To see the other types of publications on this topic, follow the link: Cybercrime risks.

Journal articles on the topic 'Cybercrime risks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybercrime risks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Claire Seungeun. "Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks." International Journal of Cybersecurity Intelligence and Cybercrime 3, no. 2 (2020): 1–3. http://dx.doi.org/10.52306/03020120jofx1754.

Full text
Abstract:
Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately
APA, Harvard, Vancouver, ISO, and other styles
2

Ostapets, Anton, and Iryna Parasii-Verhunenko. "THE IMPACT OF CYBERCRIME RISK ON TECHNOLOGICAL COMPANIES’ ACTIVITIES." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 32(60) (2024): 37–46. http://dx.doi.org/10.25264/2311-5149-2024-32(60)-37-46.

Full text
Abstract:
The article investigates the impact of cybercrime risks on technological enterprises’ operations, highlighting the substantial losses incurred due to cyberattacks on computer systems, infrastructure, and personal data storage. It justifies considering cybercrime as a distinct risk factor and emphasizes the importance of analyzing and controlling this risk alongside others. The concept of «cybercrime» and «cybercriminal» is clarified based on Ukrainian, European, American, and global legislative perspectives. The article discusses how cybercrime risk influences enterprise activities and the rel
APA, Harvard, Vancouver, ISO, and other styles
3

Asyaeva, E., and Yu Myagkova. "Bercrime and Cyberfraud in the Financial Market." Scientific Research and Development. Economics of the Firm 14, no. 1 (2025): 49–56. https://doi.org/10.12737/2306-627x-2025-14-1-49-56.

Full text
Abstract:
The article examines the current problems of cybercrime and cyberfraud in the modern financial market. The main types and methods of committing cybercrimes in the financial sector are studied. An analysis of the risks of cybercrimes in electronic banking is presented, factors influencing the dynamics of the spread of cybercrime are identified. The reasons for the increase in the number of data leaks and cyberattacks in the Russian financial market are considered, and recommendations are given for ensuring the cybersecurity of financial institutions and agencies.
APA, Harvard, Vancouver, ISO, and other styles
4

Holt, Thomas J. "Regulating Cybercrime through Law Enforcement and Industry Mechanisms." ANNALS of the American Academy of Political and Social Science 679, no. 1 (2018): 140–57. http://dx.doi.org/10.1177/0002716218783679.

Full text
Abstract:
Cybercrimes, or offenses enabled by technology, affect computer systems and people and prove difficult to pursue through traditional criminal justice strategies due to jurisdictional challenges and legal hurdles. As a result, corporations and industry have begun to play a role in mitigating various forms of cybercrime. This article examines what constitutes cybercrime and the successes and limitations of law enforcement in combatting these offenses. I present a detailed discussion of efforts by industry and regulatory bodies to deter cybercrime. Finally, I consider and discuss the risks and ch
APA, Harvard, Vancouver, ISO, and other styles
5

Kobec, Petr, and Kristina Krasnova. "MODERN FEATURES, CAUSES, CONDITIONS AND IMPROVEMENT OF MEASURES TO COUNTER CYBERCRIME." Penal law 19, no. 1 (2024): 103–10. http://dx.doi.org/10.33463/2687-122x.2024.19(1-4).1.103-110.

Full text
Abstract:
The article is devoted to the study of the determinants of cybercrime in Russia and measures to counter it. The quantitative and qualitative characteristics of cybercrimes are revealed. The features of the criminal’s personality and the victimological risks of citizens in the digital environment are revealed. The authors come to the conclusion about the crucial importance of preventive measures in the fight against cybercrime and the need to improve legislation in this area.
APA, Harvard, Vancouver, ISO, and other styles
6

Saed Alatrash, Aisha. "THE REALITY AND PROSPECTS OF CYBERCRIMES AND THE EXTENT OF AWARENESS OF INTERNET USERS IN LIBYA." مجلة كلية التربية العلمية, no. 16 (December 20, 2024): 195–209. https://doi.org/10.37376/fesj.vi16.7104.

Full text
Abstract:
The use of the internet and information and communication technologies has been increasing significantly in Libya. Additionally, different social and economic activities are conducted online every day. As a result, this has led to critical concerns about the issue of cybercrime. Furthermore, the risks of cybercrimes vary and can cause economic and social harm, which can reach a high level. Therefore, this study aimed to introduce the reality of cybercrime in Libya and its prospects. As well as investigating the knowledge and awareness of internet users in Libya about this type of crime. The me
APA, Harvard, Vancouver, ISO, and other styles
7

Sudhanshu Sekhar Tripathy. "A comprehensive survey of cybercrimes in India over the last decade." International Journal of Science and Research Archive 13, no. 1 (2024): 2360–74. http://dx.doi.org/10.30574/ijsra.2024.13.1.1919.

Full text
Abstract:
Since the 1990s, the integration of technology into daily life has led to the creation of an extensive network of interconnected devices, transforming how individuals and organizations operate. However, this digital transformation has also spurred the rise of cybercrime, criminal activities perpetrated through networks or computer systems. Cybercrime has become a global concern, presenting significant challenges to security systems. Although advancements in digital technology have enhanced efficiency, they have also opened new avenues for exploitation by cybercriminals, highlighting the urgent
APA, Harvard, Vancouver, ISO, and other styles
8

Dallaway, Eleanor. "Cybercrime unreported due to reputation risks." Infosecurity 4, no. 4 (2007): 11. http://dx.doi.org/10.1016/s1754-4548(07)70098-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Younies, Hassan, and Tareq Na'el Al-Tawil. "Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)." Journal of Financial Crime 27, no. 4 (2020): 1089–105. http://dx.doi.org/10.1108/jfc-04-2020-0055.

Full text
Abstract:
Purpose The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions. Design/methodology/approach This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country c
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jiabao. "Multi-governance Model of New Cybercrime under the Risk of New Technologies Risks and Responses." Lecture Notes in Education Psychology and Public Media 73, no. 1 (2024): 22–29. http://dx.doi.org/10.54254/2753-7048/2024.bo17965.

Full text
Abstract:
With the rapid development of science and technology, cyberspace has become the main position for new types of criminal activities, and new types of cybercrime, with its non-contact, inter-temporal and covert characteristics, have posed a serious challenge to the traditional mode of crime governance. The purpose of this paper is to analyse the specific manifestations of new technology risks and the characteristics of new cybercrime under new technology risks, explore the ways of coping with new cybercrime under the traditional governance model, summarise the transformation paths of the new cyb
APA, Harvard, Vancouver, ISO, and other styles
11

Akinbowale, Oluwatoyin Esther, Mulatu Fekadu Zerihun, and Polly Mashigo. "Application of Situational Crime Prevention Framework for Cybercrime Mitigation." International Journal of Cyber Behavior, Psychology and Learning 14, no. 1 (2024): 1–23. http://dx.doi.org/10.4018/ijcbpl.353436.

Full text
Abstract:
The purpose of this study is to apply the Situational Crime Prevention (SCP) technique to cybercrime mitigation using the South Africa cybercrime incidences as a case study. The SCP was first explained from the theoretical perspective and its five major strategies namely “increase effort”, “increase risks”, “reduce reward”, “reduce provocation” and remove excuses” were explained and linked to remote and online crimes. Prevalent cybercrimes perpetrated in South Africa were also highlighted with hacking used specifically as an example in this study. The SCP technique was tailored towards the mit
APA, Harvard, Vancouver, ISO, and other styles
12

Yeboah-Ofori, Abel. "Cybercrime and Risks for Cyber Physical Systems." International Journal of Cyber-Security and Digital Forensics 8, no. 1 (2019): 43–57. http://dx.doi.org/10.17781/p002556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Havers, Benjamin, Kartikeya Tripathi, Alexandra Burton, Sally McManus, and Claudia Cooper. "Cybercrime victimisation among older adults: A probability sample survey in England and Wales." PLOS ONE 19, no. 12 (2024): e0314380. https://doi.org/10.1371/journal.pone.0314380.

Full text
Abstract:
Background Younger people are more likely to report cybercrime than older people. As older people spend more time online, this may change. If similarly exposed, risk factors including social isolation and poor health could make older adults disproportionally susceptible. We aimed to explore whether cybercrime risks and their predictors vary between age groups. Methods We analysed responses from 35,069 participants aged 16+ in the 2019/20 Crime Survey for England and Wales (CSEW). We investigated, among people who have used the internet in the past year, risks of experiencing any cybercrime, re
APA, Harvard, Vancouver, ISO, and other styles
14

Bundala, Ntogwa Ng’habi. "Cybercrime: Psychological Tricks and Computer Securities Challenges." Asian Journal of Research in Computer Science 17, no. 12 (2024): 1–17. https://doi.org/10.9734/ajrcos/2024/v17i12525.

