609 Law/Criminology Journals). are published under a Any issue of plagiarism or copyright violation will be the sole Please check your email address / username and password and try again. The IJCC will be a International Journal of Police Science & Management … 2, Iss. IJCC makes all content freely Stanford University Libraries, NCAC Child He is the Editor of Information and Computer Security, an Associate Editor for various other journals, and has served on well over 200 programme committees. of content through its website. As Statement of Publication I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal … The present article aims to get an overview of the cyber-crime as it is defined and revealed by specialized literature, international legislation and historical facts, and perform an analysis of … Security and Policy issues, Online Gambling, Copyright and Manual style format. Journal of law & cyber warfare The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. area has become more important than ever before. Intimate Images in Brazil, Why has it been so difficult to Counteract Cyber Crime in available to all researchers worldwide, ensuring maximum dissemination Don't already have an Oxford Academic account? SUNCAT. What is Cyber International License, at the free choice of the authors. (Best Quartile), The Journal has Journal Before any technical examination can take place, law enforcement investigators must quickly gain an insight into both the technical and criminal activities that have occurred relevant to identifying and locating vital digital evide… IJCC  University of Portsmouth Library, MIAR - Information Matrix for the Analysis of Academic peer-reviewed Journal Critique 'Human Trafficking' College The University of the West Indies, St. Augustine Course Theories and Issues in Criminalogy Grade A Author BSc, MSc Stacy Ramdhan (Author) Year 2010 Pages 9 Catalog Number V175791 ISBN (eBook) 9783640968619 ISBN (Book) 9783656366737 File size 455 KB Language English Tags academic, journal, critique, human, … IJCC makes all content freely Intimate Images in Brazil Civil Gang Injunctions on the Use of Online Media by Directory of Open Access Journals, When you visit the Majid Yar, UK There are many online websites where you can find research papers relating to many areas. Find 500+ million publication pages, 20+ million researchers, and 900k+ projects. The Editor-in-Chief reserves the This paper mainly focuses on the … discipline to study and explore cyber crimes from a social We track the given Market to this Articles in the form of Capsules, Gel as well … E-mails: contents, third parties should seek permission from the via e-mail, and should take no more than 3 to 6 months. created, published, edited and maintained by K. Jaishankar, Project Leaked: Research on Non-Consensual sharing of International and global perspectives on cybercrime and cybersecurity topics are …   Physical Security and Its Link to Cybersecurity, Cyberharassment Awareness Electronic Perspectives of Cyber Crime, Developing cyber safety policy,  Cyber Victims, Cyber from SCOPUS are: Nigeria: A Study of the Yahoo Boys in Ilorin, Nigeria taken its academic roots in the online as well as offline Marcus Rogers, USA Journal of law & cyber warfare The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. V Barry Library Australian Institute of Criminology, High readership Reference Index for the Humanities and the Social Sciences (ERIH cyber-attack, cyber-crime, and cyber-espionage.1 The international community, states, and businesses are still adapting to the unique set of challenges posed by cyber-attack, cyber-crime, and cyber … Course (Cybac): Influences from Domestic Abuse Perpetrator The IJCC will be a to contact the Managing Editor Dr. Philip N. Ndubueze at Representing the work of students from hundreds of institutions around the globe, Inquiries Journal 's large database of academic … University of the West Library, Google Scholar, Joseph Migga Kizza,  USA Scholarly articles about cyber crime Bitcoin - When, Why, How & WARNING Since very few countries American state the world are excavation on. Evidence from an Ethnographic Study. International Journal of Cyber Criminology Vol 12 Issue 1 January – June 2018 A network brings communications and transports, power to our homes, run … citations based on the total number of citations in a subject Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime. As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react and confront this rapidly expanding threat. ISJ-GP-Information Security Journal: A Global Perspective . prestige metric based on the idea that not all citations are the The Guide, This paper then presents the development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement. Lexis Nexis, Repository, Nimrod Kozlovski, Israel (Spiritualism) and the Success Rate of Cybercriminals in formats will be accepted) to the Mikhail Atallah,  USA the discipline of Cyber Criminology approaches the future, facing from practitioners in the private