Mircea Constantin Scheau

Mircea Constantin Scheau
University of Craiova · Department of Computer Sciences and Information Technology

Phd

About

47
Publications
11,346
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36
Citations

Publications

Publications (47)
Article
Full-text available
Given the realities that we are experiencing in the Ukraine crisis, with military and financial-banking implications, the need to develop and implement an early warning platform in case of crisis or disasters has arisen. This work addresses this need, with expertise in defence and security, financial-banking and cybersecurity domains, and creates a...
Research
Full-text available
The aim of this study was to determine the financial crime community pulse in Romania. For this purpose a survey questionnaire was distributed to 1,856 respondents between May 27th - June 6th 2022. The first objective of our study consists in finding the main patterns that characterize the Romanian community, related to the financial crime percept...
Article
Full-text available
Given the realities that we are experiencing in the Ukraine crisis, with military and financial-banking implications, the need to develop and implement an early warning platform in case of crisis or disasters has arisen. This work addresses this need, with expertise in defence and security, financial-banking and cybersecurity domains, and creates a...
Conference Paper
Full-text available
In the context of a continuous technologization of the world, people create a lot of shortcuts and facilities, but unfortunately they leave room for opportunities to commit cybercrime. The financial and banking industries are two of the sectors affected when it comes to cyber-attacks. Banking products and services are now at our fingertips more tha...
Article
Full-text available
Drones have been used in recent years more and more in various economic sectors (e.g., military, agriculture, retail, transport), but also for personal use and entertainment. The current legislative framework and cyber security standards do not fully address the identification of liable stakeholders in the drone ecosystem for cyber-incidents and th...
Article
Full-text available
Odată cu extinderea semnificativă a spațiului virtual, utilizatorii din mediul online își împărtășesc din ce în ce mai multe informații personale și drept urmare, o cantitate enormă de date legate de identificare sau tranzacții financiare sunt expuse agresorilor cibernetici. Phishing-ul este unul dintre exemplele de criminalitate prin intermediul c...
Conference Paper
Full-text available
The exponential increase in the advancements registered across all sectors of the information technology field gave a new, ever-expanding dimension to the idea of protesting against national governments by introducing political activism into cyberspace. Despite the apparent noble objectives, there is a thin line between hacking as a form of protest...
Article
Full-text available
The technological advancements of the last couple of years combined with the unique situation created by the Covid-19 pandemic made the customer more open to the digitalization of several financial services and procedures in order to further reduce the need for face-to-face interaction. The financial technology companies found themselves in the pos...
Article
Full-text available
The purpose of this study is to evaluate the result of the decisions addressed in preventing and combating money laundering by Romania, together with the other member states of the European Union, following the regulations changes in the field. Against the background of technological developments and new threats, regulators have developed rules and...
Preprint
Full-text available
The digital financial ecosystem depends on digital liquidity and has the role of supporting the business environment in terms of maintaining financial stability, integrating financial systems and reshaping the concept of economic benefits per unit of time. Business models developed by interconnected partners are required in response to user needs....
Conference Paper
Full-text available
Cyber threats regarding drones have increased in the previous years due to the extended use and to the lack of proper preventive measures, not necessarily in the military domain, but in various civil sectors. The legal requirements in place and the best practices in the IoT or drone specific field emphasize specific cybersecurity requirements, howe...
Conference Paper
Full-text available
The digital financial ecosystem depends on digital liquidity and has the role of supporting the business environment in terms of maintaining financial stability, integrating financial systems, and reshaping the concept of economic benefits per unit of time. Business models developed by interconnected partners are required in response to user needs....
Conference Paper
Full-text available
The purpose of this study is to evaluate the result of the decisions addressed in preventing and combating money laundering by Romania, together with the other member states of the European Union, following the regulations changes in the field. Against the background of technological developments and new threats, regulators have developed rules and...
Article
Full-text available
This research identifies the ecosystem that facilitates technological innovations, especially in the financial field, beyond the new technologies themselves. In order to make the most of FinTech's potential, the system of institutional facilitators is analyzed, the need for the authorities to be involved in the development of innovation centers or...
Article
Full-text available
The aim of this study is to present the trends and effectiveness of money laundering countermeasures from the perspective of a number of suspicious transactions reported to the Financial Intelligence Units (FIUs), a number of analysis results submitted to law enforcement authorities, and the typologies of cases in European Union Member States. In o...
