Science topic
Cybercrime - Science topic
Explore the latest publications in Cybercrime, and find Cybercrime experts.
Publications related to Cybercrime (10,000)
Sorted by most recent
أضحت التسريبات واحدة من التهديدات الجلية للأمن القومي للدول، ولاسيما بعد أن أخذ مفهوم الأمن في الآونة الأخيرة وبات يستوعب أنواعًا وأنماطًا من الأمن غير التقليدي Non Traditional Security.
تعد التسريبات إحدى أشكال الجريمة الإلكترونية المهددة للأمن القومي للدول والمجتمعات في الآونة الراهنة، والتي تتعدد أشكالها ما بين تسريبات سياسية وعسكرية واقتصادية،...
Cybercrimes bring annoying problems to the people worldwide. They brought a number of new crime activities, actors and new challenges in fighting against them. The cyberpolicing is meant for stopping cybercrimes and is a knowledge-intensive challenge. The FGoT is an online cybercriminal organization associated to JNTUHJAC that is prevailing even no...
Peer-to-peer (P2P) botnets have emerged as a resilient cybercrime tool, utilizing decentralized architectures to evade detection and complicate takedown efforts. Existing botnet emulation testbeds often fall short in replicating the dynamic and large-scale environments that these botnets operate in, limiting their effectiveness in research and defe...
Zimbabwean’s commercial banks and micro finance institutions are grappling with significant operational losses due to inadequate cybercrime mitigation frameworks and effective risk management frameworks, leaving them vulnerable to cyber threats. Mashizha and Kanengoni (2024), Katuri (2023) and Vusumuzi (2024) noted that cybercrime mitigation framew...
In today's hyper-connected society, the prevalence of cyber-attacks and Cybercrime has escalated to a critical level, posing significant threats to individuals, organizations, and nations. This essay aims to provide a comprehensive examination of the nature and implications of cyber threats. It begins by defining key concepts and categorizing vario...
The rapid expansion of information and communications technology has inflicted drastic changes on Indonesia, from the ease of digital activities to significant challenges for legal regulation. This paper attempts to explore the development of regulation of telematics law in Indonesia, particularly focusing on Law Number 11 of 2008 concerning Electr...
The research deals with a group of problems and breakthroughs in the previous period and the largest attacks in history that caused failures in technical systems around the world. The research discussed cyber-attacks and disruptions and how to deal with them, better understand the difference, and enhance cyber security. Through the research, many e...
Professor Mounir Bouras, Chairman of the Scientific Committee and Supervisor of the National Symposium entitled "The Role of Fraud and Cybercrime".
البرفيسور منير بوراس رئيس لجنة علمية و المشرف على الندوة الوطني تحت عنوان دور النصب والاحتيال الالكتروني
جامعة الشهيد الشيخ العربي التبسي تبسة - الجزائر
بتاريخ 19 / 05 / 2025
The Bangladesh Police faces several institutional challenges that hinder effective service delivery. Political interference remains a major issue, influencing transfers and promotions, thereby compromising professionalism and public trust. The absence of an independent police complaint authority weakens accountability, while the promotion system is...
Significant chunks of the internet are made up of the deep web and dark web. The deep web refers to content that is not indexed by conventional search engines, while the dark web is a subset that is purposefully hidden and only accessible with the use of specialist tools like Tor. Academic databases, research papers, and private chat platforms are...
In the early 2000, cybersecurity breaches were classified as “Internet crimes” and therefore managed through the tools of the criminal justice system. The Budapest Convention on Cybercrime forged new incriminating provisions and new procedural guidelines, updating the categories of criminal law and criminal procedure for the digital age. This style...
As cybercrime continues to pose significant threats to individuals, businesses, and national security, digital forensics has become an important tool for investigating cybercrime. This article explores the application of digital forensics technology, with a focus on disk forensics, memory forensics, and network forensics. It provides an overview of...
This study introduces SeniorSafeAI, an open-source chatbot trained on a curated dataset of cybersecurity Q&As to assist senior citizens in identifying and responding to cybercrimes. We trained and evaluated eight large language models using both quantitative metrics (F1, BertScore, n-gram overlap) and qualitative assessments (clarity, accuracy, rel...
The rise in cybercrime has outpaced the ability of many non-technical individuals-particularly children, teenagers, and the elderly-to defend themselves effectively online. "Cyber Saathi" is an AI-powered platform developed to address this challenge by providing real-time cybersecurity alerts, safety tips, and simplified legal information. It lever...
