Fraud is not a new crime that emerged in the 2000s. It has been around for a long time, but the advent of the internet has made it easier and opened the doors to various fraud forms. Fraud usually involves two individuals where one tries to exploit the other for financial gain (Smith, 2008). It …
One of the biggest challenges of the fight against crime is that crimes that travel worldwide, such as computer crimes including fraud, travel through various jurisdictions. The police and law enforcement model that we apply is not suited to the reality of online fraud. Several cases have shown that it is not uncommon for a …
The rise of online transactions, particularly in massive growth since the appearance of COVID-19, brings its wind of advantages and disadvantages. Indeed, many fraudsters seized this opportunity to carry out new traps for consumers. One fraud that is, unfortunately, becoming very popular is pet scam. We are talking about sales of cats, dogs, and other …
Security breaches in organizations have been on the rise in recent years. It is becoming increasingly necessary for organizations to investigate and research the causes of these flaws. A better understanding of the elements that cause security breaches can correct gaps in either knowledge, human resources and/or materials resources. Elements well-identified in previous studies, such …
Cybersecurity incidents can have various significant consequences on an organization or a company. These consequences can then lead to other adverse effects, such as damaging the company’s reputation and causing the loss of customers or business partners. The growing increase in reported cases of cyber incidents leads experts to want to act ahead by prioritizing …
Cybersecurity Management and prevention programs’ success and relevance depend primarily on improving employees’ security behaviours within an organization. Indeed, several existing programs make sure to apply those concepts, so employees have the proper tools and knowledge to intervene in a cybersecurity compromise situation within their organizations. Existing programs like education, training, and security awareness programs …
Radical groups and radicalized individuals are often confused as being all violent and at risk of committing acts of terrorism. Radicals are defined as individuals who support or justify terrorism, and sometimes they express a desire to engage in radical acts of violence. However, very few studies have focused on what differentiates violent radicals, who …
Social networks are helpful tools to communicate with each other. Indeed, they allow humans to interact with each other, keep in touch with distant relationships, connect with groups of similar interests, stay up to date with news, and much more. However, it should not be denied that these social networks also contain perverse effects, for …
Like cybercrime, large-scale cyber-attacks are overgrowing and attracting attention from both media and government agencies mainly because these attacks are often linked to threats of cyberterrorism. A misconception is to take for granted that cyberterrorism is precisely the same phenomenon as terrorism and then uses the exact definition for both phenomena. Moreover, even the definition …
Presented by Cuneyt Akcora as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anonymous transactions, has made it easier for ransomware developers to demand ransom by encrypting sensitive user data. The recently revealed strikes of ransomware attacks …