DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 119,821
1.
  • Systematically Understandin... Systematically Understanding the Cyber Attack Business
    Huang, Keman; Siegel, Michael; Madnick, Stuart ACM computing surveys, 09/2019, Volume: 51, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Cyber attacks are increasingly menacing businesses. Based on the literature review and publicly available reports, this article conducts an extensive and consistent survey of the services used by the ...
Full text
Available for: UL

PDF
2.
  • Cyber security in the age o... Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
    Lallie, Harjinder Singh; Shepherd, Lynsay A.; Nurse, Jason R.C. ... Computers & security, June 2021, 2021-Jun, 2021-06-00, 20210601, Volume: 105
    Journal Article
    Peer reviewed
    Open access

    The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of ...
Full text
Available for: UL

PDF
3.
  • Conceptualizing Cybercrime:... Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies
    Phillips, Kirsty; Davidson, Julia C.; Farr, Ruby R. ... Forensic sciences (Basel, Switzerland), 06/2022, Volume: 2, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Cybercrime is becoming ever more pervasive and yet the lack of consensus surrounding what constitutes a cybercrime has a significant impact on society, legal and policy response, and academic ...
Full text
Available for: UL
4.
  • The challenges facing speci... The challenges facing specialist police cyber-crime units: an empirical analysis
    Harkin, Diarmaid; Whelan, Chad; Chang, Lennon Police practice & research, 11/2018, Volume: 19, Issue: 6
    Journal Article
    Peer reviewed

    The growing threat of cyber-crime poses significant challenges for police organisations. This paper presents original, empirical research on specialist cyber-crime units in Australia to report on the ...
Full text
Available for: PRFLJ, UL
5.
  • The cyber threat landscape:... The cyber threat landscape: Challenges and future research directions
    Choo, Kim-Kwang Raymond Computers & security, 11/2011, Volume: 30, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of ...
Full text
Available for: UL

PDF
6.
  • The Human Factor of Cybercr... The Human Factor of Cybercrime (Edition 1)
    Rutger Leukfeldt, Thomas J. Holt 10/2019
    eBook
    Open access

    Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by ...
Full text

PDF
7.
  • PERETASAN SITUS MILIK DEWAN... PERETASAN SITUS MILIK DEWAN KEHORMATAN PENYELENGGARA PEMILU OLEH H DITINJAU DARI UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK
    Shadily, Felicia; Lisanawati, Go; Setiawan, Peter Jeremiah Dialogia Iuridica, 04/2024, Volume: 15, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Tindakan peretasan terhadap situs milik Dewan Kehormatan Penyelenggara Pemilu (DKPP) dan analisis hukumnya berdasarkan Undang-Undang Informasi dan Transaksi Elektronik (UU ITE). H, pelaku peretasan, ...
Full text
Available for: UL
8.
  • Insurers’ responses to cybe... Insurers’ responses to cyber crime: Evidence from Russia
    Timofeyev, Yuriy; Dremova, Oksana International journal of law, crime and justice, March 2022, 2022-03-00, 20220301, Volume: 68
    Journal Article
    Peer reviewed
    Open access

    This study aims to identify effective responses to cyber crime in the insurance industry. Survey responses from Moscow-based employees holding key positions in the leading insurance companies have ...
Full text
Available for: UL

PDF
9.
  • STRATEGI INDONESIA MEMBENTU... STRATEGI INDONESIA MEMBENTUK CYBER SECURITY DALAM MENGHADAPI ANCAMAN CYBER CRIME MELALUI BADAN SIBER DAN SANDI NEGARA
    Ginanjar, Yusep Dinamika Global (Cimahi.Online), 12/2022, Volume: 7, Issue: 2
    Journal Article
    Open access

    Cyber security has become a priority issue for all countries in the world since information and communication technology is used in various aspects of life, both in social, economic, legal, ...
Full text
Available for: UL
10.
  • Detecting semantic social e... Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
    Heartfield, Ryan; Loukas, George Computers & security, July 2018, 2018-07-00, 20180701, Volume: 76
    Journal Article
    Peer reviewed
    Open access

    The notion that the human user is the weakest link in information security has been strongly, and, we argue, rightly contested in recent years. Here, we take a step further showing that the human ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 119,821

Load filters