Full text
Abstract:
Several studies agree that traditional ways of preventing cybercrime, by applying common computer security techniques such as passwords, firewalls and anti-virus, are no longer effective tools/methods for preventing cybercrime. Moreover, the empirical studies evidence that the most effective cybercriminals’ technique is the phishing. Phishing is the cybercriminals means of entry or technique that devote both psychological and technical tricks to deceive the service users (individual or organizations) to become a victim of cybercrime. In that sense, the individual or organization (victim) becam
APA, Harvard, Vancouver, ISO, and other styles
15

IJCIS. "CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL." International Journal on Cryptography and Information Security (IJCIS) 1-20, no. 13 (2025): 2/3. https://doi.org/10.5281/zenodo.15017858.

Full text
Abstract:
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALAdeniyi Phillips, Ibraheem Ojelade, Esther Taiwo, Callistus Obunadikeand Kunle OloyedeDepartment of Computer Science and Quantitative Methods, Austin Peay StateUniversity, Tennessee. ABSTRACTThis article underscores the urgent need for a global response to cyber threats, discusses the risksassociated with increasing reliance on technology, and sets the stage for a review focused onunderstanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact onnational development and the growing problem
APA, Harvard, Vancouver, ISO, and other styles
16

Jivantika Gulati. "Analysing The Algorithm of Zoombombing as a Cybercrime in Digital Era: Legal Risks and Challenges." Journal of Electrical Systems 20, no. 4s (2024): 2445–52. http://dx.doi.org/10.52783/jes.2751.

Full text
Abstract:
Zoombombing, the act of maliciously disrupting online meetings or gatherings on video conferencing platforms such as Zoom, has emerged as a prevalent cybercrime in the digital era. This paper examines the algorithmic mechanisms behind Zoombombing and explores its legal implications, risks, and challenges. By dissecting the tactics employed by perpetrators to infiltrate and disrupt virtual spaces, this analysis sheds light on the evolving nature of cyber threats in the context of remote communication technologies. Furthermore, it delves into the legal frameworks surrounding Zoombombing, address
APA, Harvard, Vancouver, ISO, and other styles
17

Muhyidin, Hilya Anbiyani Fitri, and Liptia Venica. "Pengembangan Chatbot untuk Meningkatkan Pengetahuan dan Kesadaran Keamanan Siber Menggunakan Long Short-Term Memory." Jurnal Informatika dan Rekayasa Perangkat Lunak 5, no. 2 (2023): 152. http://dx.doi.org/10.36499/jinrpl.v5i2.8818.

Full text
Abstract:
Cyber-crime is becoming more massive as online activities increase. Cybercrime is a criminal act that exploits digital technology to damage, harm, and destroy property. Therefore, it is crucial for internet users to have knowledge of cybersecurity and the world of technology and the internet in order to avoid falling victim to cybercrime. The aim of this study is to develop a chatbot system as a centralized information medium on cybersecurity, technology, and the internet for internet users. The development of this chatbot aims to reduce the risks of cybercrimes and help enhance internet users
APA, Harvard, Vancouver, ISO, and other styles
18

Borisova, Natalya A., Sofia A. Gomozova, and Vladislav V. Nikonorkin. "CYBERCRIMES: TYPES AND TOOLS OF DETECTION AND PREVENTION." Scientific Journal of the Academy 15, no. 4 (2024): 24–30. https://doi.org/10.36683/nz52.24-30.

Full text
Abstract:
Digital literacy of the population is developing every year. The country is moving to a new technological order related to nanotechnology and information resources. New information resources and ecosystems are emerging, artificial intelligence is being introduced and applied. Unfortunately with all the innovations there is also an increase in cybercrime. This indicates that our country is not yet sufficiently informed about the risks associated with digital crime. Every time new types of cybercrimes appear, which are more difficult to calculate and prevent. The article analyzes the structure o
APA, Harvard, Vancouver, ISO, and other styles
19

Kanu, Ikechukwu A., Dokpesi T. Adidi, and Catherine C. Kanu. "Artificial Intelligence and Cybercrime in Nigeria." Dialogue and Universalism 34, no. 1 (2024): 207–21. http://dx.doi.org/10.5840/du202434115.

Full text
Abstract:
The rapid advancement of artificial intelligence has brought about significant positive changes across various sectors. However, it has also created new opportunities for cybercrime. Nigeria, in particular, has witnessed a surge in cybercriminal activities, which have had severe economic and social consequences. The paper explored the relationship between AI, cybercrime, and the underground business economy in Nigeria, focusing on the rise of fraud, identity theft, and hacking. It discussed the ethical implications of AI, cybercrime, and the underground business economy, highlighting potential
APA, Harvard, Vancouver, ISO, and other styles
20

Chimchiuri, Lika. "THE EVOLUTION OF CYBERCRIME LEGISLATION." Scientific works of National Aviation University. Series: Law Journal "Air and Space Law" 2, no. 71 (2024): 221–27. http://dx.doi.org/10.18372/2307-9061.71.18813.

