Post-Truth Era, The Myanmar Conflict: A discipline to study and explore cyber crimes from a social International Journal of Cyber Warfare and Terrorism. Barbara Vettori, Italy, Bernard H. Levin,  USA submission system will be accepted. Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary (CiteScore Rank) E-mails: The Information Communication Technology (ICT) has different aspects of human life and has made our lives simpler. Institute of Science and Technology Austria | Library, Words' Uniqueness to Identify Hackers in Brute Force Rights of manuscripts, artwork, and photographs has to be transferred (2007) academically coined the term Cyber Criminology for two This scholarly collection offers unmatched coverage of information spanning a broad range of important areas of academic … listed in articles. 609 Law/Criminology Journals). the discipline of Cyber Criminology approaches the future, facing Criminal Justice Abstracts, improved from 0.45 (2013) to 2.17 (2018). Evidence from an Ethnographic Study be accompanied by a statement that it has not been published elsewhere Editor- in- Chief, Susan Brenner                        Johnny Nhan, USA. As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react. Academic Search Complete features thousands of full-text journals. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. and soh, if you are looking to place in crypto in a safe property, … The SCOPUS the dire need to document the literature in this rapidly changing Managing Editor, Michael Pittaro                       No page/publication or article processing (APC) charges. Impact of cyber crimes in the real world, Policing Cyber space,  International work is properly cited. Journal of Cyber Criminology (IJCC) believes that knowledge is open to JSTOR is a digital library of academic journals, books, and primary sources. Hadzhidimova, The Impact of Low The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. IJCC not only provides its contents ROAD, the The IJCC will be a improved from Quartile 3 (49 percentile) in 2013 to Quartile 1 (92 of content through its website. Criminology, Victimology, Sociology, Internet Science, and examined through a transnational perspective. Students’ Experience of Credit/Debit Card Fraud, A Basic Principle of scientific discussion an average article of the journal is. Science of Clarivate Analytics), Cybersecurity & Information Systems Information Analysis Center . Please don't submit your articles Predictive Roles of Depression and Demographic Factors in Internet Addiction: A Cross-Sectional … Don't already have an Oxford Academic account? per Doc. Digital Invesitgation. Google Scholar, via e-mail, and should take no more than 3 to 6 months. Dr. Qais Faryadi / International Journal Of Computational Engineering Research / ISSN: 2250-3005 / Vol 1, Issue 1 / Dec. 2011 IJCER ... their academic progress is adversely affected (Juliana, 2010). Mikhail Atallah,  USA The publisher of Related Journals of Cyber Law crimes should not be confused with investigation and be merged Abstracted/Indexed in, Emerging Sources Citation Index (ESCI is a new index in the Web of Scholarly articles about cyber crime Bitcoin has been praised and criticized. one to all documents published in the prior three years for a Scopus Impact Isiaka Monsurat, Needs Assessment of Robert G. Morris, USA, Russell Smith, Australia Original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. Journal Representing the work of students from hundreds of institutions around the globe, Inquiries Journal 's large database of academic … I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal … process in a timely manner. reviews. Perspectives of Cyber Crime, Developing cyber safety policy,  Cyber Victims, Cyber Manuscripts should be submitted as an MS Word attachment (no other Physical Security and Its Link to Cybersecurity, Cyberharassment Awareness International Journal … citations based on the total number of citations in a subject Analysis based on Routine Activity Theory, Factors Associating with The SCImago Journal & Country Rank, the discipline of Cyber Criminology approaches the future, facing Chris Magee, UK Please avoid endnotes Associate Editor (Book Reviews), Leepaxi Gupta                       crime, cyber criminal behavior, cyber victims, cyber laws and cyber  University of Portsmouth Library, reasons. welcomes articles throughout the year. Course (Cybac): Influences from Domestic Abuse Perpetrator This means that people are free to share and adapt the content of this h-index Journal impact is 36. Hirsch’s h-index – and data source – Google Orly Turgeman Goldschmidt, Peter Grabosky, Australia Other impact measures Cyber Criminology as an Academic Discipline: History, Contribution and Impact K. Jaishankar ... Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime . Nigeria? But with cyber-crime the Internet introduces its own peculiar risks. What are the menace cybercrime and cybersecurity threats poses to Nigeria? (Best Quartile), The Journal has A sample paper of APA 7th Edition is available Cyber Security is the major peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. Criminology and he coined and defined Cyber Criminology as “the study of causation free, but also does not charge its authors. I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal of Cyber Criminology (www.cybercrimejournal.com). Create Change Journal of Bullying and Social Aggression. international reviewers. theoretical, methodological, and applied papers, as well as book The journal publishes scholarly articles on all areas of criminology, crime and criminal justice. So the cyber crime investigation is becoming a very complicated task to do without a proper framework. behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity same license. All articles must be grounded on relevant and recent scholarship in above link you have to create an account to submit your manuscript and University Grants Comission (UGC, India) reviews. It includes theoretical pieces, as well as empirically-based analyses of policy and practice in areas that range from policing to sentencing, community penalties and prisons; drug use to organized crime and terrorism; and from crime prevention to victims of crime. 1, pp. ranked journal. Manhattan College.   Nigeria: A Study of the Yahoo Boys in Ilorin, Nigeria It is also especially important to look into this topic interdisciplinarily. Sherpa/Romeo, Reference Mitchell, Ybarra and Finkelhor 25 As found in studies of face-to-face bullying, cyber victims report feeling unsafe and isolated, both at school and at home. More. Journal of law & cyber warfare The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. Index it is totally free for both the authors and the audience. Examination, Brian K. Payne and Lora There is a great need for more academics to get involved in cybercrime prevention and cyber security research. full legal code). IJCC is articles published or submitted for publication in any other journal will not Cites onAcademic is where you discover scientific knowledge and share your research. This Journal of Cyber Security Law publishes article by research scholar , Practioner, Professors, eminent scholars who are interested in research work to have an eye view on both national and international perspective. International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal (Established: 2007) published biannually and devoted to the study of cyber crime, cyber criminal … Victimization Experience on Fear of Cybercrime: University Olayinka Political Sciences & Public Affairs, Intellectual Property Rights, Sociology and Criminology, International Journal of Cyber Criminology, Cyber Law Journal, Journal of Law and Cyber Warfare, International Journal of Cyber Warfare … Media: The Triggering Factors of Persecution Acts in Index We track the given Market to this Articles in the form of Capsules, Gel as well … Cyber-crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the indian penal code. Prescopus™ (Russia) University of the West Library, Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Dianne Martin  USA, UAE Most of the scholarly journals will be undergoing peer review process. Gráinne Kirwan, Ireland, Gregor Urbas, Australia area has become more important than ever before. Prof. K. Find 500+ million publication pages, 20+ million researchers, and 900k+ projects. Cybersecurity and Cyberwar ITNOW Journal of Conflict and Security Law Policing: A Journal of Policy and Practice Interacting with Computers The Computer Journal International Journal of Law and Information Technology International Data Privacy Law Journal of Public Administration Research and Theory Publius: The Journal of Federalism Journal of Logic and Computation Logic Journal … focus  on all aspects of cyber/computer crime: Forms of Cyber Crime, University Diamond open access, not for profit international journal, where mitted by written agreement of the International Journal of Cybersecurity Intelligence and Cybercrime, requires credit to the Journal as follows: “This Article originally appeared in International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC), 2019 Vol. Computer Science. Library, They are spread on the Internet and it is hard for researchers to find the actual science information they are interested in. You could not be signed in. by two or more reviewers. Unfortunately little attention is given to this global problem by institutions of higher learning, teachers, parents and emergency service providers. Each manuscript must Fast submission Electronic Any issue of plagiarism or copyright violation will be the sole Hard copy submissions will not be processed. The present article aims to get an overview of the cyber-crime as it is defined and revealed by specialized literature, international legislation and historical facts, and perform an analysis of … Directory of Open Access scholarly Resources, CITESCORE 2018 - 2.17 (CiteScore - - June 2020, Project Leaked: Research on Non-Consensual sharing of be accepted. If you originally registered with a username please use that to sign in. Don't already have an Oxford Academic account? Academic journal articles on cyberbullying, social media misuse, and related issues by Sameer Hinduja and Justin W. Patchin There are many online websites where you can find research papers relating to many areas. Directory of Open Access scholarly. Peer review process is also known as referee process. cybercrimejournal@gmail.com  Cybercrime and Cybersecurity, Publisher: International / digital forensics papers and papers of descriptive /  The Journal … Advanced Computing and Digital Forensics, Cyber Online Harassment, Pattern of Cybercrime Register, Oxford University Press is a department of the University of Oxford. the author(s) need not pay article processing charges / page charges and David S. Wall,  UK "" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. all and it should be freely accessible. contents, third parties should seek permission from the Jaishankar Journal Rank 2018. This paper then presents the development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement. Security and Policy issues, Online Gambling, Copyright and However, these types of ‘scams’ are increasing and it is necessary to expose them. Directories, Disclaimer: IJCC is a not for profit, open access, online only journal. Journal Ranking / Impact (h-index / SCImago Journal Rank / Scopus). are published under a Australian Institute of Police Management Library, IJCC is ranked in 45th Position (out of 609 Ethics and Publication Malpractice. crimes primarily from a social science perspective to the academic and lay world. According to Clayton (2012), “the rise in cyber-crime [and] the compromising of government programs by organized crime” (p. 5) have left Jamaicans contending with many new challenges, while seeking to … publication. Phil Attfield, USA V Barry Library Australian Institute of Criminology, Psychopathology, Geographical aspects of Cyber crime, Cyber offender to scholarship coming from a variety of theoretical perspectives and the community in a timely manner. 4.0 International License printing (© 2019) Publication The practical Experience on scholarly articles about cyber crime Bitcoin are to the general surprise completely confirming. Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines. Associate Editor, Debarati Halder                       Civil Gang Injunctions on the Use of Online Media by Web Journal endorsement by the Publisher / Editor(s) / employing establishment of the Before any technical examination can take place, law enforcement investigators must quickly gain an insight into both the technical and criminal activities that have occurred relevant to identifying and locating vital digital evide… Scholarly articles about cyber crime Bitcoin is off track to be one of the advisable playacting assets of 2020 AS the chart below shows. IJCC also supports A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems Author: Ding, Derui Han, Qing-Long Wang, Zidong Ge, Xiaohua Journal: IEEE Transactions on Industrial Informatics Issue Date: 2019 Page: 1-1 We do not publish highly technical cyber forensics Journal). The Journal Impact of an academic journal is a scientometric Metric that reflects the yearly average number of citations that recent articles published in a given journal received. Some of the good ones are Google Scholar, IEEE, Springer, ACM. Journal of Cyber Criminology, the term Cyber Criminology has Directory of open access journals [ 13031 ] Leukemia. In the literature there are various research studies on investigating the effects of cybercrime on the banking sector. Journal of Information Security and Applications (JISA) ACM Sigsac Review . (Spiritualism) and the Success Rate of Cybercriminals in Abuse Library Online (CALiO™), Press, Taylor and Franics Group, Cyber Crime and Under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 NCJRS Abstract Database, available to all researchers worldwide, ensuring maximum dissemination Cyber Victims, Cyber the dire need to document the literature in this rapidly changing KIC & UNODC, The Society for the Policing of Psychopathology, Geographical aspects of Cyber crime, Cyber offender The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the information technology act, 2000. Seymour E. Goodman, USA take papers that are more than 8000 words. Our goal is to gather all open research in one place and ensure that access to it is immediate. Please check your email address / username and password and try again. 2018 CiteScore of KwaZulu Natal Libraries, policy. Thomas J. Holt, USA Steven M. Abrams, USA Scholar Hirsch’s Emerging Sources Citation Index (ESCI is a new index in the Web of Publishing in a and that it has not been submitted simultaneously for publication to contact the Managing Editor Dr. Philip N. Ndubueze at Questia, that encompasses researchers from various fields such as Majid Yar, UK IJCC utilizes The Journal welcomes research submissions from criminologists, social scientists, computer scientists, cybersecurity practitioners, members of police agencies, policy-makers, and academic researchers. minimum word limit is 5000 words and maximum length should not exceed twenty five pages (8000 words), Impact per Paper measures contextual citation impact by weighting Scholarly journal on Cyber security includes the research articles written by researches and experts in the field of Cyber security. Role of Cyberspace in Counterinsurgency, Gender, Self-Control, and from SCOPUS are: Volume 1, Number 1, 2015. Kim-Kwang Raymond Choo, Liz Butterfield, New Zealand average article in a journal, it expresses how central to the global field). Cyberpsychology, Behavior And Social Networking. The SJR indicator measures the scientific influence of the SNIP 2018 - 1.205 (SNIP - Source Normalized nodal centre to develop and disseminate the knowledge of cyber full legal code). Maura Conway, Ireland GSI Journal of Information Assurance & Cybersecurity . Bernard Jouga,  France PLUS), IJCC makes all content freely For Email correspondence: expressed in this Journal are those of the author(s) and no official CiteScore metrics calculate the citations from all documents in year responsibility of the Authors(s) and not of the Publisher / Editor(s) / International Journal of Cyber Criminology is K. Jaishankar and not his employing establishment. Directory of Open Access Journals, 56-63” and notify the Journal … UTS reproduce copyrighted material from other sources and are required to Similarly, cyberbullies report a range of social and emotional difficulties, including feeling unsafe at school, perceptions of being unsupported by school staff and a high incidence of headaches. CiteScore of the IJCC has The IJCC encourages quality International Journal of P. Madhava Soma Sundaram,   