IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • Articles that contain the tag "cybercrime"

    Study on Cyber Attacks over Time and Cybercrime Evolution in Romania

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.01.07
    Pages: 69-78
    AbstractPlus | Quick view | Full article | Citations


    Cyberterrorism

    Author(s): GHERGHINA, Cătălina
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.02.04
    Pages: 33-39
    AbstractPlus | Quick view | Full article | Citations


    Overview on Phishing Attacks

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.02.07
    Pages: 61-67
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime and National Security in the Context of Globalization

    Author(s): CONSTANTIN, Alexandru
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    The Components of Cyber-Terrorism

    Author(s): MARCEL, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.06
    Pages: 49-58
    AbstractPlus | Quick view | Full article | Citations


    The Concept of Cybercrime and Online Threats Analysis

    Author(s): PARODI, Filippo
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.01.07
    Pages: 59-66
    AbstractPlus | Quick view | Full article | Citations


    An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks

    Author(s): MARIN, Răzvan-Ionuț
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.01.05
    Pages: 47-52
    AbstractPlus | Quick view | Full article | Citations


    Computer Frauds

    Author(s): BASAMAC, Loredana
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.01.06
    Pages: 53-58
    AbstractPlus | Quick view | Full article | Citations


    Cyber Kill Chain Analysis

    Author(s): MIHAI, Ioan-Cosmin; PRUNĂ, Ștefan; BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.04
    Pages: 37-42
    AbstractPlus | Quick view | Full article | Citations


    New Challenges for Cybersecurity and Possible Criminal Law

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.02
    Pages: 15-21
    AbstractPlus | Quick view | Full article | Citations


    Importance of Operating Systems Type in Computer Forensics

    Author(s): ÇAKIR, Hüseyin; KILIÇ, Mehmet Serkan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.01
    Pages: 9-20
    AbstractPlus | Quick view | Full article | Citations


    The Challenges to Enforcement of Cybercrimes Laws and Policy

    Author(s): EFG, Ajayi
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.04
    Pages: 33-48
    AbstractPlus | Quick view | Full article | Citations


    Identity Crime: Deliberating on Remedies for the Victim

    Author(s): HOLM, Eric
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.05
    Pages: 49-60
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime Prevention in Online Transaction Using Biometric Access Control

    Author(s): NWOYE, Chinedu J.
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.06
    Pages: 61-72
    AbstractPlus | Quick view | Full article | Citations


    Cyber Laundering: Understanding the Trends and Typologies

    Author(s): RAZA, Muhammad Subtain
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2015.02.08
    Pages: 86-90
    AbstractPlus | Quick view | Full article | Citations


    The Impact of Cybercrimes on Global Trade and Commerce

    Author(s): EFG, Ajayi
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2016.02.04
    Pages: 31-50
    AbstractPlus | Quick view | Full article | Citations


    The Darknet: A New Passageway to Identity Theft

    Author(s): HOLM, Eric
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.04
    Pages: 41-50
    AbstractPlus | Quick view | Full article | Citations


    Detecting Cyber Bullies on Twitter using Machine Learning Techniques

    Author(s): MURALI, Sashaank Pejathaya
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.01.07
    Pages: 63-66
    AbstractPlus | Quick view | Full article | Citations


    Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data

    Author(s): HASHIM, Mohd. Shamir; RAHMAN, Noraini Abdul; ZIN, Ahmad Nasir Udin Mohd.; MAHAMAD, Khairul Akma; AHMAD, Fauzan Amrullah
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.02.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations