Journal articles on the topic 'Cybercrime risks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybercrime risks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Claire Seungeun. "Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks." International Journal of Cybersecurity Intelligence and Cybercrime 3, no. 2 (2020): 1–3. http://dx.doi.org/10.52306/03020120jofx1754.
Full textOstapets, Anton, and Iryna Parasii-Verhunenko. "THE IMPACT OF CYBERCRIME RISK ON TECHNOLOGICAL COMPANIES’ ACTIVITIES." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 32(60) (2024): 37–46. http://dx.doi.org/10.25264/2311-5149-2024-32(60)-37-46.
Full textAsyaeva, E., and Yu Myagkova. "Bercrime and Cyberfraud in the Financial Market." Scientific Research and Development. Economics of the Firm 14, no. 1 (2025): 49–56. https://doi.org/10.12737/2306-627x-2025-14-1-49-56.
Full textHolt, Thomas J. "Regulating Cybercrime through Law Enforcement and Industry Mechanisms." ANNALS of the American Academy of Political and Social Science 679, no. 1 (2018): 140–57. http://dx.doi.org/10.1177/0002716218783679.
Full textKobec, Petr, and Kristina Krasnova. "MODERN FEATURES, CAUSES, CONDITIONS AND IMPROVEMENT OF MEASURES TO COUNTER CYBERCRIME." Penal law 19, no. 1 (2024): 103–10. http://dx.doi.org/10.33463/2687-122x.2024.19(1-4).1.103-110.
Full textSaed Alatrash, Aisha. "THE REALITY AND PROSPECTS OF CYBERCRIMES AND THE EXTENT OF AWARENESS OF INTERNET USERS IN LIBYA." مجلة كلية التربية العلمية, no. 16 (December 20, 2024): 195–209. https://doi.org/10.37376/fesj.vi16.7104.
Full textSudhanshu Sekhar Tripathy. "A comprehensive survey of cybercrimes in India over the last decade." International Journal of Science and Research Archive 13, no. 1 (2024): 2360–74. http://dx.doi.org/10.30574/ijsra.2024.13.1.1919.
Full textDallaway, Eleanor. "Cybercrime unreported due to reputation risks." Infosecurity 4, no. 4 (2007): 11. http://dx.doi.org/10.1016/s1754-4548(07)70098-0.
Full textYounies, Hassan, and Tareq Na'el Al-Tawil. "Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)." Journal of Financial Crime 27, no. 4 (2020): 1089–105. http://dx.doi.org/10.1108/jfc-04-2020-0055.
Full textLi, Jiabao. "Multi-governance Model of New Cybercrime under the Risk of New Technologies Risks and Responses." Lecture Notes in Education Psychology and Public Media 73, no. 1 (2024): 22–29. http://dx.doi.org/10.54254/2753-7048/2024.bo17965.
Full textAkinbowale, Oluwatoyin Esther, Mulatu Fekadu Zerihun, and Polly Mashigo. "Application of Situational Crime Prevention Framework for Cybercrime Mitigation." International Journal of Cyber Behavior, Psychology and Learning 14, no. 1 (2024): 1–23. http://dx.doi.org/10.4018/ijcbpl.353436.
Full textYeboah-Ofori, Abel. "Cybercrime and Risks for Cyber Physical Systems." International Journal of Cyber-Security and Digital Forensics 8, no. 1 (2019): 43–57. http://dx.doi.org/10.17781/p002556.
Full textHavers, Benjamin, Kartikeya Tripathi, Alexandra Burton, Sally McManus, and Claudia Cooper. "Cybercrime victimisation among older adults: A probability sample survey in England and Wales." PLOS ONE 19, no. 12 (2024): e0314380. https://doi.org/10.1371/journal.pone.0314380.
Full textBundala, Ntogwa Ng’habi. "Cybercrime: Psychological Tricks and Computer Securities Challenges." Asian Journal of Research in Computer Science 17, no. 12 (2024): 1–17. https://doi.org/10.9734/ajrcos/2024/v17i12525.
Full textIJCIS. "CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL." International Journal on Cryptography and Information Security (IJCIS) 1-20, no. 13 (2025): 2/3. https://doi.org/10.5281/zenodo.15017858.
Full textJivantika Gulati. "Analysing The Algorithm of Zoombombing as a Cybercrime in Digital Era: Legal Risks and Challenges." Journal of Electrical Systems 20, no. 4s (2024): 2445–52. http://dx.doi.org/10.52783/jes.2751.
Full textMuhyidin, Hilya Anbiyani Fitri, and Liptia Venica. "Pengembangan Chatbot untuk Meningkatkan Pengetahuan dan Kesadaran Keamanan Siber Menggunakan Long Short-Term Memory." Jurnal Informatika dan Rekayasa Perangkat Lunak 5, no. 2 (2023): 152. http://dx.doi.org/10.36499/jinrpl.v5i2.8818.