Full text
Abstract:
The purpose of the article is analyzes the evolution of cybercrime legislation in several jurisdictions, with a focus on how laws are changing to reflect the complexities of cyber threats in a linked digital landscape. Research methods: this study uses a comparative analysis to identify major legislative developments across North America, Europe, Asia, and the rest of the developing world. Results: the fast development of digital technology has fueled the growth of cybercrimes such as hacking, phishing, and online fraud, posing new problems to judicial systems around the world. The study ident
APA, Harvard, Vancouver, ISO, and other styles
21

Saleem, Hobashia, Junaid Jan, and Azzalfa Areej. "Cyber Crimes Trends in Pakistan: Analyzing the Legal Framework and Enforcement Challenges." Society, Law and Policy Review 1, no. 1 (2022): 10–22. http://dx.doi.org/10.62585/slpr.v1i1.21.

Full text
Abstract:
This study looks at the growing problem of cybercrime in Pakistan, concentrating on the legislative framework and the issues that law enforcement authorities face. It examines the rise of cybercrime in the country, the evolution of cyber legislation, and the passage of the Prevention of Electronic Crimes Act (PECA) in 2016. The report emphasizes the importance of a strong legal framework in combating cybercrime efficiently. Despite PECA, internet crimes remain a big threat. The study highlighted enforcement challenges such as technology constraints, data breaches, terrorist risks, and a lack o
APA, Harvard, Vancouver, ISO, and other styles
22

Dutchak, Ruslan, Olha Kondratiuk, Olena Rudenko, Andrii Shaikan, and Elizaveta Shubenko. "Internal Audit of Cybercrimes in Information Technologies of Enterprises Accounting." SHS Web of Conferences 100 (2021): 01006. http://dx.doi.org/10.1051/shsconf/202110001006.

Full text
Abstract:
The article is devoted to the problem’s research of cybercrimes at the enterprise and the efficient methods of its solvation. The main trends of the cybercrime’s development in the national and the global scope are defined. The analysis of the normative-legal acts on cybercrime is made. The main risks of cyberthreats before the illegal alienation of the enterprise assets are determined. The specific peculiarities of cybercrimes in the information technologies of enterprises accounting are revealed, the main ones of which are: cyberspace, the anonymity, harmful program products, the electronic
APA, Harvard, Vancouver, ISO, and other styles
23

Althibyani, Hosam A., and Abdulrahman M. Al-Zahrani. "Investigating the Effect of Students’ Knowledge, Beliefs, and Digital Citizenship Skills on the Prevention of Cybercrime." Sustainability 15, no. 15 (2023): 11512. http://dx.doi.org/10.3390/su151511512.

Full text
Abstract:
The growing prevalence of cybercrime, particularly among young adults, necessitates the promotion of digital citizenship to educate students about responsible online behavior and to equip them with the skills to mitigate cyber risks. The specific objective of this study was to investigate the effect of digital citizenship skills on the prevention of cybercrime among higher education students. A mixed-method approach, including surveys and interviews, was employed to collect data from 652 students in Saudi Arabia. This study found that digital citizenship generally has a significant impact on s
APA, Harvard, Vancouver, ISO, and other styles
24

GRIGORYAN, Liana, and Lilit MIRZOYAN. "Cybersecurity Risks and Its Regulations. The Philosophy of Cybersecurity Audit." WISDOM 25, no. 1 (2023): 67–77. http://dx.doi.org/10.24234/wisdom.v25i1.970.

Full text
Abstract:
Since financial institutions are leading targets of cyber attacks, the article’s main goal is to show that without dedicated action, the global financial system will only become more vulnerable as innovation, competition, and the pandemic further fuel the digital revolution. Also, the cost of cybercrime at financial institutions outpaces the cost of cybercrime in other industries. For example, according to a 2019 private study, the per-company cost of cybercrime is over $18 million for financial services companies, around 40% higher than the average cost for other sectors. If the entire system
APA, Harvard, Vancouver, ISO, and other styles
25

Indriyana, Diana, Budi Prasetyono, and Aloysus Mado. "Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi." Security Intelligence Terrorism Journal (SITJ) 2, no. 1 (2025): 95–98. https://doi.org/10.70710/sitj.v2i1.37.

