Results for 'Cyber Crime'

581 found
Order:
  1. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  5. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  8. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Measuring trends in online hate speech victimisation and exposure, and attitudes in New Zealand.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    Government agencies in New Zealand are not required to systematically collect data on online hate speech, thus, there is a lack of longitudinal evidence regarding this phenomenon. This report presents trends in personal experiences of and exposure to online hate speech among adult New Zealanders based on nationally representative data. The findings from this study are also compared with results from a similar research study conducted in 2018. In addition, this report explores people’s perceptions about other issues related to hate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark   105 citations  
  14.  87
    Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  15. War crimes in Ukraine: is Putin responsible?Vittorio Bufacchi - 2022 - Journal of Political Power 16 (2022).
    War crimes are being committed in Ukraine today, but who should be held responsible? By looking at the literature on responsibility and violence by Philippa Foot and John Harris, this article argues that there are grounds for holding Vladimir Putin responsible for war crimes in Ukraine, even if he did not give the command for these crimes and other atrocities to be carried out.
    Download  
     
    Export citation  
     
    Bookmark  
  16. Forcible Crime.Gideon Yaffe - forthcoming - Philosophers' Imprint.
    Frequently, those who commit a crime forcibly are subject to greater punishment than those who commit the same crime without using force. But uncertainty surrounds the conditions that must be met for an act to be performed with force. It is particularly puzzling that acts that are committed through threat, which are in no way harmful, are nonetheless classified under the law as forcibly committed. This paper explains why by offering an account of a particular kind of harmless (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Inchoate Crime, Accessories, and Constructive Malice in Libertarian Law.Ben O'Neill & Walter Block - 2013 - Libertarian Papers 5:241-271.
    Inchoate crime consists of acts that are regarded as crimes despite the fact that they are only partial or incomplete in some respect. This includes acts that do not succeed in physically harming the victim or are only indirectly related to such a result. Examples include attempts (as in attempted murder that does not eventuate in the killing of anyone), conspiracy (in which case the crime has only been planned, not yet acted out) and incitement (where the inciter (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. MORAL CRIME.Sally Ramage - forthcoming - Criminal Law News (87):2-25.
    Crime is a prohibited act from which results in more evil than good’ is how Jeremy Bentham described crime. ‘Crime is a serious anti-social action to which the State reacts consciously by inflicting pain’, is how W.A.Bonger describes crime. Morality and its lack thereof are related to crime. Morality is so closely interwoven with social conduct and immorality interwoven with criminal conduct that it is desirable to investigate this matter further and so this shorter version (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Implemented Crime Prevention Strategies of PNP in Salug Valley, Zamboanga Del Sur, Philippines.Mark Patalinghug - 2017 - Asia Pacific Journal of Multidisciplinary Research (August 2017):143-150.
    Abstract – This study aimed primarily to determine the effectiveness of crime prevention strategies implemented by the Salug Valley Philippine National Police (PNP) in terms of Police Integrated Patrol System, Barangay Peacekeeping Operation, Anti-Criminality Operation, Integrated Area Community Public Safety services, Bantay Turista and School Safety Project as evaluated by 120 inhabitants and 138 PNP officers from four Municipalities of Salug Valley Zamboanga del Sur. Stratified random sampling was utilized in determining the respondents. Index crime rate were correlated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Crime Prediction Using Machine Learning and Deep Learning.S. Venkatesh - 2024 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Crime prediction has emerged as a critical application of machine learning (ML) and deep learning (DL) techniques, aimed at assisting law enforcement agencies in reducing criminal activities and improving public safety. This project focuses on developing a robust crime prediction system that leverages the power of both ML and DL algorithms to analyze historical crime data and predict potential future incidents. By integrating a combination of classification and clustering techniques, our system identifies crime-prone areas, trends, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Genetics crime and justice, Edward elgar 2015.Sally Ramage - 2016 - Current Criminal Law 9 (3):2-29.
    The UK government decided to introduce Income Tax in 1799. Later, tax avoidance schemes involved creation of Deeds of Convenant. It is a fact that crime is increasing but the number of people committing crime is not increasing because many crimes are repeated crimes committed by persons with habitual criminal behaviour, ie hard-core criminals. -/- For more than half a century now, there has been scientific evidence that genetics plays a key role in the origins of criminal behaviour. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Is Crime Caused by Illness, Immorality, or Injustice? Theories of Punishment in the Twentieth and Early Twenty-First Centuries.Amelia M. Wirts - 2022 - In Matthew C. Altman, The Palgrave Handbook on the Philosophy of Punishment. Palgrave-Macmillan. pp. 75-97.
