Cyber crime as a security risk on the internet
The development of the Internet affects human society in two ways: it enables society to progress and endangers security.Online access platforms facilitate business, education and contacts.On the other hand, individuals who access virtual platforms expose their privacy and their assets to the risk o...
| Published in: | Megatrend Revija |
|---|---|
| Main Author: | Darijević Vićentije |
| Format: | Article |
| Language: | English |
| Published: |
Megatrend University
2021-01-01
|
| Subjects: | |
| Online Access: | https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2021/1820-31592102257V.pdf |
Similar Items
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
by: Vladyslav Horulko
Published: (2024-05-01)
by: Vladyslav Horulko
Published: (2024-05-01)
The policy trajectory of China’s globalizing Internet
by: Feng Yang, et al.
Published: (2022-11-01)
by: Feng Yang, et al.
Published: (2022-11-01)
Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes
by: Nadiah Khaeriah Kadir, et al.
Published: (2019-11-01)
by: Nadiah Khaeriah Kadir, et al.
Published: (2019-11-01)
When it Comes to Designing an International Internet Governance Model (As discussed at The World Summit on the Information Society) (Summary)
by: M. B. Kasenova
Published: (2013-03-01)
by: M. B. Kasenova
Published: (2013-03-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
by: De-yu YUAN, et al.
Published: (2017-05-01)
by: De-yu YUAN, et al.
Published: (2017-05-01)
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
by: De-yu YUAN, et al.
Published: (2017-05-01)
by: De-yu YUAN, et al.
Published: (2017-05-01)
La course au cyber armement
by: Edward M. Roche
Published: (2019-06-01)
by: Edward M. Roche
Published: (2019-06-01)
Define cyberspace security
by: Binxing FANG
Published: (2018-01-01)
by: Binxing FANG
Published: (2018-01-01)
Define cyberspace security
by: FANG Binxing
Published: (2018-01-01)
by: FANG Binxing
Published: (2018-01-01)
Sexuality and Internet Use: The Promise and Dangers in Cyberspace
by: Ami Rokach
Published: (2020-09-01)
by: Ami Rokach
Published: (2020-09-01)
Use of the internet and its influence in family communication
by: Omar Julián Álvarez Tabares, et al.
Published: (2012-12-01)
by: Omar Julián Álvarez Tabares, et al.
Published: (2012-12-01)
Global law will be Responsive Law, at least with regard to Cyberspace
by: Paul de Hert, et al.
Published: (2012-01-01)
by: Paul de Hert, et al.
Published: (2012-01-01)
Editorial: Cyber security prevention, defenses driven by AI, and mathematical modelling and simulation tools
by: Eduard Babulak, et al.
Published: (2025-09-01)
by: Eduard Babulak, et al.
Published: (2025-09-01)
Study of Building Sense of Place in Network World
by: Shih-Jen Feng, et al.
Published: (2023-06-01)
by: Shih-Jen Feng, et al.
Published: (2023-06-01)
The Urgency of Ammending Jinayat Qanun in Eradicating Cyber Sexual Crime in Aceh, Indonesia
by: Abdul Jalil Salam, et al.
Published: (2025-01-01)
by: Abdul Jalil Salam, et al.
Published: (2025-01-01)
The role of digital technologies in organized crime
by: Lutovac Svetislav R., et al.
Published: (2022-01-01)
by: Lutovac Svetislav R., et al.
Published: (2022-01-01)
The Regulatory Model of Cyberspace with a Focus on Cryptocurrencies; A ComparativeS of Iran's Cyberspace Supreme Council with China's Cyberspace Security Supreme Council
by: Mahdi Saqi, et al.
Published: (2024-09-01)
by: Mahdi Saqi, et al.
Published: (2024-09-01)
A Study on Cyber Target Importance Quantification and Ranking Algorithm
by: Kookjin Kim, et al.
Published: (2022-02-01)
by: Kookjin Kim, et al.
Published: (2022-02-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Surveying Internet addiction among military parents
by: azadeh zandi, et al.
Published: (2019-10-01)
by: azadeh zandi, et al.
Published: (2019-10-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Digitalization of Law and formation of Digital Law
by: R. E. Ennan
Published: (2024-08-01)
by: R. E. Ennan
Published: (2024-08-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2019-04-01)
by: Dariusz Szydłowski, et al.
Published: (2019-04-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
Contemporary threats related to content processing in the cyberspace
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
by: Dariusz Szydłowski, et al.
Published: (2016-02-01)
FIGHTING THE CLASSICAL CRIME-SCENE ASSUMPTIONS. CRITICAL ASPECTS IN ESTABLISHING THE CRIME-SCENE PERIMETER IN COMPUTER-BASED EVIDENCE CASES
by: Cristina DRIGĂ, et al.
Published: (2016-05-01)
by: Cristina DRIGĂ, et al.
Published: (2016-05-01)
Vers un « Runet souverain » ? Perspectives et limites de la stratégie russe de contrôle de l’Internet
by: Kevin Limonier
Published: (2021-06-01)
by: Kevin Limonier
Published: (2021-06-01)
Challenges for Ukraine’s cyber security: National dimensions
by: Pavlo Katerynchuk
Published: (2019-12-01)
by: Pavlo Katerynchuk
Published: (2019-12-01)
A Comparative Study of Regulating the Filtering of Cyberspace in the US, the EU and China; Proposals for Policymaking in Iran
by: Hassan Bashir, et al.
Published: (2018-01-01)
by: Hassan Bashir, et al.
Published: (2018-01-01)
STRUCTURAL WAYS OF GOVERNING THE INTERNET –THE BRAZILIAN POSITION
by: Pedro Henrique de Moura Gonet Branco, et al.
Published: (2020-05-01)
by: Pedro Henrique de Moura Gonet Branco, et al.
Published: (2020-05-01)
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01)
by: Gheorghe BOARU
Published: (2025-09-01)
Reflections on China’s participation in the global governance of cyberspace
by: Ning WU
Published: (2017-07-01)
by: Ning WU
Published: (2017-07-01)
the policy model of cyberspace filtering in Islamic Republic of IRAN
by: Mohammadsadegh nasrollahi
Published: (2020-09-01)
by: Mohammadsadegh nasrollahi
Published: (2020-09-01)
Cyber Potential Metaphorical Map Method Based on GMap
by: Dongyu Si, et al.
Published: (2025-01-01)
by: Dongyu Si, et al.
Published: (2025-01-01)
Similar Items
-
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
by: Vladyslav Horulko
Published: (2024-05-01) -
The policy trajectory of China’s globalizing Internet
by: Feng Yang, et al.
Published: (2022-11-01) -
Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes
by: Nadiah Khaeriah Kadir, et al.
Published: (2019-11-01) -
When it Comes to Designing an International Internet Governance Model (As discussed at The World Summit on the Information Society) (Summary)
by: M. B. Kasenova
Published: (2013-03-01) -
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
