International Journal of Cyber Criminology最新文献

筛选
英文 中文
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function 网络骚扰认识课程:家庭虐待实施者方案对其设计和功能的影响
IF 1
International Journal of Cyber Criminology Pub Date : 2020-06-30 DOI: 10.5281/ZENODO.3750140
L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short
{"title":"Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function","authors":"L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short","doi":"10.5281/ZENODO.3750140","DOIUrl":"https://doi.org/10.5281/ZENODO.3750140","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"220"},"PeriodicalIF":1.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42272738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud 受害经历对网络犯罪恐惧的影响:大学生信用卡/借记卡诈骗经历
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3749468
M. Abdulai
{"title":"Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud","authors":"M. Abdulai","doi":"10.5281/ZENODO.3749468","DOIUrl":"https://doi.org/10.5281/ZENODO.3749468","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"157"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria 尼日利亚克罗斯河州对企业组织的网络钓鱼攻击呈上升趋势
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.4770111
J. T. Okpa, B. O. Ajah, Joseph Egidi Igbe
{"title":"Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria","authors":"J. T. Okpa, B. O. Ajah, Joseph Egidi Igbe","doi":"10.5281/ZENODO.4770111","DOIUrl":"https://doi.org/10.5281/ZENODO.4770111","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"460-478"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes 理解网络空间中的目标适宜性:网络受害过程的国际比较
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3744874
F. Miró-Llinares, Jacqueline M. Drew, M. Townsley
{"title":"Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes","authors":"F. Miró-Llinares, Jacqueline M. Drew, M. Townsley","doi":"10.5281/ZENODO.3744874","DOIUrl":"https://doi.org/10.5281/ZENODO.3744874","url":null,"abstract":"Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"35 1","pages":"139-155"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Harmful discourse on social triggering factors of persecution truth era 有害话语对社会迫害真相时代的触发因素
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3752537
Bagus Sudarmanto, A. Meliala
{"title":"Harmful discourse on social triggering factors of persecution truth era","authors":"Bagus Sudarmanto, A. Meliala","doi":"10.5281/ZENODO.3752537","DOIUrl":"https://doi.org/10.5281/ZENODO.3752537","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"236-253"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project Leaked: research on non-consensual sharing of intimate images in Brazil 项目泄露:研究在巴西未经同意的私密图像共享
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3766654
Leandro Ayres França, Jéssica Veleda Quevedo
{"title":"Project Leaked: research on non-consensual sharing of intimate images in Brazil","authors":"Leandro Ayres França, Jéssica Veleda Quevedo","doi":"10.5281/ZENODO.3766654","DOIUrl":"https://doi.org/10.5281/ZENODO.3766654","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"1-28"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack 从漏洞搜索到刑事案件:SQL注入攻击的脚本分析
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3740361
Anna Leppänen, Tero Toiviainen, T. Kankaanranta
{"title":"From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack","authors":"Anna Leppänen, Tero Toiviainen, T. Kankaanranta","doi":"10.5281/ZENODO.3740361","DOIUrl":"https://doi.org/10.5281/ZENODO.3740361","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"63"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sexual behaviours in indecent images of children: A content analysis 儿童不雅图像中的性行为:内容分析
IF 1
International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3743390
R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley
{"title":"Sexual behaviours in indecent images of children: A content analysis","authors":"R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley","doi":"10.5281/ZENODO.3743390","DOIUrl":"https://doi.org/10.5281/ZENODO.3743390","url":null,"abstract":"Whilst research on indecent image of children (HOC) offenders is increasing, litde is known about HOC content. This paper presents a content analysis on the sexual actions depicted in a sample of 729 HOC ffom 26 offenders. Victims were most often White females aged around 95 years, with most offenders in the 18-24 age range, male and White. Most images show erotic posing with no sexual activity, with 13.4% presenting sexual activity by an adult on a child and 12.8%presenting sexual activity by a child on an adult. ExpUcit portrayals of physical aggression, humih'ation or overt physical suffering were conspicuously rare. Few images depicted attempts to display pseudo affection towards the victim. Interactions were found in several variables between victims' age and gender and offenders' age and gender. The need to more fully understand the nature and content of HOC and their psychological significance are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"121"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delineating victims from perpetrators: Prosecuting self-produced child pornography in Youth Criminal Justice Systems 区分受害者与犯罪者:在青少年刑事司法系统中起诉自产儿童色情制品
IF 1
International Journal of Cyber Criminology Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.1467907
B. Westlake
{"title":"Delineating victims from perpetrators: Prosecuting self-produced child pornography in Youth Criminal Justice Systems","authors":"B. Westlake","doi":"10.5281/ZENODO.1467907","DOIUrl":"https://doi.org/10.5281/ZENODO.1467907","url":null,"abstract":"Video recording technology advancements and accessibility has been paralleled by a growth in selfproduced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce nonsexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad punishment, education, and counseling response from youth criminal justice systems (YCJS). Recommendations are meant as a starting point, framed with multiple YCJS structures, the duality of victim and perpetrator, the justice and welfare approaches to juvenile justice, and the United Nations Convention on the Rights of the Child in mind. _____________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"255-268"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Predictive Ability of Self-Control and Differential Association on Sports Fans’ Decision to Engage in Cyber Bullying Perpetration against Rivals 自我控制与差异关联对体育迷网络欺凌行为决策的预测能力
IF 1
International Journal of Cyber Criminology Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.3365618
S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson
{"title":"The Predictive Ability of Self-Control and Differential Association on Sports Fans’ Decision to Engage in Cyber Bullying Perpetration against Rivals","authors":"S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson","doi":"10.5281/ZENODO.3365618","DOIUrl":"https://doi.org/10.5281/ZENODO.3365618","url":null,"abstract":"A sample of 318 students from two Iranian universities was employed to conduct a test of Gottfredson and Hirschi’s self-control theory and elements of Akers’ social learning theory. Specifically, we sought to determine whether these theories are capable of explaining the decision to cyber bully members and fans of rival sports teams. Structural equation modeling was used to analyze these data. Findings suggest that individuals with low levels of self-control are more likely to engage in cyber bullying perpetration. Similarly, those who associate with delinquent peers are more likely to engage in cyber bullying perpetration. Additionally, we found that ineffective parenting has an indirect effect on cyber bullying perpetration through its direct effect on self-control and differential association. Lastly, we found that self-control and differential association interact to more fully explain cyber bullying perpetration. Theoretical implications are discussed. _____________________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"362"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71073383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信