- Full text PDF available (3)
- This year (0)
- Last 5 years (6)
- Last 10 years (6)
Executive Summary Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms. Conducting quantitative research on underground laundering activity poses an inherent challenge: Bad guys and their banks don't share information on… (More)
Censorship of information often has the opposite effect by drawing attention to the censored material.
Researchers in Information Systems Security (ISS) have recommended the use of fear appeals in order to foster user adoption. However, research in the fields of ethics, management and consumer sales confirm that not only is the use of coercive methods less efficient but it can also cause resistance phenomena. The purpose of our research was to determine… (More)
The main purpose of this chapter is to illustrate a landscape of current literature in cybercrime taking into consideration diffusion of innovation theories and economic theory of competition. In this chapter, a narrative review of the literature was carried out, facilitators leading to cybercrime were explored and explained the diffusion of Cybercriminals'… (More)