Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
The Human Factor of Cybercrime
Social Science Computer Review (SSCR), Volume 40, Issue 4Pages 860–864https://doi.org/10.1177/08944393211011584This volume highlights the central role of the human factor in cybercrime and the need to develop a more interdisciplinary research agenda to understand better the constant evolution of online harms and craft more effective responses. The term “human ...
- research-articleDecember 2015
A serious game-based solution to prevent bullying
- Cátia Raminhos,
- Ana Paula Cláudio,
- Maria Beatriz Carmo,
- Susana Carvalhosa,
- Maria de Jesus Candeias,
- Augusta Gaspar
MoMM 2015: Proceedings of the 13th International Conference on Advances in Mobile Computing and MultimediaPages 63–72https://doi.org/10.1145/2837126.2837135This paper presents a Serious Game with the main purpose of inducing attitude changes as a way to prevent bullying. The target audience are young people between 10 and 12 years old. The rationale for prevention is: first, to help victims of these ...
- research-articleAugust 2014
Social networks analysis and perception of social support of young mothers in the process of reconstruction: the social fabric of winter victims in the colombian caribbean (South America)
This study describes and analyzes social networks and perception of social support of a group of young mothers affected by winter 2010. The objective was to determine the relationship between the structural and functional characteristics of social ...
- ArticleJuly 2013
A Direct Insight into Victims of Cybercrime
TRUSTCOM '13: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsPages 603–610https://doi.org/10.1109/TrustCom.2013.74With increasing popularity and 1.9 billion cumulative registered accounts, virtual worlds are seeing an increase in a cybercrime named Virtual Property Theft. Currently, there is no data available on victim's perception of reasons for this theft. In ...
- research-articleApril 2009
Cross-coupling in 65nm fully integrated EDGE system on chip: design and cross-coupling prevention of complex 65nm SoC
Entry mobile phone market is a mass volume segment where the modem and application technologies are commoditized and fully proven. Nevertheless the cost and power reduction target continues to heavily drive leading edge innovations. Semiconductor ...