    Since 1900, debates about the justification of punishment have also been debates about the cause of crime. In the early twentieth century, the rehabilitative ideal of punishment viewed mental illness and dysfunction in individuals as the cause of crime. Starting in the 1970s, retributivism identified the immorality of human agents as the source of crime, which dovetailed well with the “tough-on-crime” political milieu of the 1980s and 1990s that produced mass incarceration. After surveying these historical trends, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Crime & Punishment: A Rethink.Ognjen Arandjelović - 2023 - Philosophies 8 (3):47.
    Incarceration remains the foremost form of sentence for serious crimes in Western democracies. At the same time, the management of prisons and of the prison population has become a major real-world challenge, with growing concerns about overcrowding, the offenders’ well-being, and the failure of achieving the distal desideratum of reduced criminality, all of which have a moral dimension. In no small part motivated by these practical problems, the focus of the present article is on the ethical framework that we use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Biological Interventions for Crime Prevention.Christopher Chew, Thomas Douglas & Nadira Faber - 2018 - In David Birks & Thomas Douglas, Treatment for Crime: Philosophical Essays on Neurointerventions in Criminal Justice. Oxford: Oxford University Press.
    This chapter sets the scene for the subsequent philosophical discussions by surveying a number of biological interventions that have been used, or might in the future be used, for the purposes of crime prevention. These interventions are pharmaceutical interventions intended to suppress libido, treat substance abuse or attention deficit-hyperactivity disorder (ADHD), or modulate serotonin activity; nutritional interventions; and electrical and magnetic brain stimulation. Where applicable, we briefly comment on the historical use of these interventions, and in each case we (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Crime as social excess.Sergio Tonkonoff - 2014 - History of the Human Sciences 27 (2):60-74.
    Gabriel Tarde, along with Durkheim and others, set the foundations for what is today a common-sense statement in social science: crime is a social phenomenon. However, the questions about what social is and what kind of social phenomenon crime is remain alive. Tarde’s writings have answers for both of these capital and interdependent problems and serve to renew our view of them. The aim of this article is to reconstruct Tarde’s definition of crime in terms of genus (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Crime as the Limit of Culture.Sergio Tonkonoff - 2014 - Human Studies 37 (4):529-544.
    In this article culture is understood as the ensemble of systems of classification, assessment, and interaction that establishes a basic community of values in a given social field. We will argue that this is made possible through the institution of fundamental prohibitions understood as mythical points of closure that set the last frontiers of that community by designating what crime is. Exploring these theses, we will see that criminal transgression may be thought of as the actualization of a rigorous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  92
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Causes of Crime.Andrzej Klimczuk - 2015 - In Frederick F. Wherry, The Sage Encyclopedia of Economics and Society. Sage Publications. pp. 308--311.
    Causes of crime are the subject of the etiology of criminal behavior, which is characterized by an interdisciplinary approach. There are many theories attempting to explain the determin ants of criminal behavior, a set of acts recognized by the criminal law, which emphasize different aspects of this phenomenon.
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  26
    Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud detection (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  34. The Crime/Tort Distinction: Legal Doctrine and Normative Perspectives.Kenneth Simons - 2008 - Widener Law Journal 17:719-732.
    This essay provides an overview of the crime/tort distinction. It first investigates some of the fundamental differences between criminal law and tort law in doctrine and legal structure. It then explores some important similarities and differences in normative perspectives between the two doctrinal fields. This typology should prove analytically useful for examining some of the specific issues at the borderline of crime and torts—such as the proper scope of punitive damage liability and the question whether criminal law as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Crime as Limit of Culture.Sergio Tonkonoff - 2014 - Human Studies A Journal for Philosophy and the Social 2014 (37): 529–544.
    In this article culture is understood as the ensemble of systems of classification, assessment, and interaction that establishes a basic community of values in a given social field. We will argue that this is made possible through the institution of fundamental prohibitions understood as mythical points of closure that set the last frontiers of that community by designating what crime is. Exploring these theses, we will see that criminal transgression may be thought of as the actualization of a rigorous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  51
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  35
    The crime-preventive impact of penal sanctions.Anthony Bottoms & Andrew von Hirsch - 2010 - In Peter Cane & Herbert M. Kritzer, The Oxford handbook of empirical legal research. New York: Oxford University Press.
