Search Results - "security"

  1. Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Higher Education Cybersecurity: A Vulnerability Assessment of the U.S. South’s Institutional Websites

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Prompt Engineering for GenAI in Cybersecurity Incident Response: A Multi-Platform Evaluation Based on NICE PR-IR-001

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. The Legal Response to the Intrusion into Digital Identity in Social Media

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Understanding the Use of Artificial Intelligence in Cybercrime

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article