Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Routine activity theory and malware, fraud, and spam at the national level
A Kigerl - Crime, Law and Social Change, 2021 - Springer
Email spam is one of the primary means to facilitate the perpetration of internet fraud and the
distribution of malware. The present research sought to examine the impact of routine …
distribution of malware. The present research sought to examine the impact of routine …
Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities
K Yokotani, M Takano - Computers in Human Behavior, 2022 - Elsevier
Predicting offenders and victims and the timing of their offenses and damages has become a
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
Artificial intelligence and crime
R Broadhurst, D Maxim, P Brown… - Available at SSRN …, 2019 - papers.ssrn.com
This review of the rapidly growing literature on the impact of artificial intelligence (AI) on
crime and crime prevention outlines some of the likely limits and potential of AI applications …
crime and crime prevention outlines some of the likely limits and potential of AI applications …
User behavior modelling for fake information mitigation on social web
The propagation of fake information on social networks is now a societal problem. Design of
mitigation and intervention strategies for fake information has received less attention in …
mitigation and intervention strategies for fake information has received less attention in …
Market warfare strategy and rural armed banditry in Zamfara State, Nigeria
As rural armed banditry in Nigeria defies conventional warfare strategies, including
militarisation, negotiation, and amnesty, the Zamfara state government in Nigeria introduced …
militarisation, negotiation, and amnesty, the Zamfara state government in Nigeria introduced …
Adolescent girls' behavioural characteristics and their vulnerability to bullying in Manzini high schools
CI Okeke, N Tshotsho - South African Journal of Education, 2018 - ajol.info
Incidences of school bullying appear to be on the rise in most schools across the globe, and
schools in Swaziland are no exception. Sadly, adolescent girls appear to be most …
schools in Swaziland are no exception. Sadly, adolescent girls appear to be most …
Cyber-Routine Activity Theory
ZI Vakhitova - Oxford Research Encyclopedia of Criminology and …, 2025 - oxfordre.com
Cyber-routine activity theory (CRAT) was developed in response to the emergence of
cybercrime (ie, criminal activities conducted using computer networks or digital devices as …
cybercrime (ie, criminal activities conducted using computer networks or digital devices as …
Cyber fraud profiling with routine activity theory using data mining techniques/Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
A Fadlil, NM Perdana Kusuma - Malaysian Journal of Computing …, 2023 - ir.uitm.edu.my
Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record
and investigate cybercriminal behaviour. It can also be used to profile victim demographics …
and investigate cybercriminal behaviour. It can also be used to profile victim demographics …
From Data to Insights: Unraveling Spatio-Temporal Patterns of Cybercrime using NLP and Deep Learning
OC Bordeanu - 2024 - discovery.ucl.ac.uk
Measuring and map** cybercrime is crucial for informing crime reduction initiatives,
identifying gaps in strategies, and guiding further research. This thesis aims to develop and …
identifying gaps in strategies, and guiding further research. This thesis aims to develop and …
[LIVRE][B] Forensic Accountants' Strategies and Cybercrime Mitigation
JC Okechukwu - 2020 - search.proquest.com
The focus of this study was determining the strategies used by forensic CPAs to assist
business clients in mitigating cybercrime. Cybercriminals wreak havoc that has far-reaching …
business clients in mitigating cybercrime. Cybercriminals wreak havoc that has far-reaching …