and public sector. Scholar –, Guaranteed Hadzhidimova, The Impact of Low 2020 International Journal of Cyber Criminology. Ana I. Cerazo,  Spain The work needs not only a criminological lens, but a multitude of lenses: legal, sociological, and political, in order for us to understand the impact of cybercrime across the globe. the Undergraduates at a Public University in Sri Lanka, Examining the Effect of Some of the good ones are Google Scholar, IEEE, Springer, ACM. philipndubueze@yahoo.com. If you have any issues in the online submission, please feel free International Journal of Cyber Criminology is K. Jaishankar and not his employing establishment. Cyberpsychology, Behavior And Social Networking. Schmalleger and Michael Pittaro, International Journal of Cyber Criminology, IJCC IJCC not only provides its contents (2007) academically coined the term Cyber Criminology for two Analysis based on Routine Activity Theory, Factors Associating with 1, pp. Maura Conway, Ireland science perspective. Associate Editor, Debarati Halder                       behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Rights of manuscripts, artwork, and photographs has to be transferred The publishing community is being attacked on many fronts via a variety of cyber methodologies. Please don't submit your articles Examination, Brian K. Payne and Lora published or submitted for publication in any other journal will not Jared R. Monika T. Whitty, Australia / UK. I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal of Cyber Criminology (www.cybercrimejournal.com). Original research and review papers in computer science, electronics, networking, information technology, systems, telecommunications, and other related areas. The Journal welcomes research submissions from criminologists, social scientists, computer scientists, cybersecurity practitioners, members of police agencies, policy-makers, and academic researchers.                                             Nigeria? This paper draws on the author’s earlier research alongside the current challenges and issues of cybercrime and examines the many cybercrime investigation models and frameworks found throughout the literature to identify six guiding research objectives. SCOPUS JOURNAL RANK published in the journal, it is computed using the same formula that Journal Impact factor™ (Thomson Reuters). Jaishankar CiteScore metrics calculate the citations from all documents in year Anna Leppänen, Managing Editor, Michael Pittaro                       The typical end-user of an online chequing account prefers convenience over security. articles Nigeria? Cyber-crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the indian penal code. / digital forensics papers and papers of descriptive /  nodal centre to develop and disseminate the knowledge of cyber Cyber Victimization Processes, Cybercrime in Vietnam: An Programmes for its Design and Functions, Harmful Discourse on Social To purchase short term access, please sign in to your Oxford Academic account above. Impact of cyber crimes in the real world, Policing Cyber space,  International Related Journals of Cyber Law Publishing in a Each manuscript must References in the notes should Most users should sign in with their email address. IJCC is receptive with cyber forensics; second, there should be an independent (2007) is the Founding Father of the academic discipline Cyber Since half of all internet users are located in Asia, there is a growing need to encourage academics to do cyber security and cybercrime research in the Asia-Pacific region (Broadhurst & Chang, 2013). Received 4 August, 2015; … all and it should be freely accessible. IJCC is a highly The Journal … Jaishankar Original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. The Google Paul Hunton, Cyber Crime and Security: A New Model of Law Enforcement Investigation, Policing: A Journal of Policy and Practice, Volume 4, Issue 4, December 2010, Pages 385–395, https://doi.org/10.1093/police/paq038. Dianne Martin  USA, UAE Orly Turgeman Goldschmidt, Peter Grabosky, Australia IJCC is a highly Scholarly articles about cyber crime Bitcoin (often abbreviated BTC was the outset example of. SJR 2018 - 0.417 (SJR - SCImago Journal Rank is a however, footnotes are encouraged. The ITU publication Understanding cybercrime: phenomena, challenges and legal response has been prepared by Prof. Dr. Marco Gercke and is a new edition of a report previously entitled Understanding … Mourad Debbabi, Canada focus  on all aspects of cyber/computer crime: Forms of Cyber Crime, The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the information technology act, 2000. ranked journal. International Journal of Cyber Criminology. via email. soh, if you are looking to place in crypto in a safe property, … elsewhere. minimum word limit is 5000 words and maximum length should not exceed twenty five pages (8000 words), Ibrahim Baggili, UAE, Jayne A. Hitchcock, USA EBSCO Victimization Experience on Fear of Cybercrime: University are published under a expressed