This article examines the evolution of cryptologic techniques and their implications for public and private security, focusing on the Italian and EU legal frameworks. It explores the roles of cryptography, steganography, and quantum technologies in countering cybersecurity threats, emphasising the need for robust legislation to address emerging cha...
The rapid escalation of cyber-crime has created an urgent demand for advanced and intelligent solutions to safeguard modern computing environments. Traditional Intrusion Detection Systems (IDS), which primarily rely on rule-based or signature-driven methods, have proven insufficient in detecting and mitigating the dynamic and sophisticated nature o...
The study examines the digital forensics of cryptocurrencies and the dark web, explicitly focusing on the role of elements and tools, such as blockchain, computers, and mobile phones, in their formation and evidence gathering. It also explores using artificial intelligence and machine learning in dark web forensics. The descriptive-analytical metho...
Anomaly detection plays a crucial role in identifying suspicious activities, fraud, and irregularities in financial transactions. The emergence of artificial intelligence (AI) has significantly enhanced the ability to detect these anomalies, offering more accurate, scalable, and real-time solutions. Traditional methods of anomaly detection, often r...
The aim of this paper is to assess cyber security stability and identify effective strategies. The study collects multi-dimensional data such as crime rate and crime success rate and uses entropy weight method to construct a stability assessment model. On the basis of the traditional entropy weighting method, the weights are set manually to combine...
India's rapid digital transformation presents significant cybersecurity and data privacy challenges. This paper analyzes the evolution of India's cyber laws, beginning with the Information Technology Act, 2000, and its subsequent amendments, highlighting the Act's limitations and the need for more comprehensive legislation. It examines the current...
The proliferation of financial crimes in emerging markets-including money laundering, terrorist financing, cybercrime, and tax evasion-threatens economic development, public trust, and the integrity of global financial systems. These crimes are often enabled by weak institutional capacities, regulatory gaps, and rapid digitalization in financial se...
The researcher examined “Security of Information Resources and Preservation Issues in University Libraries, Nigeria. The study formulated and tested two research questions. This study adopted the survey research design. The population of this study was 395 staff working in libraries of federal universities in South East Nigeria. The sample for the...
In this digital era society has undergone tremendous transformation to face and
deal with the challenges of a vast variety of cybercrime. It necessitates
administrative and police reforms aiming at protection and promotion of gender
equality and thereby enhancing women empowerment in this digital age. Woman
constitute about half of the total human...
With the increasing cybercrime on social media, this study creates a strong security system based on sophisticated machine learning and behavioral techniques. It trains on labeled image datasets to identify explicit content and text datasets to recognize cyberbullying, depressive language, and off-topic posts. The main features include identifying...
Cybersecurity research is constantly evolving as organizations face increasingly complex cyber threats. Key research topics in this field include cybercrime, artificial intelligence (AI) security applications, network defense mechanisms, and intrusion detection systems. This research focuses on understanding emerging threats while prioritizing enha...
The advancement of technology has permeated all facets of life, including policing. This is necessary considering that many human activities and interactions today are facilitated by technology. In that respect, criminals have also leveraged technology to pursue their agendas. This makes it naturally logical for policing to advance in the same dire...
The purpose of this research is to address computer or cyber crimes in Mozambique. In view of the paradigmatic changes promoted by globalization and advances in technology, the use of the internet has become an environment that facilitates the practice of violence in the virtual world. The information society has enabled several technical and socia...
Gender equality remains a crucial global concern, and in the context of the Middle East, it emerges as both a complex challenge and a strategic opportunity. This article examines the multifaceted landscape of gender equality across Middle Eastern societies by analyzing cultural, legal, political, and economic barriers while highlighting reformative...
The rapid expansion of technology has led to an increase in cybercrime, posing significant challenges for international legal frameworks. The regulation of cybercrime in international law requires a comprehensive and coordinated approach to address the complexities of transnational cyber threats. This paper explores the existing legal frameworks ai...
As cybercrimes become increasingly intricate and prevalent, digital forensics has established itself as an essential field for investigating, analyzing, and presenting digital evidence. This research examines the application of various digital forensic tools and methodologies in identifying, recovering, and analyzing digital data pertinent to crimi...
The growing complexity and frequency of cybercrimes have surpassed the capabilities of traditional digital forensics methods. This study investigates the potential for an enhancement in digital forensics based on an integration with Artificial Intelligence (AI) and Open Source Intelligence (OSINT) sources. A proactive approach to cybercrime investi...
