Hate speech review in the context of online social networks

N Chetty, S Alathur - Aggression and violent behavior, 2018 - Elsevier
Abstract Advances in Internet Technologies (ITs) and online social networks have made
more benefits to humanity. At the same time, the dark side of this growth/benefit has led to …

Perceived usefulness, ease of use and user acceptance of blockchain technology for digital transactions–insights from user-generated content on Twitter

P Grover, AK Kar, M Janssen… - Enterprise Information …, 2019 - Taylor & Francis
Although blockchain has attracted a great deal of attention from academia and industry there
is a lack of studies on acceptance drivers. This study explores blockchain acceptance by …

Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia

Y Fernando, ML Tseng, IS Wahyuni-Td… - Journal of Industrial …, 2023 - Taylor & Francis
This study aims to investigate the direct and indirect effects of information system security
practices that observed the relationship effect between cyber supply chain risk management …

Cyberterrorism as a global threat: a review on repercussions and countermeasures

S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and
communication technology to threaten or cause bodily harm to gain political or ideological …

Blockchain technology awareness on social media: Insights from twitter analytics

E Mnif, K Mouakhar, A Jarboui - The Journal of High Technology …, 2021 - Elsevier
Purpose This study investigates the affective technology acceptance model applied to the
case of blockchain through Twitter text mining. Design/methodology/approach The analysis …

Cyber security and critical energy infrastructure

I Onyeji, M Bazilian, C Bronk - The Electricity Journal, 2014 - Elsevier
Both the number and security implications of sophisticated cyber attacks on companies
providing critical energy infrastructures are increasing. As power networks and, to a certain …

Security assessment of Libyan government websites

AA Ali, MZ Murah - 2018 Cyber Resilience Conference (CRC), 2018 - ieeexplore.ieee.org
Many governments organizations in Libya have started transferring traditional government
services to e-government. These e-services will benefit a wide range of public. However …

Investigation into the role of human and organizational factors in security work against terrorism at large-scale events

L Fu, X Wang, B Liu, L Li - Safety science, 2020 - Elsevier
The pervasive human and organizational factors (HOFs) in security work at large-scale
events (LSEs) contribute greatly to preventing terrorist attacks. However, as they have not …

Regularity versus novelty of users' multimodal comment patterns and dynamics as markers of social media radicalization

A Necaise, A Williams, H Vrzakova… - Proceedings of the 32nd …, 2021 - dl.acm.org
Although the internet is a means for disseminating information and facilitating social
interactions, these benefits are limited due to individuals' propensity for engaging within a …

Problems of fighting crimes on the internet

EA Kirillova, RA Kurbanov, NV Svechnikova… - Journal of advanced …, 2017 - ceeol.com
This article considers the problems of fighting crimes on the Internet, and defines new
criminal acts committed by means of global computer networks. The aim of the study is to …