Preprint
Full-text available
One approach for such a definition presents profiling as a way to collect from various sources, obtain, deduce, or predict information about groups or individuals. Such knowledge can be exploited to make decisions that can be later automated. Profiling can structure public and private information with different degrees of precision, including those...
Article
Full-text available
Specialty literature and solutions in the market have been focusing in the last decade on collecting and aggregating significant amounts of data about transactions (and user behavior) and on refining the algorithms used to identify fraud. At the same time, legislation in the European Union has been adopted in the same direction (e.g., PSD2) in orde...
Article
Full-text available
In the context of the SAR-CoV-2 pandemic, direct or indirect attacks on critical infrastructures have increased. The vectors of infection have diversified. Malware has become increasingly sophisticated. Cyber attackers try to hide their traces. In addition to the economic damage, their actions also result in the loss of human life. Fake news are di...
Chapter
Full-text available
With the help of advanced technologies we want to have as much comfort as possible, but the advantages come with a series of rules that we must follow. It is not necessary to become specialists, but it is certainly necessary to keep ourselves informed about the dangers to which we are exposed. Otherwise, the price paid due to ignorance or superfici...
Conference Paper
Full-text available
Purpose-This paper aims to assess the effectiveness of anti money laundering in Romania and other European countries based on national Financial Intelligent Units dates. Design/Methodology/Approach/-Annual reports of 12 th European FIUs and reports from the last eight years of Romanian FIU are used to examine legal status, role and functions of nat...
Conference Paper
Full-text available
Technological and social developments lead to repositioning of criminal actions and adapted responses of Information Systems. On the invisible front, confrontations between national or international organizations and entities that are strictly economically motivated or supported by terrorist groups take place. The direct and indirect effects are di...
Article
Full-text available
Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a...
Article
Full-text available
Abstract: Billions of people have access to the online environment through which runs financial transfers or personal data. The boundaries of cybercrime are particularly diffuse. The critical areas are in the focus of the offenders. The balance of profits and losses can be seriously prejudiced if the directions of international bodies are ignored....
Article
Full-text available
Topics related to cybercrime are debated with interest, which proves the impact felt by domestic users, business environment and international organisations. Even if the approach should be fairly straightforward, with reference to respecting traditional values, reality tends to contradict. The parameters that allowed us to evaluate and classify, ac...
Article
Full-text available
Migration is most often generated by dramas lived by a population in a particular area. It also provokes other dramas in the chosen destination area. Economic imbalances, intercultural problems and different levels of education can cause long-term or short-term conflicts. The time required to adapt to new living conditions may vary according to the...
Article
Full-text available
Rezumat Noțiunile vehiculate în mediile de comunicare, referitoare la abordările amenințărilor cibernetice, sunt plasate uneori sub presiunea transformărilor etapizate, supuse mecanismului cunoscut sub numele de Fereastră Overton. Articolul încearcă să aducă în atenția opiniei publice și în aceeași măsură a specialiștilor, câteva dintre problemele...
Article
Full-text available
An article part of ”CONSIDERATIONS ON CHALLENGES AND FUTURE DIRECTIONS IN CYBERSECURITY” - A project by the Romanian Association for Information Security Assurance (RAISA) with the support of the Romanian National Computer Security Incident Response Team (CERT-RO) and the National Cyberint Center (romania2019.eu)
Article
Full-text available
Information as a structure has changed. Database architectures can hide executive models or constitute simple, manipulable packets form. The transmission of information has undergone mutations dictated by technological evolution, and intercepting methods have proven the capacity of adaptability and penetration. The term "cybercrime" may appear to b...
Article
Full-text available
As a result of rapid social changes, the fundamental human right to information is increasingly linked more closely to the right of access to broadband services. The Internet is no longer just a technology, it becomes a way of life, one of the primary sources of all data categories, and perhaps the most common method of maintaining connectivity. In...
Article
Full-text available
Cryptocurrency market is estimated at several hundred billion dollars. The number of digital coins has exceeded the threshold of one thousand, each day appearing or disappearing some of them. Volatility, the difficulty in practical operation, high cost, associated risk and particular complexity make it quite difficult to choose one of the products...
Cover Page
Full-text available
Bazată pe o documentare și cercetare remarcabilă, pe analiza actuală și de perspectivă a criminalității din domeniul de referință, autorul reușește să ofere printr-o abordare multidisciplinară adevărata dimensiune a acesteia și propune soluții de combatere a fenomenului infracțional privind activitățile economico-nanciare. Elementele de natură teor...
Article
Full-text available