This research explores the striking parallels between the persecution of José Rizal during the Spanish colonial period and contemporary phenomena such as cancel culture, cyberbullying, and cybercrime. By analyzing Rizal’s experiences of censorship, public vilification, surveillance, legal persecution, and social isolation, this study demonstrates h...
The study addresses the nexus of press,
national security and human rights as found in
Cybercrime (Mediation, Prevention, etc.) Law 2015,
Nigeria. It delves into the experiences of Nigerian law
against cybercrimes like cyberstalking, identity theft
and online terrorism on freedom of expression and
work of journalists. Even though the governme...
The rapid advancement of information technology has brought about new challenges for society, one of which is the widespread practice of online gambling. With unrestricted access across time and space, online gambling is easily accessible through mobile devices and the internet, making the public—especially those facing economic hardship, social in...
The rapid expansion of digital technologies has ushered in a new era of connectivity, efficiency, and innovation. However, this digital transformation has also led to a parallel rise in cybercrimes, posing significant challenges to individuals, organizations, and governments. Cybercrimes encompass various illicit activities, including identity thef...
This systematic review provides a comprehensive analysis of modern software security mechanisms and their alignment with sustainable development objectives. Drawing upon 20 peer-reviewed studies from IEEE, ACM, and Springer sources (2022-2024), the investigation employs PRISMA methodology to evaluate cryptographic systems, access control models, an...
Cybersecurity emerged as a critical priority for modern organizations as they faced the dual challenges of swift digital transformation and an increasingly complex cyber threat landscape. This surge in cybercrime underscored the urgent need for robust cybersecurity measures, comprehensive frameworks, and an organizational culture emphasizing resili...
Digital Deception in the Age of Cybercrime: An Introduction, is an easy-to-understand guide to cybersecurity and digital forensics. It explores how cybercriminals operate, how experts track them down, and how cyberattacks affect people, businesses, and society. This book is for anyone who wants to understand digital threats, whether a cybersecurity...
The rapid expansion of digital technologies has transformed numerous aspects of modern life, including the way crimes are committed. Cybercrimes, ranging from identity theft and hacking to cyberbullying and online fraud, have become significant threats in the digital age. As these crimes evolve, so too must the legal frameworks that govern them, pa...
The rapid growth of digital technologies has led to the emergence of new forms of criminal behavior, particularly in the realm of cybercrime. With offenses such as hacking, identity theft, online fraud, and cyberbullying becoming increasingly common, the legal challenges surrounding criminal responsibility have expanded. A critical issue in the pro...
The insanity defence plays a crucial role in criminal law by offering an exemption from criminal liability for individuals whose mental illness impairs their ability to understand the nature or wrongfulness of their actions. This paper offers a comparative and international legal perspective on the application of the insanity defence to cybercrimes...
The intersection of mental health, cybercrime, and Islamic banking raises complex legal questions, particularly regarding the application of the insanity defence and medical liability. As cybercrimes continue to rise, they present new challenges for legal systems worldwide, especially in relation to offenders with mental disorders. These crimes, of...
The rapid advancement of technology has led to significant transformations in the global legal landscape, particularly in the realm of cybercrime and its intersection with mental health. One of the most pressing legal challenges in the digital era is determining criminal responsibility for individuals who engage in cyber offenses while suffering fr...
The rapid evolution of cyber technology has introduced new challenges to legal systems globally, particularly in the context of cybercrime, the insanity defence, and the intersection with Islamic banking practices. This paper explores the legal complexities that arise when mental health issues are factored into the accountability of individuals inv...
The intersection of Islamic law, international law, and the regulation of the insanity defence in the context of cybercrime and medical legal systems highlights a complex and multifaceted issue. As technology advances, the challenges posed by cybercrimes have become increasingly nuanced, often involving offenders with mental health issues that comp...
The intersection of insanity, ethics, and e-finance presents a complex challenge within the modern legal and regulatory landscape. As financial transactions increasingly move into the digital realm, concerns related to cybercrime, mental health disorders, and their impact on criminal responsibility have become more pronounced. This paper explores h...
The intersection of cyber offenses, mental health, and legal responsibility presents a complex challenge for modern legal systems, particularly in the realms of international law and Islamic jurisprudence. With the rise of digital technologies, cybercrimes have evolved into a major global issue, encompassing activities such as hacking, identity the...
Financial institution within the USA is faced with great challenge of risk management, hence the pursuit of every financial institution to come up with better innovative ways of managing risks. However, the emerging innovation in risk management in financial institution has an underlying negative implication which is yet to be studied. The aim of t...
Fake News (FN) prevalence on Online Social Networks (OSNs) and online websites is a worldwide issue. The previous studies on Fake News Detection (FND) have focused on rich-resource languages with limited relevance to users other than native speakers. Despite the progressing multilingual approaches, FND in low-resource languages remains obscure due...
This lack of a comprehensive legal and regulatory framework, coupled with potential limitations in law enforcement capacity, hinders South Africa's ability to effectively investigate, prosecute, and deter cybercrime. This can have significant consequences, causing financial losses, reputational damage, and a loss of trust in the digital landscape....
Perkembangan teknologi informasi dan komunikasi di era digital telah mendorong pergeseran bentuk kejahatan dari konvensional ke dunia maya, salah satunya adalah transformasi perjudian konvensional menjadi judi online. Judi online menjadi ancaman serius dalam kategori kejahatan siber (cyber crime) karena bersifat lintas batas, anonim, dan sulit dila...
The inexorable proliferation of digital technologies has precipitated an unparalleled escalation in cybercrime, necessitating a profound and multifaceted understanding of the latent interrelationship between cybercrime awareness and personality traits. This scholarly review paper synthesizes empirical evidence to elucidate the intricate dynamics un...
Combating cybercrime has become a challenge for police forces and for all state prosecution activities. The technological peculiarities of cybercrime render those responsible for the criminal activity seemingly anonymous, and if carried out, they can have an impact on entire communities, which requires law enforcement officials to use unusual or at...
These days we are constantly sharing and storing sensitive information online. From credit card numbers to personal identity details, our data is vulnerable to cyber-attacks and breaches. With the increase in cyber crime and hacking techniques, it is becoming increasingly important to protect our data through encryption. This work aims to create a...
This research aims to bridge this gap by investigating the public's level of awareness, understanding of online safety practices, and the impact of current educational campaigns. By identifying these knowledge gaps and potential shortcomings in educational initiatives, this research will inform the development of more targeted and effective strateg...
This research aims to address this knowledge gap by investigating the current state of collaboration between SAPS and the private sector in combating cybercrime. By analyzing existing information sharing mechanisms, the development of preventative strategies, and incident response capabilities within these partnerships, the research will identify a...
The development of autonomous ships signifies progress in the application of information and communication technology within the marine transportation industry. The readiness of various supporting aspects, such as ports, must accompany the operation of autonomous ships. As a maritime nation with numerous ports, Indonesia must begin to prepare for t...
This research critically investigated the challenges that the digital age imposes on traditional legal instruments and analyzed proposals for normative modernization in order to preserve fundamental rights in the face of technological transformations. The qualitative and bibliographic review covered academic productions from 2010 to 2025, consultin...
Penelitian ini mengkaji peraturan keamanan siber dan mekanisme penegakan hukum di Indonesia dalam menangani kejahatan siber dengan menggunakan pendekatan yuridis normatif. Analisis ini menunjukkan adanya kemajuan yang signifikan, termasuk pemberlakuan Undang-Undang Informasi dan Transaksi Elektronik (UU ITE) dan Undang-Undang Perlindungan Data Prib...
The rise of online drug transactions in Indonesia presents significant challenges for law enforcement due to the anonymity and rapid communication enabled by digital platforms. This study explores the use of cyber patrols and artificial intelligence (AI) in combating these illicit activities, employing a qualitative approach with interviews from fo...
Recently, the proliferation of social media has brought about so many things both good and bad; such as, the way we share information, form relationships, as well as cybercrime; resulting from maladaptation. This study examined the moderating role of embarrassabilty in the relationship between social media exposure and risky sexual behaviour among...
Introduction
Online health fraud has emerged as a significant digital risk for older adults in China, leading to considerable financial losses. This study aims to investigate the mechanisms underlying health fraud targeting and victimization among older adult populations, refining Routine Activity Theory (RAT) to account for the distinct stages of...
Penelitian ini membahas perbandingan peraturan hukum pidana terhadap kejahatan siber di Thailand dan Indonesia, serta tantangan yang dihadapi dalam penegakannya. Penelitian normatif ini menggunakan pendekatan perundang-undangan untuk mengevaluasi efektivitas kerangka hukum kedua negara dalam mencegah dan menangani kejahatan siber. Thailand menganda...
This study strives to establish salient relationship between cyber crime and business performance, the 4 th industrial revolution (4IR or Industry 4.0) surely has Artificial intelligence (AI) embedded in it, a key subset of AI that is shaping and will further shape the marketplace is Machine learning (ML). This study has leveraged ML in establishin...
Cyberbullying has evolved from a traditional form of bullying to a more complex digital form. One of the latest aspects of this development is the emergence of the metaverse as a new arena for cyberbullying behavior. This topic has received attention in research, signaling the need for in-depth studies to understand the impact and new mechanisms of...
## Abstract Explanation: "Profiling the Digital Offender: A Cyber Psychological Taxonomy of Hackers, Trolls & Incels"
The abstract of this presentation introduces a research study that aims to systematically profile digital offenders-specifically hackers, trolls, and incels-using a cyber psychological framework. Here’s a breakdown of the core idea...
The development of information technology has given rise to new forms of crime, one of which is the offense of revenge porn. In such cases, determining locus delicti (place of the crime) and tempus delicti (time of the crime) poses serious challenges, as content dissemination can occur rapidly, anonymously, and across multiple jurisdictions. This c...
The modern digital era has brought about the dynamic development of information technologies that have begun to permeate every aspect of our lives, transforming the way society communicates and engages in public life. This shift has necessitated changes in public administration, requiring adaptation to meet the evolving needs of citizens. Electroni...
Cybercrime presents a growing threat to legal frameworks across the globe, especially in digital-transitioning regions. This report critically examines Jordan’s legislative framework for addressing cybercrime, referring specifically to Cybercrime Laws No. 27 of 2015 and No. 17 of 2023. It compares Jordan’s framework with that of selected Arabian st...
Protecting users' systems from evolving cybercrime is becoming increasingly challenging. Attackers create more complicated attack patterns and configure attack behavior to resemble normal behavior to evade detection by defenders. Thus, it is indispensable to configure a security system that accurately detects attacks on each user's system. Since th...
The article examines the problematic issues of Ukraine’s participation in the international system of crime prevention in times of war. It is proved that the modern world faces challenges related to the internationalisation of crime, which makes it necessary to strengthen international cooperation in this area. In the context of martial law, this p...
This paper explores the concepts of fraud and E-fraud, delineating their definitions, differences, applications, methods, and the Algerian legal framework in combatting E-fraud. Fraud is defined as a deliberate act of deception aimed at securing unlawful gain, while E-fraud is characterized by the use of digital technologies and computer networks f...
This paper focuses on cybercrime characteristics and cybersecurity assessment, with the aim of understanding the global distribution of cybercrime and conducting modeling analysis. In terms of research methodology, data on cybercrime rates, frustration rates, success rates, reporting rates and prosecution rates of many countries and regions such as...
The escalating utilization of electronic banking services corresponds with a heightened threat of cybercrime, particularly phishing, leading to significant financial losses for customers and eroding public trust in the digital banking system. This research aims to analyze the forms of legal protection available and the construction of banks’ civil...
In today's digital age, the growing dependence on technology has significantly increased the number of
cybercrimes, making digital forensics an essential field for law enforcement and cybersecurity professionals. This research
highlights the relevance of digital forensics in modern investigations and explores various tools used to recover, analyze,...
The emergence of multi-cloud environments, characterized by the deployment of applications and services across multiple cloud platforms, has revolutionized the way businesses manage and scale their digital infrastructure. However, this paradigm shift has also introduced new challenges and vulnerabilities, making it an attractive target for cybercri...
Current network security solutions face challenges in effectively mitigating issues due to the resource constraints, heterogeneity, and dynamic behavior of IoT networks .There is a growing need to enhance measures to counteract cyber threats, as cybercrime becomes more widespread. The importance of network security is highlighted by the constant co...
This book is titled Digital Law Theory (Lex Digitalis), establishing a constructive relationship between legal theory and the Fourth Industrial Revolution, along with the emergence of Society 5.0. The Fourth Industrial Revolution significantly differs from previous industrial revolutions, characterized by new technologies that merge the physical, d...
This systematic review unveils significant convergence between cybercriminals and terrorists over the past decade, characterized by substantial overlap in tactics, capabilities, and infrastructure exploitation. Key findings illuminate the adoption of cybercriminal methods by terrorist organizations, the engagement of cybercriminal groups in terrori...
This study aims to enhance computational performance while minimizing environmental impact in AI (Artificial Intelligence) and ML (Machine Learning) applications, especially in cybersecurity, by developing energy-efficient models using a multi-objective optimization approach. The research utilizes the Non-Dominated Sorting Genetic Algorithm II (NSG...
