Proposed Study Yes Yes Yes Yes Yes Scopus Database Yes Explores research from 2010 to February 2022 related to AI applications for cybersecurity from a descriptive point of view, and a detailed state-of-the-art analysis We performed a systematic literature review (SLR) on the use of AI for...
There is a broad spectrum of cyber-attacks that represent a variety of threats in the digital world. Insights into several critical types of these attacks are provided, as highlighted in the literature and summarized in Table1. This information emphasizes the complexity and wide range of cyber th...
Onlineromancescams can have a detrimental effect on a victim's life, causing them to spend all their savings, become indebted, and even be subjected to blackmail or identity theft. A team of researchers at Abertay University in the U.K. recently reviewed existing literature focusing on romancef...
There is a broad spectrum of cyber-attacks that represent a variety of threats in the digital world. Insights into several critical types of these attacks are provided, as highlighted in the literature and summarized in Table1. This information emphasizes the complexity and wide range of cyber th...
Through a focused systematic review of 352 articles across computer science, criminal justice and criminology literature using the PRISMA method, this paper clarifies terminologies, explores the rise of cybercrimes, and explains the value of SCP for responding to cybercrimes. We provide a review of ...
With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by n
We need to reduce cybercrime.Even without the cyber warriors bit, we need to do that. Cybercrime is bad, and it’s continuing to get worse. Yes, it’s hard. But it’s important. We need international cyberwar treaties.I couldn’t agree more about this. We do. We need to start thin...
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening
The same authors found that the least common method of victimisation was the posting of personal information about the victim online. Furthermore, the roles of age and gender have been extensively researched in the literature (Kiriakidis and Kavoura, 2010). For example, there is evidence to ...
The approach in [39] uses the organizational perspective to enhance the model by roles of the activity originators. On the other hand, in [40], the time perspective is used. 3. Related work Several publications have performed a literature review on the usage of process mining. These reviews...