121 Hits in 5.9 sec

Other Risk Management Considerations [chapter]

2016 Demystifying Communications Risk  
Acknowledgements The opportunity to research and write this book was both a privilege and a learning experience.  ...  I am indebted to a long list of colleagues, past and present, for all of the ideas and knowledge set out here.  ...  • External parties, often in collusion with insiders: Figure 1 1 Figure 1.1 Who commits fraud?  ... 
doi:10.4324/9781315576497-14 fatcat:t2ngpdburzaqzavcy3lcjmdkta

Ethics in the COVID-19 pandemic: myths, false dilemmas, and moral overload

Georgy Ishmaev, Matthew Dennis, M. Jeroen van den Hoven
2021 Ethics and Information Technology  
Fast forward several months, and we find ourselves in a significantly changed technological landscape.  ...  Nevertheless, due to the publication backlogs with the special issue of "Ethics of Information Technology in the COVID-19 Crisis", this editorial is coming to publication in the Spring 2021.  ...  Some early findings from the deployment of such app in Switzerland could suggest certain effectiveness of this solution (Salathe et al. 2020 ).  ... 
doi:10.1007/s10676-020-09568-6 pmid:33727889 pmcid:PMC7952813 fatcat:whraxh5singblimwi7y6kukaxe

The Design of a Gamified Responsible Use of Social Media

Dave E. Marcial, Lawrence dela Peña, Jade Montemayor, Joy Dy
2021 Frontiers in Education  
The animated material was compiled, programmed, and published to a server of the mobile application.  ...  Specifically, it presents the publishing process of the augmented reality mobile application about responsible use of social media.  ...  ACKNOWLEDGMENTS The assistance of Dr. Eva Wong and her team in the Centre for Holistic Teaching and Learning, Hong Kong Baptist University, is much appreciated.  ... 
doi:10.3389/feduc.2021.635278 fatcat:n54iwurnozhdnop4tzkvcka23u

The Undercivilization of Corporate Law

Christine Hurt
2007 Social Science Research Network  
This article restructures the current debate surrounding the "overcriminalization" of corporate law by comparing the powerful tools of federal prosecutors with the sometimes insurmountable procedural impediments  ...  redress for the same wrongs.  ...  fraud, file lawsuits, then find plaintiffs.  ... 
doi:10.2139/ssrn.965871 fatcat:mrf4gmksdnbindvyc3mz2ztm5q

Understanding and Protecting Yourself against Threats in the Internet

Ajith Sundaram
2017 Asian Social Science  
Reporting the incidents related to Computer Security has now become one of the most important component of the Information Technology programs with the increase in the attacks related to cyber security  ...  The reason being the introduction of new and new security related incidents every day.  ...  Sometimes, money mules are unaware of the fact that they are being used to commit fraud. But there are also money mules who participate willingly.  ... 
doi:10.5539/ass.v13n12p201 fatcat:n67ntum7cvg5daf3r5cqe3dvfe

A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit

Danish Rehman, Er. Jasdeep Singh
2022 International Journal for Research in Applied Science and Engineering Technology  
Abstract: To identify whether the victim has committed a crime, both criminal and forensic investigators need the help of digital forensics.  ...  The study's findings led to the development of Digital Forensic tool solutions for investigators looking to expand their capabilities in using these tools.  ...  This type of veiled confidence is evident even in the strongest findings on unlawful tax evasion. 3) Bank Fraud: Extortion from a bank or other financial institution is a criminal conduct that happens  ... 
doi:10.22214/ijraset.2022.40867 fatcat:2ljxgnpgxzdw3cwizrjq3cmwvu

Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room

Adam J. Sulkowski
2007 Social Science Research Network  
, targets, and third-party plaintiffs, it is vital to in sequence: denial-of-service attacks, telecommunications fraud, unauthorized access to information, virus deployment, financial fraud, insider abuse  ...  Act would have allowed for the prosecution of cyber-extortionists and was interpreted to apply to threats originating from abroad. 38 Computer Fraud and Abuse Act The Computer Fraud and Abuse Act of  ... 
doi:10.2139/ssrn.955962 fatcat:vcayg36lozeaze7qgphnybrp34

From inequity to inclusive prosperity: The corporate role

Philip H. Mirvis
2020 Organizational Dynamics  
as another culprit for the decline in manufacturing jobs.  ...  It seems to them that capitalism is the culprit--that inequality is in its DNA.  ... 
doi:10.1016/j.orgdyn.2020.100773 pmid:32836508 pmcid:PMC7319911 fatcat:iazgfooxjvc4vkwj4lmjpalbqq

