Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
The volume of data generated by today's digitally connected world is enormous, and a
significant portion of it is publicly available. These data sources are web archives, public …
significant portion of it is publicly available. These data sources are web archives, public …
Pathways into, desistance from, and risk factors related to cyber-dependent crime: A systematic narrative review
Cyber-dependent crime is a growing global threat. However, research on cybercrime
offending throughout the life course, especially on the factors leading to initiation and …
offending throughout the life course, especially on the factors leading to initiation and …
Cyber offending predictors and pathways in middle adolescence: Evidence from the UK Millennium Cohort Study
K Maras, A Sweiry, A Villadsen, E Fitzsimons - Computers in Human …, 2024 - Elsevier
Despite the pervasiveness of cyber crime victimisation, knowledge is limited regarding the
prevalence, characteristics and pathways of offenders. The present study examines …
prevalence, characteristics and pathways of offenders. The present study examines …
A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime
Financial-economic cyber-enabled crime (hereinafter: financial cybercrime) has increased
dramatically over the past years. However, research on financial cybercrime is still …
dramatically over the past years. However, research on financial cybercrime is still …
[HTML][HTML] Criminal expertise and hacking efficiency
Criminal expertise plays a crucial role in the choices offenders make when committing a
crime, including their modus operandi. However, our knowledge about criminal decision …
crime, including their modus operandi. However, our knowledge about criminal decision …
Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later
CE Rightley, KC Seigfried-Spellar… - … Journal of Cyber …, 2023 - cybercrimejournal.com
Computer criminal behaviors have changed drastically over time, and researchers need to
consider updated scales that assess the prevalence of these more modern cybercriminal …
consider updated scales that assess the prevalence of these more modern cybercriminal …
[HTML][HTML] Dishonesty, neutralisation and nudging
T Mutyavaviri, K Van Der Schyff, K Renaud - EURO Journal on Decision …, 2024 - Elsevier
E-banking offers clients unparalleled convenience but also exposes them to potential fraud
from cyber criminals. Traditionally, banks use technical security measures to ameliorate …
from cyber criminals. Traditionally, banks use technical security measures to ameliorate …
Digital displacement of youth offending: addressing the issue
Purpose Global evidence suggests a potential displacement of youth offending from the
physical to the digital landscape, requiring revision of existing detection and intervention …
physical to the digital landscape, requiring revision of existing detection and intervention …
Risks Related to Digital Technology Use
N Glumbić, M Đorđević, B Brojčin - Digital Inclusion of Individuals with …, 2022 - Springer
The Internet has a significant role in communication, learning, entertainment, keeping
informed, and other aspects of modern life. However, along with the development of digital …
informed, and other aspects of modern life. However, along with the development of digital …
Protecting Your Smarthome From a Cyberattack: A Qualitative Study
W Patterson - 2024 - search.proquest.com
The problem is the worldwide acceleration of smarthome cyberattacks. The purpose of this
study was to analyze the use of a Honeypot as a proactive process to reduce cyberattacks …
study was to analyze the use of a Honeypot as a proactive process to reduce cyberattacks …