CNDS-cybersecurity: issues and challenges in ASEAN countries

NS Mohamed Mizan, MY Ma'arif… - … Journal of Advanced …, 2019 - papers.ssrn.com
This research will provide an overview of the predominant cybersecurity issues in ASEAN
countries, current measures adopted by ASEAN countries in tackling cyber security issues …

Cybersecurity for children: an investigation into the application of social media

V Chang, L Golightly, QA Xu, T Boonmee… - Enterprise Information …, 2023 - Taylor & Francis
The paper discusses cybersecurity for children (particularly teenagers) and focuses on
Social Media's impact using a theoretical approach. Many social media users are unaware …

[PDF][PDF] Effectiveness of cyber security awareness program for young children: A case study in UAE

AA Al Shamsi - Int. J. Inf. Technol. Lang. Stud, 2019 - researchgate.net
Children are an important element of the community; they represent the hope of a bright
future. The safety of our children is priceless. Nowadays children are using the internet on a …

[PDF][PDF] Cyber romance scam victimization analysis using routine activity theory versus Apriori algorithm

ME Saad, SNHS Abdullah… - International Journal of …, 2018 - pdfs.semanticscholar.org
The advance new digital era nowadays has led to the increasing cases of cyber romance
scam in Malaysia. These technologies have offered both opportunities and challenge …

Kibernetinio saugumo kultūros plėtra švietimo srityje: ikimokyklinio ir bendrojo ugdymo įstaigų programų pagrindu

L Chochlova - 2022 - vb.mruni.eu
Abstract [eng] The Master thesis analyzed the development of cybersecurity culture based
on preschool and general education institutions programs. The first chapter deals with the …

Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge

DR Cornelius - 2016 - search.proquest.com
Online identity theft and cybercrime have increased with the rise of social networking, e-
commerce, and mobile devices. Therefore, the purpose of this quantitative, causal approach …

[PDF][PDF] Performance evaluation of cyber criminal detection techniques

K Veena, K Meena - International Journal of Simulation. Systems, Science …, 2018 - ijssst.info
Computer technology has advanced to a greater extent which leads to increase in cyber
crime committed in recent years. The detection of cyber crime is not an easy task. From the …

Determination of performance to verify the synthetic identity theft by training the neural networks

K Veena, K Meena - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
This paper presents a method to analyse the various identities of a user and thus determine
if any synthetic identity theft has been committed. Here three type of data is taken ie, Input …

A study of identity theft: intentions, connected frauds, methods and avoidance

S Kumar - ACADEMICIA: An International Multidisciplinary …, 2021 - indianjournals.com
This article provides a conceptual overview of the main crimes that result in ID fraud and
millions of dollars in damages for businesses and individuals across the globe each year …

The common law approaches to identity theft: Implications for Hungarian law reform

D Tóth, B Gáti - Problemy Prawa Karnego, 2023 - ceeol.com
The incidence of identity theft is escalating, especially in international contexts. Owing to the
advancement of information technology, crimes associated with this issue are borderless …