalkovsky, and Taras Stanislavsky. "Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine." Information & Security: An International Journal 45 (2020): 57–76. http://dx.doi.org/10.11610/isij.4504.
Full textSari, Neti Mustika, and Putu Samawati. "PERDAGANGAN ORANG DALAM RANAH CYBER CRIME: TANTANGAN DAN PROSPEK PENEGAKAN HUKUM DI ERA DIGITAL." Solusi 22, no. 3 (2024): 246–56. https://doi.org/10.36546/solusi.v22i3.1329.
Full textJudijanto, Loso. "National Security Strategies Amidst Increasing Global Cyber Threats: A Multilateral Approach." Synergisia 1, no. 2 (2024): 11–18. https://doi.org/10.62872/2wph4p15.
Full textMohite, Kalpana. "Legal Challenges and Frameworks in Cybersecurity: A Critical Analysis." International Journal of Advance and Applied Research 6, no. 25(C) (2025): 24–28. https://doi.org/10.5281/zenodo.15321440.
Full textEvdokimov, Konstantin N. "CRIMINOLOGICAL AND CRIMINAL LAW ASPECTS OF COMBATING CYBER CRIME IN RUSSIA (SOCIOLOGICAL RESEARCH)." Russian investigator 11 (November 12, 2020): 41–44. http://dx.doi.org/10.18572/1812-3783-2020-11-41-44.
Full textKim, Ahyeon. "The Impact of the USMCA Trade Agreement on the U.S.-Mexico Border Security Cooperation." Eximia 13 (December 23, 2024): 1066–69. https://doi.org/10.47577/eximia.v13i1.522.
Full textLawal Qudus. "Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges." International Journal of Science and Research Archive 14, no. 1 (2025): 1146–63. https://doi.org/10.30574/ijsra.2025.14.1.0225.
Full textNurkhasanah, Kharisma Ika, and Zydane Maheswara Prasetyo. "Law Enforcement of State Jurisdiction in Hacking Crimes." Indonesian Journal of Applied and Industrial Sciences (ESA) 3, no. 3 (2024): 319–28. http://dx.doi.org/10.55927/esa.v3i3.9438.
Full text