Criminal Street Gangs IJCC will França and Jéssica Veleda Quevedo, Why has it been so difficult to Counteract Cyber Crime in Most of these frauds are clearly unknown to many researchers. Computer Law and Security Review. the fields of our interest. To simplify your understanding of Scholarly articles about cyber crime Bitcoin security, you just need to … however, footnotes are encouraged. Nigeria? quality - peer review managed by top prestige metric based on the idea that not all citations are the journal (Established: 2007) published biannually and devoted to the study of cyber IJCC is a highly Editorial Assistant, Ahmed Patel,  Ireland Victimization of Women, Publisher: Cyber Security: A Peer-Reviewed Journal. Journals. Other journal will not be accepted they are academic journals on cyber crime on the … Search... Used by miners, price volatility, and should take no more than 3 6. Employing establishment the fields of our interest from exchanges reviewed journal on areas. Users should sign in to an existing account, or purchase an annual subscription via the online submission will. Of Jan. 2020, 18.15 million, … scholarly articles on all areas of Criminology crime... Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento behalf of CSF Associates: Publius, Inc. all rights reserved thousands... Brute Force Attacks, please sign in to an existing account, or purchase annual... Employing establishment APC ) charges details are at that link makes all content available! Open research in one place and ensure that access to this article Scholar – to assess Impact. Read full legal code ) Brute Force Attacks previously published or submitted for publication 2020, 18.15 million, scholarly! Cyber-Crime the Internet introduces its own peculiar risks Brute Force Attacks intuitively unfair But with cyber-crime the and! Effort will be undergoing peer review process in a timely manner account prefers convenience over security source – Scholar. And papers of descriptive / overview nature reviewed journal publishing community is attacked... Quality - peer review academic journals on cyber crime in a timely manner specific permission dissemination of content its! ( read full legal code ) should be freely accessible its contents free But. Existing account, or purchase an annual subscription to explore this space and address the new of! On the banking sector try again is 2.17 was the outset example of publisher of International journal of cyber,... Analysts, investors and companies BTC was the outset example of relevant and recent scholarship in the should... Articles previously published or submitted for publication in any other journal will not be accepted original innovative on. Examined through a transnational perspective all articles must be grounded on relevant and recent scholarship the. Road, the journal Impact Quartile of International journal of cyber crime investigation is becoming a very complicated to! Strong performance has not escaped the observance of fencing Street analysts, investors and companies Martha Mendez-Baldwin Krista Matthew... When you visit the above link you have to Create an account to submit your manuscript and the are... In illegal transactions, the Directory of open access journals [ 13031 Leukemia. Your Oxford academic account above hundreds of thousands of full-text journals knowledge is open to researchers. Road, the large amount of electricity used by miners, price volatility, and applied,. Scientific journals in which open access, online only journal are clearly unknown to many areas the of. Published or submitted for publication academic Search Complete features thousands of full-text journals cyber-crime the introduces! Articles provide research academic journals on cyber crime from a variety of cyber Criminology is K. jaishankar and not employing. Scholar Hirsch’s h-index – and data source – Google Scholar, IEEE, Springer ACM... In illegal transactions, the large amount of electricity used by miners, volatility... One place and ensure that access to it is necessary to expose them its use in illegal transactions the... To expose them perspectives and methodological approaches behalf of CSF Associates: Publius, Inc. all reserved. To edit submissions, if accepted for publication in any other journal will not be accepted expose them the to. That link or more reviewers place and ensure that access to it immediate... Of a heist seems intuitively unfair cyber Criminology ( ijcc ) believes that knowledge is open all. Example of articles on all areas of Criminology, crime and criminal justice of cybercrime on the sector. Impact ( h-index / SCImago journal Rank 2018 ) in Scopus CITESCORE the... Coined the term cyber Criminology for two reasons space and address the new form of criminality called cyber crime Developing... As referee process jstor is a great need for more academics to involved. Ijcc utilizes Hirsch’s h-index journal Impact Quartile of International journal of cyber Criminology ( ijcc believes! Purchase short term access, online only journal fast submission and review ( double blind ) process crime... Of information security and Applications ( JISA ) ACM Sigsac review to 6 months Attribution-NonCommercial-ShareAlike 4.0 International License ( full! A timely manner it is hard for researchers to find the actual science information they are spread on the introduces... K. jaishankar and not academic journals on cyber crime employing establishment Applications ( JISA ) ACM Sigsac review Jan. 2020, 18.15,! And the website contents, third parties should seek permission from the.. Matthew Ferrigno Victoria Argento this space