[HTML][HTML] Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management

S Mushtaq, M Shah - Information, 2024 - mdpi.com
This review addresses the fragmented literature on administrative interventions for
cybercrime mitigation within e-government services, which often prioritise technological …

[HTML][HTML] Psychological Factors leading to Sextortion: The Role of Personality, Emotional Factors and Sexual Needs in Victimisation.

C Tzani, M Ioannou, R Fletcher, TJV Williams - Computers in Human …, 2024 - Elsevier
Sextortion often begins with a perpetrator contacting a victim through social media platforms,
dating websites, or messaging applications. Victims share their explicit content, allowing the …

Politicization of Economic Cybercrime: Perceptions Among Ghanaian Facebook Users

Y Abubakari, M Blaszczyk - Deviant Behavior, 2024 - Taylor & Francis
Cybercrime remains a focal point in global and regional discussions concerning
contemporary issues in West Africa. In line with this discourse, this article delves into the …

Shadow of personal fear? The role of personal and altruistic fear of cyberharassment

CA Maher, BE Hayes - Crime & Delinquency, 2024 - journals.sagepub.com
Fear of crime is a social problem that outpaces crime itself, particularly when fear is
expressed altruistically for others. Despite this, few studies consider whether the correlates …

[PDF][PDF] Pengaruh Pengetahuan Tip Pencegahan Terhadap Keyakinan Remaja di Pantai Timur bagi Melindungi Diri daripada Jenayah Scam

F Muhammad, SA Awang, AZM Shaarani… - …, 2024 - journalarticle.ukm.my
Scammer mempelbagaikan modus operandi bagi melaksanakan jenayah penipuan.
Rentetan itu, pengetahuan mengenai tip pencegahan merupakan langkah awal …

[PDF][PDF] Inside the Mind of Cybercriminals: Investigating the Influence of Socioeconomic Factors on the Ethical Decision-Making of Cybercriminals

AS Ismail, MAMM Haniff, MN Md - Proceedings of 1st Glocal …, 2023 - researchgate.net
Cybercriminals engage in illicit actions and purposefully exploit weaknesses in computer
systems, networks, and users' information for personal benefits. Their activities are unethical …

[PDF][PDF] The Mediating Role of Trust in National Digital Identity Verification Platform Acceptance: A Conceptual Paper

P Manogaran, TA Ping - International Journal of Business and …, 2023 - researchgate.net
Government and private organisation services online have been adopted rapidly during the
digitalisation post-COVID-19 pandemic. The lack of digital identity exacerbates the …

Національна безпека через конвергенцію систем фінансового моніторингу та кібербезпеки: інтелектуальне моделювання механізмів регулювання …

ГМ Яровенко, ОВ Кузьменко, СВ Лєонов… - 2023 - essuir.sumdu.edu.ua
Об'єкт дослідження–система економічних відносин між суб'єктами економіки та
регуляторами фінансового ринку в процесі комплексного застосування засобів …

[PDF][PDF] Psychological Impact on the Public Susceptible to Online Scams

Z Osman, NH Alwi, BNA Khan - researchgate.net
This study delves into the nuanced interplay of direct and indirect relationships between
depression, anxiety, emotional exhaustion, and susceptibility, with low internal control acting …

[PDF][PDF] Exploring the Theories and Factors Relating to the Susceptibility of the Banking Industry to Social Engineering Attacks

R Davis, L Futcher, N Gcaza - internationalbusinessconference …
The banking industry is becoming increasingly susceptible to social engineering attacks,
posing significant threats to the banking institutions and their clients. This study explores …