19   Artículos

 
en línea
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos    
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi    
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b... ver más
Revista: Information    Formato: Electrónico

 
en línea
Arcadio A. Cerda,Leidy Y. García    
After the impact of COVID-19 on tourism, several cities have been affected by an increase in criminality, primarily in large urban centers that receive a significant number of tourists.  It's true that the COVID-19 pandemic has had a significant imp... ver más
Revista: Revista Interamericana de Ambiente y Turismo    Formato: Electrónico

 
en línea
Malak Al-Hassan, Bilal Abu-Salih and Ahmad Al Hwaitat    
The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range of ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Md. Khaled Bin Amir, Md. Zobayer Bin Amir, Mohammad Ariful Islam     Pág. 189 - 200

 
en línea
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín    
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Fatima Salahdine and Naima Kaabouch    
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ravindhar Vadapalli    
Most of the MBA Colleges and Business Schools are not imparting Arthashastra, karma lessons apart from the formal courses, case studies and classwork on finance, marketing, accounting and economics?-B-School students in India deserve to learn about Kauti... ver más
Revista: Management Insight - The Journal of Incisive Analysers    Formato: Electrónico

 
en línea
Judy Watson,David Lacey,Don Kerr,Paul Salmon,Natassia Goode    
An increasing number of older adults are being affected by scams that can lead to the compromise and misuse of their personal details. Previous research has investigated factors that increase the likelihood of falling victim to identity compromise and mi... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »