Skip to main content
The lack of a universal, or even generalizable, definition of terrorism has complicated both academic and government inquiries into the phenomenon. Obfuscated by ideological, cultural, or political agendas, conceptualizations of... more
    • by 
    •   3  
      CybercrimesOrganized CrimeCyberterrorism
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
    • by 
    •   19  
      Machine LearningData MiningCybercrimesAccess Control
"iPredator - Dark Side of Cyberspace Concept" (Edited & Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.
    • by 
    •   20  
      CriminologyPsychologyForensicsInformation Security
The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the... more
    • by 
    •   4  
      Artificial IntelligenceInformation SecurityCybercrimesCyber Security
Apresentação destinada a um Seminário na disciplina "Cibercriminalidade" do Mestrado em Direito e Informática da Escola de Direito da Universidade do Minho, no dia 19 de maio de 2023, o qual tenho lecionado desde 2012. Uma versão... more
    • by 
    •   20  
      Criminal LawEuropean LawCybercrimesInternational Law
Proceedings of the INTERNATIONAL CONFERENCE ON
"CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"
    • by 
    •   47  
      HistorySociologySocial PsychologyGeography
    • by 
    •   32  
      Military IntelligenceInternational RelationsCyberlawForeign Policy Analysis
The following paper explores the main resolutions of the EU since the break of the millennium regarding Cyber-related issues, estimates whether they have a practical sense or only a declaratory nature, and lays out some observances... more
    • by 
    •   6  
      European HistoryEuropean StudiesCybercrimesEuropean Security and Defence Policy
Resumo: O ordenamento jurídico brasileiro define os crimes cibernéticos como próprios ou impróprios. O crime cibernético próprio pode ser simplificadamente definido como aquele onde o bem jurídico tutelado é a informática, por exemplo, no... more
    • by  and +2
    •   4  
      CybercrimesPost MortemCrime Scene InvestigationTesting In Vivo
One of the key advantages of additive manufacturing (AM) is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables a more... more
    • by 
    •   6  
      CommunicationCybercrimesManufacturingDigital Media & Learning
Seminário ao Mestrado em Segurança da Informação e Comunicação, da VSB - Universidade Técnica de Ostrava, República Checa, 30 de abril de 2019.
    • by 
    •   11  
      European LawCybercrimesEuropean Union LawCybersecurity
The criminalization of cybercrime is dependent on national sensitivities and implementation, even though cybercrime exhibits a transnational character. The Council of Europe Convention on Cybercrime [2001. ETS No. 185, Council of Europe,... more
    • by 
    •   4  
      CybercrimesCybercrimeAge of Criminal ResponsibilityConvention on Cybercrime
    • by 
    •   98  
      HistoryCultural HistorySociologyPolitical Sociology
    • by 
    •   5  
      CybercrimesMalwareDigital ForensicsZeus
Sexting is a new term used in Cyberpsychology. The term sexting was first used in 2005 by the Daily Telegraph, to unify the terms "sex" and "texting" and became an official word in 2009. In the present paper we have tried to define the... more
    • by 
    •   5  
      Moral PsychologyCybercrimesSocial MediaSexting
    • by 
    •   14  
      CriminologyCriminal LawCriminal JusticeCybercrimes
    • by 
    • Cybercrimes
iPredator Notes is a PDF paper with concept definitions & terms related to the Information Age dark side of cyberspace construct called iPredator authored by NYS Licensed Psychologist, Michael Nuccitelli, Psy.D.
    • by 
    •   4  
      CybercrimesCyberbullyingInternet SafetyCyberstalking
Czech: Příspěvek se věnuje aktuální problematice nahrávání a sdílení filmů ze strany drobných " pirátů " a otázce legálnosti sledování těchto autorských děl uživateli. Smyslem příspěvku je zprostředkovat pohled z právní praxe panující v... more
    • by 
    •   5  
      Criminal LawCivil LawCybercrimesPiracy
The Internet has become an integral part of the life and business. It has contributed to a change in society, significant impact on business, manufacturing, service industry, government services, critical infrastructure, security setup... more
    • by 
    •   2  
      CybercrimesCyber Security
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
    • by 
    •   23  
      European StudiesRussian StudiesArtificial IntelligenceCybercrimes
Work in this research particularly based on cyber crime against women and case laws which I referred here based on Delhi NCR cyber crime.
Sources of this paper are CRY report, BBC news and case laws.
    • by 
    •   12  
      CybercrimesWomen's RightsWomenViolence Against Women
    • by 
    •   4  
      Information SecurityCybercrimesComputer SecurityCyber Security
The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with... more
    • by 
    •   20  
      BusinessAfrican StudiesComputer SciencePublic Administration
    • by 
    •   20  
      CriminologyCriminal LawCriminal JusticeTerrorism
    • by 
    •   6  
      CriminologyLawCybercrimesCyberstudies
O paper comenta o incrível incremento nos ataques de Ransomware verificados no ano de 2016, sua tipificação no Brasil e algumas dicas de segurança.