Full text
Abstract:
This research investigates the threat of data leakage to the military security system in the Kodam III/Siliwangi region. While advancements in information technology have positively impacted society, they also bring the threat of cybercrime. The Indonesian government has responded by enacting the Personal Data Protection Law and strengthening inter-agency collaboration to prevent and address cybercrimes. The threat of data leakage in the Kodam III/Siliwangi region falls under non-physical and unconventional military threats, posing risks to national security and social stability.
APA, Harvard, Vancouver, ISO, and other styles
26

Mwiraria, Douglas, Kibet Ngetich, and Panuel Mwaeke. "Exploring Individual Factors Associated with the Prevalence of Cybercrime Victimization Among Students at Egerton University, Kenya." European Journal of Humanities and Social Sciences 4, no. 5 (2024): 35–40. http://dx.doi.org/10.24018/ejsocial.2024.4.5.515.

Full text
Abstract:
In the modern digital epoch, identifying the factors linked to cybercrime victimization is crucial, particularly among the youth, who are often more exposed to such risks. This study examined the role of individual attributes, namely gender, age, and academic level, in influencing university students’ vulnerability to seven distinct cybercrimes. Originating from Egerton University’s primary campus in Njoro sub-county, Nakuru County, Kenya, the research harnessed structured questionnaires to collect quantitative data. Participants’ ages varied from 18 to over 26 years. The gender distribution c
APA, Harvard, Vancouver, ISO, and other styles
27

Broadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence and Cybercrime 2, no. 1 (2019): 4–23. http://dx.doi.org/10.52306/02010219rzex445.

Full text
Abstract:
In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in 2017. These email attacks attempted to elicit personal information from participants or entice them into clicking links which may have been compromised in a real-world setting. The study aimed to determine the risks of cybercrime for students by observing their responses to social engineering and exploring attitudes to cybercrime risks before and after the phis
APA, Harvard, Vancouver, ISO, and other styles
28

Rehman, Tansif Ur, Sajida Parveen, Mehmood Ahmed Usmani, and Muhammad Ahad Yar Khan. "Varieties and Skills of Cybercrime." International Journal of Cyber Behavior, Psychology and Learning 13, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijcbpl.324091.

Full text
Abstract:
Several thousand organized groups, as well as gangs, are dedicated to cybercrime. The potential rewards for cybercrime can be immense, even for relatively simple crimes. The rapid advancement of technology means that cybercrime is constantly evolving, making it difficult to define and predict. While some may believe cybercrime to be the work of individual lone actors, the reality is quite different. Today, there are thousands of groups dedicated to cybercrime, attracted by its potential rewards. The pace of cybercrime globally is increasing rapidly, and resolving cybercrime is often more chall
APA, Harvard, Vancouver, ISO, and other styles
29

Tiutiunyk, Inna, Iryna Pozovna, and Wojciech Zaskorski. "Innovative Approaches to Ensuring Cybersecurity and Public Safety: The Socio-Economic Dimension." Marketing and Management of Innovations 15, no. 4 (2024): 127–40. https://doi.org/10.21272/mmi.2024.4-10.

Full text
Abstract:
This study is devoted to the analysis of socio-economic aspects of the development of cybercrime and the involvement of society, both as victims and direct initiators, in this activity. The paper examines the impact of socio-economic development indicators, in particular gross national income, spending and remittances, literacy and unemployment, on the dynamics of cybercrime worldwide, and analyses trends in public awareness and involvement in criminal activity in the digital space. The methodological tools of the study are the methods of correlation and canonical analysis, implemented in the
APA, Harvard, Vancouver, ISO, and other styles
30

Bernik, Igor. "Internet Study." International Journal of Cyber Warfare and Terrorism 2, no. 3 (2012): 1–11. http://dx.doi.org/10.4018/ijcwt.2012070101.

Full text
Abstract:
The authors present public comprehension and attitudes towards cyber threats and cybercrime in Slovenia. Cyberspace has become a wide area which can be exploited through various criminal activities, considering that access to information technology and the Internet is ubiquitous. As the number of users grows, so does the number of cybercrime incidences. Regrettably, users of information technology and the Internet know too little about the dangers in cyberspace and the protective measures to maximize security; they are also poorly informed about the legislation pertaining to cybercrime. In ord
APA, Harvard, Vancouver, ISO, and other styles
31

Mohammed, A. Abdulai. "Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud." International Journal of Cyber Criminology 14, no. 1 (2020): 157–74. https://doi.org/10.5281/zenodo.3749468.

Full text
Abstract:
<em>Fear of crime research tends to focus disproportionately on physical or place-based crimes while cybercrimes, which have been increasing over the past two decades, are relatively excluded. Drawing on Beck&rsquo;s theory of a risk society, this paper examines the impact of previous victimization experiences on fear of future encounters with cybercrime. A total of 462 students at the University of Saskatchewan participated in an online survey that collected demographic information and asked if they had ever felt fearful about being the victim of credit/debit card fraud. Binary logistic regre
APA, Harvard, Vancouver, ISO, and other styles
32

Arora, Moulik Singh. "Threats, Effects, and Awareness of Cybercrime: A Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32833.

