This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would se...
In 2015, the U.S. Office of Personnel Management (OPM) suffered one of the largest governmentrelated...
Improved understanding of conditions that foster appropriate use of security tools by cyber security...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Abstract. In a time where there is an increase in online traffic, and needing to have an online pres...
With cybercrimes on the rise, cybersecurity has become very important today. Every company is eager ...
The emergence and continuous development of technology continues to create opportunities for people ...
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bull...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
Social networking sites, such as Facebook and MySpace, have become increasingly popular among teens ...
The purpose of this qualitative case study was to explore the perceptions of middle school, technolo...
In the present world, everyone uses the Internet and to access the internet they would need to use a...
In past decades security dilemmas focused on state on state activities where the tools of power were...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
The purpose of this study is to explore how current digital curation and archives and records manage...
In 2015, the U.S. Office of Personnel Management (OPM) suffered one of the largest governmentrelated...
Improved understanding of conditions that foster appropriate use of security tools by cyber security...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
Abstract. In a time where there is an increase in online traffic, and needing to have an online pres...
With cybercrimes on the rise, cybersecurity has become very important today. Every company is eager ...
The emergence and continuous development of technology continues to create opportunities for people ...
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bull...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
Social networking sites, such as Facebook and MySpace, have become increasingly popular among teens ...
The purpose of this qualitative case study was to explore the perceptions of middle school, technolo...
In the present world, everyone uses the Internet and to access the internet they would need to use a...
In past decades security dilemmas focused on state on state activities where the tools of power were...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
The purpose of this study is to explore how current digital curation and archives and records manage...
In 2015, the U.S. Office of Personnel Management (OPM) suffered one of the largest governmentrelated...
Improved understanding of conditions that foster appropriate use of security tools by cyber security...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...