This study examined the implications of cyber-crime on socioeconomic development of Maiduguri Metropolis, Borno state. The objectives of the study were to examine the causes of cyber-crime in Maiduguri, Borno state; ascertain the types of cyber-crime perpetrated in Maiduguri, Borno State; and examine the effect of cybercrime on education, employmen...
We report empirical evidence of web defacement and DDoS attacks carried out by low-level cybercrime actors in the Israel-Gaza conflict. Our quantitative measurements indicate an immediate increase in such cyberattacks following the Hamas-led assault and the subsequent declaration of war. However, the surges waned quickly after a few weeks, with pat...
Thus far, the literature on cybercrime has focussed on ‘cyber-dependent’, rather than ‘cyber-enabled’ crime. This has meant the emphasis has been on online settings, technical offences, and Western cybercriminals. This paper seeks to partially address these gaps through focussed qualitative case study analyses of two Nigerian offender networks base...
The defense of malware remains an important research hotspot in the field of cyberspace security. Recognizing its profound research significance, our defense against malware is still an important research hotspot in the field of cyberspace security. According to several recent surveys, global infrastructure is increasingly attacked by cyber crimes,...
Rural and tribal communities, long underserved and economically disadvantaged, often lack reliable public services. Now, billions are being invested in broadband expansion through providers like Starlink and fiber networks. While this improves internet access for over 25 million people in historically unconnected areas in the U.S. alone, it also in...
Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, healthcare, and finance. Despite their promise of enhanced security and trust, the increasing sophistication of cyb...
Recently, methods of digital content manipulation have evolved through
applications referred to by the Chinese regulator as "Deep Synthesis",
thanks to artificial intelligence technology (AI) that has enhanced content
quality. The significance of this research lies in its discussion of a relatively
recent topic that has emerged due to the misuse of...
This study examines the key factors that drive hackers to target banking systems, utilizing a cross-sectional survey approach with a sample size of 220 participants. A purposive sampling technique was used to select bank employees who handle sensitive data or for a position that involves direct contact with cyberattacks. The findings indicate that...
In an era of increasing cyber threats, small and medium-sized businesses (SMBs) are particularly vulnerable to data breaches, which can lead to significant financial losses and reputational damage. This paper explores the efficacy of AI-powered encryption as a robust solution for fortifying financial data protection in SMBs. Traditional encryption...
Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare i...
Indian Secularism is an important feature of Indian constitution which means giving equal importance to all religions i.e. "State is neutral in the matter of religion" 1 and the state has no particular religion. Article 25 of the Indian Constitution guarantees religious freedom to all citizens. It is a fundamental right. Religion is a very sensitiv...
This study analyzes the legal framework surrounding cybercrime related to love scams perpetrated through social media in Indonesia. Love scamming has emerged as a significant issue, particularly among young adults using dating applications. The research highlights the lack of specific legal regulations addressing love scams, despite existing laws o...
The difficulties of prosecuting cybercrime in Nigeria and how these difficulties can be mitigated
This study discusses the theoretical perspective of optimizing criminal law in the efforts of investigators to resolve online fraud crimes. This type of research is empirical legal research. Data sources consist of primary data in the form of interviews and secondary data in the form of primary, secondary and tertiary legal materials. Methods of co...
In recent years, Bangladesh has experienced a significant transformation in its socio-economic landscape, accompanied by the emergence of new and complex crime patterns. The role of the police in addressing these evolving challenges is pivotal to maintaining law and order, ensuring public safety, and fostering a secure environment conducive to deve...
As cybercrimes become more pervasive globally, the legal systems must address the complexities of mental health disorders that may contribute to the commission of these offenses. This paper explores the intersection of cybercrime, insanity, and medical law across three major legal systems: Islamic law, comparative legal frameworks, and internationa...
The integration of digital technologies into financial systems has revolutionized the banking industry, creating both opportunities and challenges, particularly in the realm of Islamic banking. This paper explores the evolving landscape of Islamic banking compliance in the digital era, with a particular focus on the intersections of medical law, cy...
As digital transformation intensifies across Nigeria, the importance of robust cybersecurity and comprehensive data protection frameworks becomes more pressing. This paper explores the complex intersection between Nigeria's cybersecurity initiatives and its data protection regime. By critically examining existing laws like the Cybercrimes Act 2015...
The digital age has introduced unique challenges to the realm of criminal law, particularly in relation to cybercrimes and the insanity defence. With the rise of digital technology, new forms of mental health disorders, such as internet addiction and digital compulsions, have emerged, often influencing individuals to engage in criminal activities o...