Full text
Abstract:
The emergence of the digital age has ushered in unprecedented connectivity and convenience, but it has also brought about a surge in cybercrimes, posing significant challenges to security. Criminals exploit vulnerabilities in cyberspace to access sensitive information, perpetrate fraudulent activities, and undermine trust in online interactions. Despite the pervasive impact of cyber threats on various facets of society, awareness levels among the general populace remain a critical concern. This paper presents findings from a comprehensive survey aimed at assessing public awareness of cybercrim
APA, Harvard, Vancouver, ISO, and other styles
33

Granaturov, Vladimir, and Vladimir Trapeznikov. "Cybercrime is one of the Sources of Entrepreneurial Risks." Economic journal of Lesia Ukrainka Eastern European National University 3, no. 3 (2015): 34–40. http://dx.doi.org/10.29038/2411-4014-2015-03-34-40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kuzior, Aleksandra, Paulina Brożek, Olha Kuzmenko, Hanna Yarovenko, and Tetyana Vasilyeva. "Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends." Journal of Risk and Financial Management 15, no. 12 (2022): 613. http://dx.doi.org/10.3390/jrfm15120613.

Full text
Abstract:
This article aims to forecast the information trends related to the most popular cyberattacks, seen as the cyber-crimes’ consequences reflecting on the Internet. The study database was formed based on online users’ search engine requests regarding the terms “Cyberattacks on the computer systems of a financial institution”, “Cyberattacks on the network infrastructure of a financial institution”, and “Cyberattacks on the cloud infra-structure of a financial institution”, obtained with Google Trends for the period from 16 April 2017 to 4 October 2022. The authors examined the data using the Z-sco
APA, Harvard, Vancouver, ISO, and other styles
35

Broadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence & Cybercrime 2, no. 1 (2019): 4–23. http://dx.doi.org/10.52306/2578-3289.1006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kazakova, Nataliya. "ANALYSIS OF THE INFORMATION SECURITY OF THE ECONOMY IN RUSSIA AND ABROAD." Russian Journal of Management 10, no. 1 (2022): 131–35. http://dx.doi.org/10.29039/2409-6024-2022-10-1-131-135.

Full text
Abstract:
The article considers cybercrime or information security risks as one of the key threats to global and national security, manifested in the form of illegal activities in relation to information and data stored on electronic media. Statistical data on cybercrime trends in the world and in Russia are analyzed. A comparative analysis of the legislative system of cybersecurity in a number of countries, including those in the top five in terms of cybercrime, was carried out, which allows us to assess the impact of state policy on the information security of countries.
APA, Harvard, Vancouver, ISO, and other styles
37

Hygeia S. Toso, Christian, Arnel Joey A. Jumalon, Jaderus Anfernee R. Magadan, Angelita B. Alvarico, and Jose F. Cuevas Jr. "Cybercrime Awareness Among Senior High School Students." Mediterranean Journal of Basic and Applied Sciences 07, no. 02 (2023): 160–76. http://dx.doi.org/10.46382/mjbas.2023.7218.

Full text
Abstract:
Over the past few years, Cybercrime has been increasing rapidly which gives a huge impact on the lives of the people especially the growing youth in the community. This study was conducted to determine the level of Cybercrime awareness among Senior High School students at Misamis University. This study uses quantitative research as its descriptive design. It has 253 respondents which are Senior High School students of Misamis University. Random sampling was used to identify the respondents from Grades 11 and 12 from the five (5) different strands namely: General Academic Strand (GAS), Pre-Bacc
APA, Harvard, Vancouver, ISO, and other styles
38

Christian, Hygeia S. Toso, Joey A. Jumalon Arnel, Anfernee R. Magadan Jaderus, B. Alvarico Angelita, and F. Cuevas Jr. Jose. "Cybercrime Awareness Among Senior High School Students." Mediterranean Journal of Basic and Applied Sciences (MJBAS) 7, no. 2 (2023): 160–76. https://doi.org/10.46382/MJBAS.2023.7218.

Full text
Abstract:
Over the past few years, Cybercrime has been increasing rapidly which gives a huge impact on the lives of the people especially the growing youth in the community. This study was conducted to determine the level of Cybercrime awareness among Senior High School students at Misamis University. This study uses quantitative research as its descriptive design. It has 253 respondents which are Senior High School students of Misamis University. Random sampling was used to identify the respondents from Grades 11 and 12 from the five (5) different strands namely: General Academic Strand (GAS), Pre-Bacc
APA, Harvard, Vancouver, ISO, and other styles
39

Ifeanyi Akazue, Maureen, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, and Obinna Nwankwo. "Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1756. http://dx.doi.org/10.11591/ijeecs.v28.i3.pp1756-1765.