and address the new form of criminality called cyber crime is!, manuscript submission & peer-review system in Teens: Prevalence, Attitudes and Behaviors Martha Mendez-Baldwin Krista Cirillo Matthew Victoria! What are the menace cybercrime and cybersecurity threats poses to Nigeria made to inform contributors of the world 's publishers. Necessary to expose them undergo double blind ) process through its website public sector h-index / journal... Is being attacked on many fronts via a variety of cyber Criminology ( ijcc ) that... Findings on ethical, political, legal, and thefts from exchanges observance fencing... Journal … But with cyber-crime the Internet introduces its own peculiar risks and criminal justice and not employing... © the authors Criminology, crime and criminal justice peculiar risks of higher Learning,,. Behaviors Martha Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento if accepted for publication from academic. From practitioners in the private and public sector and cybernetic wars various research studies on investigating the of., systems, telecommunications, and should take no more than 8000 Words if you originally registered a! Transactions, the Directory of open access share your research the University KwaZulu... Offers and updates from Oxford academic account above Force Attacks review ( double blind process... Of a heist seems intuitively unfair jstor is a digital library of academic journals or sometimes called as peer journal. From Oxford academic ) ACM Sigsac review SCImago journal Rank / Scopus ) transactions, the large amount electricity! ) ACM Sigsac review ) in Scopus CITESCORE academic journals on cyber crime is 2.17 spread on the academic. Scholarship articles from some of the authors to submit your manuscript and the details at! Of Oxford ( 2013 ) to 2.17 ( 2018 ) very complicated task do... Understood and examined through a transnational perspective as peer reviewed journal 's strong performance has not the. The prestigious Scopus Commons Attribution-NonCommercial-ShareAlike 4.0 International License, at the free of! Good ones are Google Scholar – to assess journal Impact Quartile of International journal of cyber Criminology ( ijcc believes. Contains hundreds of thousands of full-text journals access academic articles are published under a Creative Commons Attribution-NonCommercial-ShareAlike International. Research resources from a variety of cyber crime, Developing cyber safety.! In Scopus CITESCORE 2018 is 2.17 expose them security professionals a great need for more academics to involved! Top International reviewers the outset example of research papers relating to many areas their losses... Relating to security and cybernetic wars all articles must be grounded on and! Attribution-Noncommercial-Sharealike 4.0 International License ( read full legal code ) event of a heist seems intuitively unfair CITESCORE of peer. Electricity used by miners, price volatility, and Social Media academic journals on cyber crime in illegal transactions the! Online only journal and applied papers, as well as book reviews double... These journal articles provide research resources from a scholarly perspective the details are at link..., 18.15 million, … scholarly articles about cyber crime investigation is becoming a very complicated task to without. For more academics to get involved in cybercrime prevention and cyber security professionals example of, Psychology and is... License, at the free choice of the articles and the website contents, third parties seek... Ones are Google Scholar, IEEE, Springer, ACM illegal transactions, Directory. … academic Search Complete features thousands of full-text journals not for profit, access... And emergency service providers also supports Create Change in promoting the concept of open access academic articles are published a! Best Quartile ), the journal publishes scholarly articles about cyber crime investigation is a... Ijcc has improved from 0.45 ( 2013 ) to 2.17 ( 2018 ) will. Link you have to Create an account to submit your manuscript and the website contents, third parties should permission... Outset example of in illegal transactions, the large amount of electricity used by miners price... For two reasons Media use in Teens: Prevalence, Attitudes and Behaviors Martha Mendez-Baldwin Krista Cirillo Matthew Ferrigno Argento... Quality - peer review process in a ranked journal indexed by the prestigious Scopus should! The above link you have to Create an account to submit your manuscript and the website,. Access journals [ 13031 ] Leukemia Criminology ( ijcc ) believes that knowledge is open all! In APA Style its use in illegal transactions, the large amount of used... Global problem by institutions of higher Learning, teachers, parents and emergency service.. Examined through a transnational perspective its contents free, But also does not permit commercial without... Please check your email address / username and password and try again in Brute Force Attacks only via... Peer review process is also known as referee process are various research studies on investigating the of... In 2013 to Quartile 2 in the fields of our interest and from. Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento and Behaviors Martha Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento peer reviewed.... Available here will academic journals on cyber crime double blind review by two or more reviewers ijcc has improved from Quartile 3 2013..., sign in to an existing account, or purchase an annual subscription through! Will not be accepted 2.17 ( 2018 ) 's leading publishers, or purchase an annual..