Full Text Available
Access Full Text at Repository
Search Results - "Security"
-
Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
Higher Education Cybersecurity: A Vulnerability Assessment of the U.S. South’s Institutional Websites
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Prompt Engineering for GenAI in Cybersecurity Incident Response: A Multi-Platform Evaluation Based on NICE PR-IR-001
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
The Legal Response to the Intrusion into Digital Identity in Social Media
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Understanding the Use of Artificial Intelligence in Cybercrime
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text