    This article opens with the consequentialist–deontologist debate, with the former concerned about the relevance of punitive measures against their crime reducing potentials, while the latter highlights punishment as censure of wrongful acts and the proportion of the punishment to the degree of crime. The article briefly discusses the empirical research on the impact of penal sanctions and focuses on three main kinds of empirical research into possible general deterrent effects—namely, association studies, quasi-experimental studies, and contextual and perceptual studies. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Crime Type and Occurrence Prediction Using Machine Learning Algorithm.R. Senthilkumar - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    This project aims to develop a predictive system capable of identifying crime types and predicting their occurrences based on historical crime data. The system uses advanced machine learning techniques to analyze factors such as geographic location, time, and other socio-economic variables, enabling authorities to better understand crime patterns and trends. By training models on vast datasets of past criminal activities, the system predicts not only the likely occurrence of specific crime types but also identifies high-risk locations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The crime-preventive impact of penal sanctions.Anthony Bottoms & Andrew von Hirsch - 2010 - In Peter Cane & Herbert M. Kritzer, The Oxford handbook of empirical legal research. New York: Oxford University Press.
    This article opens with the consequentialist–deontologist debate, with the former concerned about the relevance of punitive measures against their crime reducing potentials, while the latter highlights punishment as censure of wrongful acts and the proportion of the punishment to the degree of crime. The article briefly discusses the empirical research on the impact of penal sanctions and focuses on three main kinds of empirical research into possible general deterrent effects—namely, association studies, quasi-experimental studies, and contextual and perceptual studies. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  42. Crime against Dalits and Indigenous Peoples as an International Human Rights Issue.Desh Raj Sirswal - 2015 - In Manoj Kumar, Proceedings of National Seminar on Human Rights of Marginalised Groups: Understanding and Rethinking Strategies. pp. 214-225.
    In India, Dalits faced a centuries-old caste-based discrimination and nowadays indigenous people too are getting a threat from so called developed society. We can define these crimes with the term ‘atrocity’ means an extremely wicked or cruel act, typically one involving physical violence or injury. Caste-related violence has occurred and occurs in India in various forms. Though the Constitution of India has laid down certain safeguards to ensure welfare, protection and development, there is gross violation of their rights such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. On Wrongs and Crimes : Does Consent Require Only an Attempt to Communicate?Tom Dougherty - 2019 - Criminal Law and Philosophy 13 (3):409-423.
    In Wrongs and Crimes, Victor Tadros clarifies the debate about whether consent needs to be communicated by separating the question of whether consent requires expressive behaviour from the question of whether it requires “uptake” in the form of comprehension by the consent-receiver. Once this distinction is drawn, Tadros argues both that consent does not require uptake and that consent does not require expressive behaviour that provides evidence to the consent-receiver. As a result, Tadros takes the view that consent requires an (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  44. Crime Control in Traditional African Societies: A Review of Crime Control in Nigeria.Onwe Friday & Eze Ogbonnia Eze - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):20-29.
    Abstract: This review dealt with the traditional methods most African countries utilize in dealing with issues of crimes considered to be very serious, which seriously affect the traditional societies in those African countries. Although there has been modern introductions, but these methods are still being practiced and very effective in most of the rural areas.
    Download  
     
    Export citation  
     
    Bookmark  
  45. (1 other version)Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  46. Crimes and punishments.Giuliano Torrengo & Achille C. Varzi - 2006 - Philosophia 34 (4):395-404.
    Every criminal act ought to be matched by a corresponding punishment, or so we may suppose, and every punishment ought to reflect a criminal act. We know how to count punishments. But how do we count crimes? In particular, how does our notion of a criminal action depend on whether the prohibited action is an activity, an accomplishment, an achievement, or a state?
    Download  
     
    Export citation  
     
    Bookmark  
  47. Less Blame, Less Crime? The Practical Implications of Moral Responsibility Skepticism.Neil Levy - 2015 - Journal of Practical Ethics 3 (2):1-17.
    Most philosophers believe that wrongdoers sometimes deserve to be punished by long prison sentences. They also believe that such punishments are justified by their consequences: they deter crime and incapacitate potential offenders. In this article, I argue that both these claims are false. No one deserves to be punished, I argue, because our actions are shot through with direct or indirect luck. I also argue that there are good reasons to think that punishing fewer people and much less harshly (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  49. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
1 — 50 / 581