Organized Illusions: A Behavioral Theory of Why Corporations Mislead Stock Market Investors (And Cause Other Social Harms)

Donald C. Langevoort
1997 University of Pennsylvania law review  
In 1995, Congress passed the Private Securities Litigation Reform Act1 4 largely to deal with perceived abuses associated with this kind of lawsuit. 5 n Under the fraud-on-the-market theory, investors  ...  As such, one would expect that most successful frauds are committed with the 27 See SEC v.  ...  by Ford in the 1970s).  ... 
doi:10.2307/3312706 fatcat:ugezka2y4fgi5ecinjskffsnzm

RATs, TRAPs, and Trade Secrets

Elizabeth A. Rowe
2015 Social Science Research Network  
Second, it explores how the rhetoric of war has infiltrated the national discourse on cybersecurity and cyber misappropriation. Third, the Article introduces and coins the acronym TRAP.  ...  Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions.  ...  The Computer Fraud and Abuse Act The Computer Fraud and Abuse Act is a federal law that was adopted (before the advent of the commercial use of the Internet) to address the problem of computer hacking,  ... 
doi:10.2139/ssrn.2662166 fatcat:kfhvjaizorcnxcdjzmv4bdbm5a

The Evidence of Things Not Seen: Non-Matches as Evidence of Innocence

James S. Liebman, Shawn Blackburn, David Mattern, Jonathan Waisnor
2012 Social Science Research Network  
Although non-match clues seem uninteresting because they are easily explained away, they often turn out to match the real culprit when he or she is eventually caught.  ...  Exonerations also reveal that "circumstantial" non-matches between culprit and defendant-e.g., a non-matching aspect of an eyewitness's description or a loose button at a crime scene-can be telling.  ...  367 Applying these doctrines, courts have excluded evidence that the father of the sexual-abuse victim was convicted of sexual abuse several years after the incident with which the defendant is charged  ... 
doi:10.2139/ssrn.2194117 fatcat:ah2laua4wvgkllhtgd5btmvwry

Social Engineering Attacks on Facebook – A Case Study

Abdul Shareef Pallivalappil, N. Jagadeesha S., K. Krishna Prasad
2021 Zenodo  
Findings/Results: Social Engineering Attacks using Facebook help the attackers to steal sensitive private information from unaware users.  ...  Every day, more than a billion people use Facebook, making it the most common social network on the planet. Menlo Park, California, is where the company's headquarters are located.  ...  Gemini's recent research also demonstrates how cybercriminals can commit payment fraud by utilising social engineering methods to circumvent specific security rules such as 3D Secure [22].  ... 
doi:10.5281/zenodo.5765883 fatcat:bs5qkpt6avcx3phvlgrxdojevi

D1.4 ChildRescue Integrated Methodology, Release II

NTUA, Frankfurt University, The Smile Of The Child, Hellenic Red Cross, Child Focus, UBITECH, Suite5, SingularLogic
2019 Zenodo  
This deliverable will revise and finalize the ChildRescue integrated missing children investigation cycle methodology, as well as the requirements, taking into account the ChildRescue project advancements  ...  Furthermore , one of the culprits was also accused of sexually abusing children.  ...  The location of the citizens is also utilised by the ChildRescue platform, but mostly on the mobile app.  ... 
doi:10.5281/zenodo.3568120 fatcat:ln4dymxee5frzb3tvphaywhwwq

Veal: The rise of generation interactive

Patrick Aievoli
2016 Zea Books  
Patrick is concerned with the intellectual future of the media industry. His two recent books ask questions and suggest answers to some of the most pressing issues under discussion today.  ...  Citing the better part of articles that support his points, the book allows those of us who have not paid attention to catch up on the elements that have led to this sorry truth.  ...  have committed research fraud were the same scientists who brought in Thorsen.  ... 
doi:10.13014/k2kw5cxv fatcat:dk7huchdo5fxjgcopkuk4e56ei

Reputational Regulation

Kish Parella
2017 Social Science Research Network  
into the public space; this information has reputational consequences for the affected  ...  This Article identifies an alternative strategy for organizational change that relies on the indirect reputational effects of litigation.  ...  Lott, Jr., The Reputational Penalty Firms Bear from Committing Criminal Fraud, 36 J.L. & ECON., 757, 758 (1993)("[W]e present evidence that the reputational cost of corporate fraud is large and constitutes  ... 
doi:10.2139/ssrn.2928342 fatcat:h42ja52u3zbu7hstpdr2auwsj4
« Previous Showing results 1 — 15 out of 121 results