Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

The metaverse—Not a new frontier for crime

AMK Marshall, BC Tompsett - Wiley Interdisciplinary Reviews …, 2024 - Wiley Online Library
Law enforcement co‐ordination agencies have recently issued position/guidance
documents relating to the potential for VR environments (the “Metaverse”) to become new …

Fear of cyber-identity theft and related fraudulent activity

LD Roberts, D Indermaur… - Psychiatry, Psychology and …, 2013 - Taylor & Francis
Identity theft and related fraudulent activities affect approximately one in twenty-five adults
each year across western societies. The Internet provides a new avenue for obtaining …

I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions

A Beldad, M De Jong, M Steehouder - Computers in Human Behavior, 2011 - Elsevier
Although it is plausible to assume that the risks of disclosing personal data online are
inexorably more prevalent in transactions with commercial organizations than with …

Cybercrime: Understanding and addressing the concerns of stakeholders

N Martin, J Rice - Computers & Security, 2011 - Elsevier
Cybercrime and cybercriminal activities continue to impact communities as the steady
growth of electronic information systems enables more online business. The collective views …

E-commerce: protecting purchaser privacy to enforce trust

G Antoniou, L Batten - Electronic commerce research, 2011 - Springer
It has been well documented that lack of trust between commercial entities and purchasers
can restrict the potential of e-commerce. This may be because the purchaser is required to …

[图书][B] Digital constitutionalism: The role of internet bills of rights

E Celeste - 2022 - library.oapen.org
Investigating the impact of digital technology on contemporary constitutionalism, this book
offers an overview of the transformations that are currently occurring at constitutional level …

Fake digital identity and cyberbullying

A Lareki, J Altuna… - Media, Culture & …, 2023 - journals.sagepub.com
This study aims to determine whether or not there is an association between creating fake
user accounts and engaging in behaviors deemed to constitute cyberbullying. A quantitative …

An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website

S Purkait, S Kumar De, D Suar - Information Management & Computer …, 2014 - emerald.com
Purpose–The aim of this study is to report on the results of an empirical investigation of the
various factors which have significant impacts on the Internet user's ability to correctly …

[图书][B] Digital forensics: digital evidence in criminal investigations

AMK Marshall - 2009 - books.google.com
The vast majority of modern criminal investigations involve some element of digital
evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics …