R Ahmad, R Thurasamy - Journal of Cyber Security …, 2022 - journals.riverpublishers.com
A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes | Journal of Cyber Security and Mobility ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print …
R Naidoo - European Journal of Information Systems, 2020 - Taylor & Francis
The recent severity and frequency of cybercrime has been dominated by a single theme–the COVID-19 pandemic. This research develops a multi-level influence model to explore how …
N Akdemir, CJ Lawless - Internet Research, 2020 - emerald.com
Purpose The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes …
There is a growing interest in cryptocurrencies. While for the first several years, it was virtually only tech-savvy enthusiasts who used cryptocurrencies mostly mined by …
Prior research on cybercrime victimization has generally emphasized the linkage between the frequency or actual length of time individuals spend online engaging in certain activities …
The present study aims at understanding what factors contribute to the explanation of online identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT) …
Aim Research on deception detection has usually been executed in experimental settings in the laboratory. In contrast, the present research investigates deception detection by actual …
The push for technological enhancement and Internet connectivity in all aspects of modern life is radically transforming our use of devices and equipment that was not designed with …
The private nature of business creates opportunities for financial crimes. Convenience theory suggests that opportunity, accompanied by a willingness and motive, explains …