For 2018, one of the big challenges is the construction of security systems based on AI. However, it should take time and considerable resources to verify the effect of technologies involving machine learning and driving patterns. We can say that these structures are, conceptually, a computerized replica of their developers. While the trend is inte...
Article
Full-text available
The security of any nation mostly depends on the reliable functioning of critical infrastructures and on a strengthened resilience to possible crisis situations. As a link, strategic management should comprise grid monitoring activities and cyber threats that can exploit points of connectivity systems and generally quite seriously affect the financ...
Article
Full-text available
Regardless the level they’re at and the referenced timeframe, economic exchanges are based on two fundamental elements – demand and supply. The new technologic revolution altered existing parameters, the transfer speed being strongly affected. Economic models unknown at the time were the basis of the development of new applied strategies that prove...
Conference Paper
Full-text available
Stabilirea unui cadru de reglementare eficient pentru managementul riscului de fraudă, inclusiv managementul informaţiilor pentru suspiciunile de fraudă, reprezintă un deziderat al fiecarei instituţii publice sau companii private în general şi al celor financiar bancare sau de investiţii în particular. Optimizarea permanentă a performanţelor proces...
Article
Full-text available
Phishing and E-commerce have at least two things in common-cyberspace and money, and the intersection of the two is often built around services and products offered by banking institutions and investment trusts. Nowadays, fraud economy and fraud methods that have been known to be particularly prolifi c for cybercriminals are hot issues. Attacks hav...
Conference Paper
Full-text available
In a material world we use more and more electronical transactions. We can buy anything from anywhere. All those things are possible if we have a card or if we have stollen information from a card. Regardless if it's a financial institution, end user or automated processing system, cybercriminals will constantly look for security loopholes that ena...
Conference Paper
Full-text available
The inventiveness of the offenders is often corroborated with the support of the "investors" which sometimes leads to discovery of fraud after they had been committed. Preventive measures adopted by financial banking and investment institutions come to complete the procedural fluxes governing the implementation of security measures. Fraud managemen...
Conference Paper
Full-text available
Technology providers are striving to provide the beneficiaries enhanced solutions to ensure the security of transactions but the inventiveness of the criminal groups almost simultaneously evolve with the innovation and it is oriented towards obtaining unfair advantage. Even if the lanes they can access are getting narrow, when it is difficult for t...
Article
Full-text available
Without claiming to state an infallible truth, we believe that, whatever their nature, conflicts present to a greater or lesser extent an economic side. Maintaining an outbreak or identify the levers for stability immediately refer to resources. We can talk about local incidents, regional or global, we can take into account small-scale conflicts, a...
Article
Full-text available
With the proliferation of internet-enabled services and data availability, cyberattacks have become in the past decade. Relying on various techniques to either penetrate critical network infrastructures or deliver malicious payloads to unsuspecting victims, the main motivation behind most attacks is not just money but information. From banks to ven...
Article
Full-text available
Financial and banking institutions that have adhered to the new internet and technology era in the hopes of delivering better customer experience and service availability have embraced technology with both hands. However, this has caused a wide range of problems due to the ever-increasing complexity of systems used to deliver these services.
Article
Full-text available
Today's cybercriminal industry has evolved to a point where criminal activities have become as structured, organized, and skilled as security vendors, turning them into money-scheming machines causing global yearly financial losses ranging in the billions of dollars. Expanding IT infrastructures and operating system fragmentation has paved the way...
Conference Paper
Full-text available
In the recent years, we have often spoken about reciclying resources and saving energy. We have spoken about creating new jobs and the increasing GDS (Gross Domestic Product). All these things can become a reality if we continue to use cloud computing technology. However, we cannot ignore legislation when talking about cloud computing. Cloud comput...
Conference Paper
Full-text available
The entire transaction chain from swiping a card to a bank's ability to process a transaction has now become the main focus of cybercriminals. In order to infiltrate or gain access to this type of data exchange, they have developed new attack vectors for delivering malicious payloads, aimed at compromising one of the parties engaged in a transactio...
Article
Full-text available
The impact of Money Laundering and Financing Terrorism is analyzed in the context of Management and Protection of National and International Critical Infrastructures. Global ways of approaching the phenomenon, reporting to common measures and their particularization according to the social#economical realities of each community. The positioning of...

Network

Cited By

Projects

Projects (2)
Project
Project supported by a grant of the Romanian Ministry of Education and Research, CNCS - UEFISCDI, project number PN-III-P4-ID-PCE-2020-2174, within PNCDI III titled “Intelligent analysis and prediction of the economic and financial crime in a cyber-dominated and interconnected business world”, conducted over the period 2021-2023