Full textBorisova, Natalya A., Sofia A. Gomozova, and Vladislav V. Nikonorkin. "CYBERCRIMES: TYPES AND TOOLS OF DETECTION AND PREVENTION." Scientific Journal of the Academy 15, no. 4 (2024): 24–30. https://doi.org/10.36683/nz52.24-30.
Full textKanu, Ikechukwu A., Dokpesi T. Adidi, and Catherine C. Kanu. "Artificial Intelligence and Cybercrime in Nigeria." Dialogue and Universalism 34, no. 1 (2024): 207–21. http://dx.doi.org/10.5840/du202434115.
Full textChimchiuri, Lika. "THE EVOLUTION OF CYBERCRIME LEGISLATION." Scientific works of National Aviation University. Series: Law Journal "Air and Space Law" 2, no. 71 (2024): 221–27. http://dx.doi.org/10.18372/2307-9061.71.18813.
Full textSaleem, Hobashia, Junaid Jan, and Azzalfa Areej. "Cyber Crimes Trends in Pakistan: Analyzing the Legal Framework and Enforcement Challenges." Society, Law and Policy Review 1, no. 1 (2022): 10–22. http://dx.doi.org/10.62585/slpr.v1i1.21.
Full textDutchak, Ruslan, Olha Kondratiuk, Olena Rudenko, Andrii Shaikan, and Elizaveta Shubenko. "Internal Audit of Cybercrimes in Information Technologies of Enterprises Accounting." SHS Web of Conferences 100 (2021): 01006. http://dx.doi.org/10.1051/shsconf/202110001006.
Full textAlthibyani, Hosam A., and Abdulrahman M. Al-Zahrani. "Investigating the Effect of Students’ Knowledge, Beliefs, and Digital Citizenship Skills on the Prevention of Cybercrime." Sustainability 15, no. 15 (2023): 11512. http://dx.doi.org/10.3390/su151511512.
Full textGRIGORYAN, Liana, and Lilit MIRZOYAN. "Cybersecurity Risks and Its Regulations. The Philosophy of Cybersecurity Audit." WISDOM 25, no. 1 (2023): 67–77. http://dx.doi.org/10.24234/wisdom.v25i1.970.
Full textIndriyana, Diana, Budi Prasetyono, and Aloysus Mado. "Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi." Security Intelligence Terrorism Journal (SITJ) 2, no. 1 (2025): 95–98. https://doi.org/10.70710/sitj.v2i1.37.
Full textMwiraria, Douglas, Kibet Ngetich, and Panuel Mwaeke. "Exploring Individual Factors Associated with the Prevalence of Cybercrime Victimization Among Students at Egerton University, Kenya." European Journal of Humanities and Social Sciences 4, no. 5 (2024): 35–40. http://dx.doi.org/10.24018/ejsocial.2024.4.5.515.
Full textBroadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence and Cybercrime 2, no. 1 (2019): 4–23. http://dx.doi.org/10.52306/02010219rzex445.
Full textRehman, Tansif Ur, Sajida Parveen, Mehmood Ahmed Usmani, and Muhammad Ahad Yar Khan. "Varieties and Skills of Cybercrime." International Journal of Cyber Behavior, Psychology and Learning 13, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijcbpl.324091.
Full textTiutiunyk, Inna, Iryna Pozovna, and Wojciech Zaskorski. "Innovative Approaches to Ensuring Cybersecurity and Public Safety: The Socio-Economic Dimension." Marketing and Management of Innovations 15, no. 4 (2024): 127–40. https://doi.org/10.21272/mmi.2024.4-10.
Full textBernik, Igor. "Internet Study." International Journal of Cyber Warfare and Terrorism 2, no. 3 (2012): 1–11. http://dx.doi.org/10.4018/ijcwt.2012070101.
Full textMohammed, A. Abdulai. "Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud." International Journal of Cyber Criminology 14, no. 1 (2020): 157–74. https://doi.org/10.5281/zenodo.3749468.
Full textArora, Moulik Singh. "Threats, Effects, and Awareness of Cybercrime: A Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32833.
Full textGranaturov, Vladimir, and Vladimir Trapeznikov. "Cybercrime is one of the Sources of Entrepreneurial Risks." Economic journal of Lesia Ukrainka Eastern European National University 3, no. 3 (2015): 34–40. http://dx.doi.org/10.29038/2411-4014-2015-03-34-40.
Full textKuzior, Aleksandra, Paulina Brożek, Olha Kuzmenko, Hanna Yarovenko, and Tetyana Vasilyeva. "Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends." Journal of Risk and Financial Management 15, no. 12 (2022): 613. http://dx.doi.org/10.3390/jrfm15120613.
Full textBroadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence & Cybercrime 2, no. 1 (2019): 4–23. http://dx.doi.org/10.52306/2578-3289.1006.
