IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Volume 4, Issue 2, Year 2015

    IJISC
    Volume 4, Issue 2, Year 2015

    Published: December 2015
    Acceptance rate: 27%

    No. of scientific articles: 8
    No. of total articles: 14

    View IssuePlus

    ISSN: 2285-9225
    e-ISSN: 2286-0096
    DOI: 10.19107/IJISC.2015.02



    Table of Contents

    Importance of Operating Systems Type in Computer Forensics

    Author(s): ÇAKIR, Hüseyin; KILIÇ, Mehmet Serkan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.01
    Pages: 9-20
    AbstractPlus | Quick view | Full article | Citations


    Digital Forensics: Current Scenario and Future Challenges

    Author(s): LAKADE, Sonal
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.02
    Pages: 21-26
    AbstractPlus | Quick view | Full article | Citations


    Ransomware – an Emerging Threat

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.03
    Pages: 27-32
    AbstractPlus | Quick view | Full article | Citations


    The Challenges to Enforcement of Cybercrimes Laws and Policy

    Author(s): EFG, Ajayi
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.04
    Pages: 33-48
    AbstractPlus | Quick view | Full article | Citations


    Identity Crime: Deliberating on Remedies for the Victim

    Author(s): HOLM, Eric
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.05
    Pages: 49-60
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime Prevention in Online Transaction Using Biometric Access Control

    Author(s): NWOYE, Chinedu J.
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.02.06
    Pages: 61-72
    AbstractPlus | Quick view | Full article | Citations


    Infection Vectors – Risk Factors for Financial Transactions

    Author(s): ŞCHEAU, Mircea-Constantin; ARSENE, Liviu; DINCĂ, Gerald
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2015.02.07
    Pages: 73-85
    AbstractPlus | Quick view | Full article | Citations


    Cyber Laundering: Understanding the Trends and Typologies

    Author(s): RAZA, Muhammad Subtain
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2015.02.08
    Pages: 86-90
    AbstractPlus | Quick view | Full article | Citations


    Interview with Ms. Daria CATALUI

    Author(s): MIHAI, Ioan-Cosmin
    Section: Interviews with experts
    Pages: 91-97
    View article | Download PDF

    European Cooperation in Combating Cybercrime Conference

    Author(s): DENA, Alexandru
    Section: Books Reviews and Conferences Analysis
    Pages: 99-100
    View article | Download PDF

    A Central European Public-Private Dialogue Platform

    Author(s): CHRZANOVSKI, Laurent
    Section: Books Reviews and Conferences Analysis
    Pages: 101-102
    View article | Download PDF

    BlackHat USA 2015

    Author(s): BARBU, Ionuț-Daniel
    Section: Books Reviews and Conferences Analysis
    Pages: 103
    View article | Download PDF

    OWASP EEE Bucharest 2015

    Author(s): PASCARIU, Cristian
    Section: Books Reviews and Conferences Analysis
    Pages: 104
    View article | Download PDF

    “Challenges and Strategies in Cybersecurity” Book Review

    Author(s): BACIVAROV, Ioan
    Section: Books Reviews and Conferences Analysis
    Pages: 105-106
    View article | Download PDF