Search Results - Computer Engineering

  1. Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  2. Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  3. A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  4. Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  5. The Legal Response to the Intrusion into Digital Identity in Social Media

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  6. Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  7. Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  8. NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  9. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  10. Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  11. Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  12. Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  13. Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  14. Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  15. Understanding the Use of Artificial Intelligence in Cybercrime

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  16. Book Review: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  17. Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  18. The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  19. Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  20. A road towards dynamic bandwidth allocation in NG-EPON: a survey

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article