Shaisultanov et al., 2024 - Google Patents
Combating Internet Fraud through Operative-Search Measures.Shaisultanov et al., 2024
- Document ID
- 15012676215120680983
- Author
- Shaisultanov S
- Akimzhanov T
- Abdrakhmanov B
- Bazarlinova A
- Bazarlinova A
- Publication year
- Publication venue
- Law, State & Telecommunications Review/Revista de Direito, Estado e Telecomunicações
External Links
Snippet
Abstract [Purpose] Currently, the rapid development of Internet technologies leads to an increase in the number of fraud-related offences, which requires effective ways to prevent and detect them. The purpose of the study was to determine the essence, features, and …
- 238000000034 method 0 abstract description 38
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chandra et al. | A taxonomy of cybercrime: Theory and design | |
Wronka | Anti-money laundering regimes: A comparison between Germany, Switzerland and the UK with a focus on the crypto business | |
Akinbowale et al. | The use of the Balanced Scorecard as a strategic management tool to mitigate cyberfraud in the South African banking industry | |
Syahril | Cyber Crime in terms of the Human Rights Perspective | |
Smikle | The impact of cybersecurity on the financial sector in Jamaica | |
Vitvitskiy et al. | Peculiarities of cybercrime investigation in the banking sector of Ukraine: review and analysis | |
Matveev et al. | Cybercrime in the Economic Space: Psychological Motivation and Semantic-Terminological Specifics | |
Chigada | Towards an aligned South African national cybersecurity policy framework | |
Nugroho et al. | Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries | |
Sturc et al. | The specifics and patterns of cybercrime in the field of payment processing | |
Pushkarev et al. | Managing the investigation of cryptocurrency crimes in the Russian Federation | |
Drobotov et al. | Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime | |
Sturc et al. | Developing a system of indicators for clustering financial cybercrime | |
Mutungi et al. | Digital anti-corruption typology for public service delivery | |
Shukla et al. | Data privacy | |
Mantelero et al. | Social media and big data | |
Tajpour et al. | Identity Theft and Prevention | |
Shaisultanov et al. | Combating Internet Fraud through Operative-Search Measures. | |
Luzgina et al. | Cyber threats to information security in the digital economy | |
Burton et al. | Pig butchering in cybersecurity: A modern social engineering threat | |
Njotini | Protecting critical databases-towards a risk based assessment of critical information infrastructures (CIIS) in South Africa | |
Lincke | Complying with US Security Regulations | |
Pillay et al. | Exploring the prevalence of cybercrime in the banking industry in KwaZulu-Natal, South Africa | |
Arun | Penetrative or Embracive? Exploring State, Surveillance and Democracy in India | |
Sekgololo | The State of Cybersecurity in South Africa, 2010-2019 |