|
|
|
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen...
ver más
|
|
|
|
|
|
|
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b...
ver más
|
|
|
|
|
|
|
Arcadio A. Cerda,Leidy Y. García
After the impact of COVID-19 on tourism, several cities have been affected by an increase in criminality, primarily in large urban centers that receive a significant number of tourists. It's true that the COVID-19 pandemic has had a significant imp...
ver más
|
|
|
|
|
|
|
Malak Al-Hassan, Bilal Abu-Salih and Ahmad Al Hwaitat
The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range of ...
ver más
|
|
|
|
|
|
|
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and...
ver más
|
|
|
|
|
|
|
Md. Khaled Bin Amir, Md. Zobayer Bin Amir, Mohammad Ariful Islam
Pág. 189 - 200
|
|
|
|
|
|
|
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i...
ver más
|
|
|
|
|
|
|
Fatima Salahdine and Naima Kaabouch
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit...
ver más
|
|
|
|
|
|
|
Ravindhar Vadapalli
Most of the MBA Colleges and Business Schools are not imparting Arthashastra, karma lessons apart from the formal courses, case studies and classwork on finance, marketing, accounting and economics?-B-School students in India deserve to learn about Kauti...
ver más
|
|
|
|
|
|
|
Judy Watson,David Lacey,Don Kerr,Paul Salmon,Natassia Goode
An increasing number of older adults are being affected by scams that can lead to the compromise and misuse of their personal details. Previous research has investigated factors that increase the likelihood of falling victim to identity compromise and mi...
ver más
|
|
|
|