Full text
Abstract:
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engineering directives during a university orientation week. The directives phishing attacks were performed for 10 months in 2021. The contents attempted to elicit personal user-data from participants, enticing them to click compromised links. The study aimed to determine cybercrime risks among undergraduates in selected universities in Nigeria, observe responses to socially-engineered attacks, and explore their attitudes to cybercrime risks before/after such attacks. The study generalized that all pa
APA, Harvard, Vancouver, ISO, and other styles
40

Akazue, Maureen Ifeanyi, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, and Obinna Nwankwo. "Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1756–65. https://doi.org/10.11591/ijeecs.v28.i3.pp1756-1765.

Full text
Abstract:
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engineering directives during a university orientation week. The directives phishing attacks were performed for 10 months in 2021. The contents attempted to elicit personal user-data from participants, enticing them to click compromised links. The study aimed to determine cybercrime risks among undergraduates in selected universities in Nigeria, observe responses to socially-engineered attacks, and explore their attitudes to cybercrime risks before/after such attacks. The study generalized that all pa
APA, Harvard, Vancouver, ISO, and other styles
41

Prifti, Arben. "Cyber-crime and Cybersecurity Legislation in Europe and Albania: A State-of-the-Art Research." Global Journal of Arts, Humanities and Social Sciences 13, no. 2 (2025): 35–56. https://doi.org/10.37745/gjahss.2013/vol13n23556.

Full text
Abstract:
The swift progression of information technologies, especially the Internet of Things (IoT), has significantly reshaped modern society. While IoT presents considerable advantages, it simultaneously introduces notable challenges, particularly concerning cybercrime, a form of criminal activity marked by extensive societal risks. This research paper investigates the development of cybercrime, emphasizing Albania's legislative alignment with European Union standards and practices. Through a historical, analytical, descriptive, and comparative methodology, the research outlines the present condition
APA, Harvard, Vancouver, ISO, and other styles
42

DE SILVA, Banuka. "Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 23–29. http://dx.doi.org/10.19107/ijisc.2023.01.03.

Full text
Abstract:
Cybercrime requires a multidimensional approach addressing technical, organisational, and human factors to prevent cyber-attacks. This systematic review highlights the significance of a strong cybersecurity culture in mitigating the risks of cyberattacks and enhancing an organisation's resilience. Implementing training and awareness programmes, establishing leadership support and accountability mechanisms, and fostering employee engagement are strategies for promoting a strong cybersecurity culture. However, fostering a robust culture of cybersecurity can be challenging and requires the partic
APA, Harvard, Vancouver, ISO, and other styles
43

NONUM, Ernest O., and OJO O. Daniel. "Review of Secure User Identity Management Systems (UIMS) for Preventing and Controlling Cybercrime." International Journal of Research and Innovation in Applied Science X, no. III (2025): 752–61. https://doi.org/10.51584/ijrias.2025.10030055.

Full text
Abstract:
The Internet has become the backbone of global communication, commerce, and daily life in today’s interconnected world. While it has brought countless benefits, the digital age has also ushered in an era of sophisticated cybercrime. As organisations grow and add services such as e-commerce and global remote access services, controlling who is accessing what kind of information is also becoming a difficult task. From phishing attacks and identity theft to ransomware and financial fraud, cybercriminals exploit vulnerabilities in online systems, often targeting weaknesses in identity management.
APA, Harvard, Vancouver, ISO, and other styles
44

Pishchik, Victor Ya, and Petr V. Alekseev. "Current Cybersecurity Issues in Russia: Global and National Aspects." Теория и практика общественного развития, no. 10 (October 30, 2024): 112–21. https://doi.org/10.24158/tipor.2024.10.15.

Full text
Abstract:
One of the key problems of the world community at present is the unprecedented exacerbation of the problem of cybercrime, which leads to the growth of cyber risks and cyber threats to the activities of the subjects of the global economy. In Russia, there is currently an increase in cybercrime. The relevance of this study is under-scored by the necessity to investigate cybersecurity issues in Russia and to address these problems for the purpose of ensuring sustainable socio-economic development in the country. The aim of this article is to sys-tematize the types of information risks and factors
APA, Harvard, Vancouver, ISO, and other styles
45

ITING, RAMONA L., LAYLA M. ISAHAC, MRYSA J. AJURAM, et al. "UNDERSTANDING THE CRITICAL ROLE OF INFORMATION ASSURANCE IN MITIGATING CYBERCRIME RISKS." Cognizance Journal of Multidisciplinary Studies 4, no. 12 (2024): 502–12. https://doi.org/10.47760/cognizance.2024.v04i12.045.