Full textKazakova, Nataliya. "ANALYSIS OF THE INFORMATION SECURITY OF THE ECONOMY IN RUSSIA AND ABROAD." Russian Journal of Management 10, no. 1 (2022): 131–35. http://dx.doi.org/10.29039/2409-6024-2022-10-1-131-135.
Full textHygeia S. Toso, Christian, Arnel Joey A. Jumalon, Jaderus Anfernee R. Magadan, Angelita B. Alvarico, and Jose F. Cuevas Jr. "Cybercrime Awareness Among Senior High School Students." Mediterranean Journal of Basic and Applied Sciences 07, no. 02 (2023): 160–76. http://dx.doi.org/10.46382/mjbas.2023.7218.
Full textChristian, Hygeia S. Toso, Joey A. Jumalon Arnel, Anfernee R. Magadan Jaderus, B. Alvarico Angelita, and F. Cuevas Jr. Jose. "Cybercrime Awareness Among Senior High School Students." Mediterranean Journal of Basic and Applied Sciences (MJBAS) 7, no. 2 (2023): 160–76. https://doi.org/10.46382/MJBAS.2023.7218.
Full textIfeanyi Akazue, Maureen, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, and Obinna Nwankwo. "Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1756. http://dx.doi.org/10.11591/ijeecs.v28.i3.pp1756-1765.
Full textAkazue, Maureen Ifeanyi, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, and Obinna Nwankwo. "Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1756–65. https://doi.org/10.11591/ijeecs.v28.i3.pp1756-1765.
Full textPrifti, Arben. "Cyber-crime and Cybersecurity Legislation in Europe and Albania: A State-of-the-Art Research." Global Journal of Arts, Humanities and Social Sciences 13, no. 2 (2025): 35–56. https://doi.org/10.37745/gjahss.2013/vol13n23556.
Full textDE SILVA, Banuka. "Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 23–29. http://dx.doi.org/10.19107/ijisc.2023.01.03.
Full textNONUM, Ernest O., and OJO O. Daniel. "Review of Secure User Identity Management Systems (UIMS) for Preventing and Controlling Cybercrime." International Journal of Research and Innovation in Applied Science X, no. III (2025): 752–61. https://doi.org/10.51584/ijrias.2025.10030055.
Full textPishchik, Victor Ya, and Petr V. Alekseev. "Current Cybersecurity Issues in Russia: Global and National Aspects." Теория и практика общественного развития, no. 10 (October 30, 2024): 112–21. https://doi.org/10.24158/tipor.2024.10.15.
Full textITING, RAMONA L., LAYLA M. ISAHAC, MRYSA J. AJURAM, et al. "UNDERSTANDING THE CRITICAL ROLE OF INFORMATION ASSURANCE IN MITIGATING CYBERCRIME RISKS." Cognizance Journal of Multidisciplinary Studies 4, no. 12 (2024): 502–12. https://doi.org/10.47760/cognizance.2024.v04i12.045.
Full textRAMONA, L. ITING, M. ISAHAC LAYLA, J. AJURAM MRYSA, et al. "UNDERSTANDING THE CRITICAL ROLE OF INFORMATION ASSURANCE IN MITIGATING CYBERCRIME RISKS." Cognizance Journal of Multidisciplinary Studies (CJMS) 4, no. 12 (2024): 502–12. https://doi.org/10.47760/cognizance.2024.v04i12.045.
Full textDondokambey, Virgino Agassie, Canitgia Tambariki, Octavianie Bernadette Sondakh, and Evelyn Hendriana. "Understanding Cybersecurity Behavior in the Banking Industry Using Protection Motivation Theory." 15TH GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES ON 14 - 15 SEPTEMBER 2023, NOVOTEL BANGKOK PLATINUM PRATUNAM, THAILAND 15, no. 1 (2023): 31. http://dx.doi.org/10.35609/gcbssproceeding.2023.1(31).
Full textNtembo, Faraj Nyuda, and Respickius Casmir. "The Driving Forces for the Involvement of Higher Learning Institution’s Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania." European Journal of Theoretical and Applied Sciences 1, no. 4 (2023): 911–22. http://dx.doi.org/10.59324/ejtas.2023.1(4).86.
Full textFaraj, Nyuda Ntembo, and Casmir Respickius. "The Driving Forces for the Involvement of Higher Learning Institution's Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania." European Jornal of Theoretical and Sciences 1, no. 4 (2023): 911–22. https://doi.org/10.59324/ejtas.2023.1(4).86.
Full textAlothaim, Abdulrahman, Shoukat Hussain, and Suheer Al-Hadhrami. "Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information." Computational Intelligence and Neuroscience 2022 (February 22, 2022): 1–28. http://dx.doi.org/10.1155/2022/3304333.
Full text