    • by 
    •   7  
      CyberlawCybercrimesCybercrimeDigital Forensic, Cyber Crime, Cyber Security
Cyber crime is a worldwide problem, with a global reach. Cyber crimes do not respect national boundaries, and so can be sent to and from anywhere in the world. Many reports, mostly by cyber security firms, regularly release information... more
    • by 
    •   5  
      CybercrimesMalware AnalysisK-meansPiracy
    • by  and +1
    •   20  
      CybercrimesArbitrationCorporate GovernanceArbitration Law
The migration of crime to cyberspace has become an increasingly important policy challenge for Tunisia. National authorities need to adapt their regulations and organizational structures to face new threats that arise from the prevalence... more
    • by 
    •   3  
      CybercrimesSecurity sector ReformSecurity Sector Reform/Security Governance
In this age of information and technology, Internet plays the pivotal role for the exchange of huge amount of information. It influences not only all spheres of human life but also all age groups of man. Even if the internet has changed... more
    • by 
    •   12  
      Computer ScienceCommunicationData MiningWireless Communications
The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community... more
    • by 
    • Cybercrimes
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
    • by 
    •   8  
      Criminal JusticeCyberlawCybercrimesCybersecurity
Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cyber security experts use the term “social engineering” to highlight the “human factor" in... more
    • by 
    •   11  
      Corporate Social ResponsibilityCybercrimesResilienceSecuritization
    • by 
    •   88  
      BusinessReligionHistoryMilitary History
The paper is about the Cyber Security Policy of the European Union and the Protection of Human Rights.
    • by 
    •   8  
      CybercrimesHuman RightsEuropean UnionCyber crime
ABSTRACT In this paper we present the information security awareness rate of students in Kyrgyz Republic, where there is a rapid pace of formation and development of the information society. The survey was conducted with a sample of 172... more
    • by 
    •   6  
      Computer ScienceInformation SecurityCybercrimesPolitical Science
The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic... more
    • by 
    •   11  
      EngineeringComputer ScienceSoftware EngineeringEducation
The opportunities afforded through digital and communications technologies, in particular social media, have inspired a diverse range of interdisciplinary perspectives exploring how such advancements influence the way we live. Rather than... more
    • by 
    •   3  
      CybercrimesDigital MediaDigital Criminology
The hotel industry has been one of the most spirited industries especially in the 21st century. The hotel industry is the servicing business conducting another important branch in the economic development of the country. It is... more
    • by 
    •   4  
      CybercrimesCyber CriminalsCovid-19internet Pandemic
The article discusses the concept of cyberbullying and its most common symptoms. The article also presents the possibilities of legal prosecution of such behavior. Polish police statistics will be used to show the level of risk of... more
    • by 
    •   2  
      CybercrimesCyberbullying
Anomalous a grey hat hacking group was suspected of hacking into the computers of the Office of Personnel Management (OPM). Because of the OPM hack, millions of government employees' background investigation information that OPM collects... more
    • by 
    •   3  
      CybercrimesCyber SecurityCyber Laws and Cyber Crime
От манипулацията на телефонните сигнали до "социалния инженеринг" - първите страници в историята на компютърната престъпност. В сборника "Наръчник на следователя: Престъпления с висока обществена опасност", изд. Камара на следователите в... more
    • by 
    •   2  
      CybercrimesHistory of Crime
    • by 
    •   14  
      CyberpsychologyCybercrimesPedagogyCyberbullying
Recent examples driving an increased need for cyber awareness include unmanned aerial vehicles (UAVs) in the airspace, development of the Automatic dependent surveillance-broadcast (ADS-B), and the risk of cyber intrusion. The incident of... more
    • by  and +2
    •   18  
      RoboticsAerospace EngineeringArtificial IntelligenceMobile Robotics
Resumo: Num Estado de Direito, a luta política entre os vários grupos, que defendem ou atacam interesses de classe, económicos, profissionais, geracionais, de género, ou outros, embora regulada, é uma constante. Governos, empresas e... more
    • by 
    •   114  
      Organizational BehaviorSemioticsReligionHistory
Tras años de trabajo, estudio e investigación, “Hackeados” llega al público. Un libro que, a diferencia del resto de los escritos por abogados, no está dirigido a otros abogados, sino al resto de los ciudadanos. En un lenguaje... more
    • by 
    •   13  
      Criminal LawCybercrimesFraud Detection And PreventionCyberbullying
The Coronavirus (COVID-19) crisis is having a massive impact globally with a rapid spread across the globe. Which made the World Health Organization declare it a pandemic. COVID-19 has prompted countries to adopt new behaviors such as... more
    • by 
    •   15  
      UsabilityCybercrimesPrivacyBiometrics
User training and awareness is often touted as the strongest tool to resist cyberattacks, as users are often the primary attack vector used to gain access to environments (Thomas J. E., 2018). However, sometimes attackers have... more
    • by 
    •   4  
      CybercrimesCyber SecurityPublic AdminstrationData Breaches