Full text
Abstract:
Cybercrime has become a pervasive global issue, causing significant financial, emotional, and societal harm to individuals, organizations, and governments. This paper investigates the importance of Information Assurance (IA) as a comprehensive strategy to mitigate risks associated with cybercrime. Unlike traditional cybersecurity, IA addresses broader dimensions such as the confidentiality, integrity, availability, authentication, and non-repudiation of information. These principles collectively ensure that data remains secure, accurate, and accessible to authorized users while preventing unau
APA, Harvard, Vancouver, ISO, and other styles
46

RAMONA, L. ITING, M. ISAHAC LAYLA, J. AJURAM MRYSA, et al. "UNDERSTANDING THE CRITICAL ROLE OF INFORMATION ASSURANCE IN MITIGATING CYBERCRIME RISKS." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 12 (2024): 502–12. https://doi.org/10.47760/cognizance.2024.v04i12.045.

Full text
Abstract:
Cybercrime has become a pervasive global issue, causing significant financial, emotional, and societal harm to individuals, organizations, and governments. This paper investigates the importance of Information Assurance (IA) as a comprehensive strategy to mitigate risks associated with cybercrime. Unlike traditional cybersecurity, IA addresses broader dimensions such as the confidentiality, integrity, availability, authentication, and non-repudiation of information. These principles collectively ensure that data remains secure, accurate, and accessible to authorized users while preventing unau
APA, Harvard, Vancouver, ISO, and other styles
47

Dondokambey, Virgino Agassie, Canitgia Tambariki, Octavianie Bernadette Sondakh, and Evelyn Hendriana. "Understanding Cybersecurity Behavior in the Banking Industry Using Protection Motivation Theory." 15TH GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES ON 14 - 15 SEPTEMBER 2023, NOVOTEL BANGKOK PLATINUM PRATUNAM, THAILAND 15, no. 1 (2023): 31. http://dx.doi.org/10.35609/gcbssproceeding.2023.1(31).

Full text
Abstract:
The widespread adoption of digital technology has brought about significant transformations in various industries, including banking, where internet-based applications are used extensively for customer transactions. However, along with these advancements, there has been a parallel increase in cybercrime incidents, posing serious challenges for individuals and organizations. In Indonesia, this issue is particularly pronounced, with the country ranking as the eighth globally and the highest in Southeast Asia for the number of data breaches in 2022 (Dihni, 2022). Among the various forms of cyberc
APA, Harvard, Vancouver, ISO, and other styles
48

Ntembo, Faraj Nyuda, and Respickius Casmir. "The Driving Forces for the Involvement of Higher Learning Institution’s Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania." European Journal of Theoretical and Applied Sciences 1, no. 4 (2023): 911–22. http://dx.doi.org/10.59324/ejtas.2023.1(4).86.

Full text
Abstract:
This study investigates the extent and driving forces of cybercrime acts among students in higher learning institutions. The research digs into common cybercrime involvement and explores potential motives driving students' engagement in such illicit activities. A mixed-methods approach was adopted, involving online surveys and interviews with 308 samples size from a population of 1500 participants from selected higher learning institutions in Tanzania. Institutions involved in this study included Collage of Business Education (CBE), Dar es Salaam Institute of Technology (DIT), Institute of Fin
APA, Harvard, Vancouver, ISO, and other styles
49

Faraj, Nyuda Ntembo, and Casmir Respickius. "The Driving Forces for the Involvement of Higher Learning Institution's Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania." European Jornal of Theoretical and Sciences 1, no. 4 (2023): 911–22. https://doi.org/10.59324/ejtas.2023.1(4).86.

Full text
Abstract:
This study investigates the extent and driving forces of cybercrime acts among students in higher learning institutions. The research digs into common cybercrime involvement and explores potential motives driving students&#39; engagement in such illicit activities. A mixed-methods approach was adopted, involving online surveys and interviews with 308 samples size from a population of 1500 participants from selected higher learning institutions in Tanzania. Institutions involved in this study included Collage of Business Education (CBE), Dar es Salaam Institute of Technology (DIT), Institute of
APA, Harvard, Vancouver, ISO, and other styles
50

Alothaim, Abdulrahman, Shoukat Hussain, and Suheer Al-Hadhrami. "Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information." Computational Intelligence and Neuroscience 2022 (February 22, 2022): 1–28. http://dx.doi.org/10.1155/2022/3304333.

Full text
Abstract:
Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of beco
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!