2013
DOI: 10.1109/msp.2013.112
|View full text |Cite
|
Sign up to set email alerts
|

Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…In parallel there are calls for SNS to introduce tools (e.g. anti-bullying reporting tools) and automatic security measures (such as dual factor identification requests when users log-in from unknown computers), and give greater control to users (Gradon, 2013;Cassidy et al, 2012;Whittle et al, 2012). This paper adds to these calls by suggesting that not only do privacy settings, their availability, ease of discovery and ease of use are important from a perceived privacy point of view, but they might be also important in making users more responsible for their personal information, as we have shown that users who perceive high levels of control are less likely to be victimised.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In parallel there are calls for SNS to introduce tools (e.g. anti-bullying reporting tools) and automatic security measures (such as dual factor identification requests when users log-in from unknown computers), and give greater control to users (Gradon, 2013;Cassidy et al, 2012;Whittle et al, 2012). This paper adds to these calls by suggesting that not only do privacy settings, their availability, ease of discovery and ease of use are important from a perceived privacy point of view, but they might be also important in making users more responsible for their personal information, as we have shown that users who perceive high levels of control are less likely to be victimised.…”
Section: Discussionmentioning
confidence: 99%
“…Among such inadvertent outcomes of social networking use are breaches of personal information security, which have become repeatedly reported in the press. Personal and security sensitive information losses resulting from cybercrime, including online identity theft or usurpation (Al-Daraiseh et al, 2014;Reyns and Henson, 2015), financial fraud, stalking and blackmail, are on the rise (Gradon, 2013;Guitton, 2013).…”
Section: Introductionmentioning
confidence: 99%
“…Ransomware authors have developed a number of clever tricks to make it hard to undo their work, but following are some tricks from you can check whether you are proceeding towards infection or not [14].…”
Section: Ransomware Tricksmentioning
confidence: 99%
“…Amongst such inadvertent outcomes of social networking use are online breaches of personal information security, which have been repeatedly reported in the press. 4 Personal and security sensitive information losses resulting from cybercrime, including online identity theft, financial fraud, and even blackmail, are on the rise (Gradon, 2013;Guitton, 2013). Chellappa and Pavlou (2002) maintain that such breaches of security influence the perceived security and trust of online customers, however, security protection mechanisms such as encryption, authentication and visual notices have been found to positively contribute to customer perceptions of security (Chellappa and Pavlou, 2002).…”
Section: Theoretical Backgroundmentioning
confidence: 99%