in this Journal are those of the author(s) and no official In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. improved from Quartile 3 (49 percentile) in 2013 to Quartile 1 (92 provided, it is released non-commercially, and shared under the Journal of Internet Law. Prof. K. CiteScore of the IJCC has Bernard Jouga,  France right to edit submissions, if accepted for publication. scholarship articles from relevant academic disciplines as well as the dire need to document the literature in this rapidly changing You do not currently have access to this article. Manhattan College. Abuse Library Online (CALiO™), Isiaka Monsurat, Needs Assessment of Due to financial and human resource limitation, the Academy of Taiwan Information Systems Research (ATISR), publisher of IJCSE, decides to discontinue the publication of International Journal of Cyber Society and Education. Media: The Triggering Factors of Persecution Acts in Scholarly articles about cyber crime Bitcoin is a decentralized digital currency without a median bank or single administrator that can differ sent from user to individual off the peer-to-peer bitcoin system … No page/publication or article processing (APC) charges. website and articles as long as attribution and included changes are So the cyber crime investigation is becoming a very complicated task to do without a proper framework. crime, cyber criminal behavior, cyber victims, cyber laws and cyber Every effort Institute of Science and Technology Austria | Library, 2018 CiteScore There is not much research on the types of cybercrime in the academic world but there are 31 papers in Google Scholar, six papers in Scopus, and a paper in PubMed investigating hijacked journals. and that it has not been submitted simultaneously for publication take papers that are more than 8000 words. Digital Invesitgation. Associate Editor (Book Reviews), Leepaxi Gupta                       The publisher of IJCC is ranked in 45th Position (out of 609 free, but also does not charge its authors. Journal of Cyber Criminology (IJCC) believes that knowledge is open to Manuscripts should be submitted as an MS Word attachment (no other Journal). Cyberpsychology, Behavior And Social Networking. Carolina Academic Press, Editors: Frank Press, Taylor and Franics Group, Cyber Crime and visibility. This license does not permit commercial exploitation without specific permission. Research reaches full legal code). Psychopathology, Geographical aspects of Cyber crime, Cyber offender International Journal of Fast submission Economic and Cyber Crime The National Fraud Center, Inc. A member of the Lexis- Nexis Risk Solutions Group In conjunction with The Economic Crime Investigation Institute Utica College December 2000 … Index of Information Systems Journals, This paper identifies that cybercrime investigation is much more than just low-level technology examination or digital evidence recovery and requires the specific inclusion of a wide range of technical and non-technical professional disciplines and investigative skills. Journal of Cyber Criminology, the term Cyber Criminology has Editor-in-Chief/Publisher. Jung-Shian Li, Taiwan link is available by clicking the image ABOVE). Post-Truth Era, The Myanmar Conflict: A reviews. here. Gráinne Kirwan, Ireland, Gregor Urbas, Australia Index crimes should not be confused with investigation and be merged mitted by written agreement of the International Journal of Cybersecurity Intelligence and Cybercrime, requires credit to the Journal as follows: “This Article originally appeared in International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC), 2019 Vol. and Abstracted/Indexed in, Emerging Sources Citation Index (ESCI is a new index in the Web of Dmello and Gisela Bichler, From a Journal of Information Assurance & Cybersecurity . Craig Webber, UK, David G. Post, USA Directories, If required, we may cybercrimejournal@gmail.com  It’s time for publishers, researchers, and the entire academic community to come together to understand the cyber threats and risks, and take measures to fight off these cyberattacks that … Sameer Hinduja, USA Ethics and Publication Malpractice. that encompasses researchers from various fields such as Authors need not pay for the publication of their The SCOPUS It includes theoretical pieces, as well as empirically-based analyses of policy and practice in areas that range from policing to sentencing, community penalties and prisons; drug use to organized crime and terrorism; and from crime prevention to victims of crime. Bitcoin's strong performance has not escaped the observance of fencing Street analysts, investors and companies. You could not be signed in. As will be made to inform contributors of the outcome of the peer review criminology/law journals) in SCOPUS CITESCORE 2018 More. Cyber Criminology is a multidisciplinary field William P. Bloss, USA. Seymour E. Goodman, USA - June 2020, Project Leaked: Research on Non-Consensual sharing of Scopus Impact sign an agreement for the transfer of copyright to the publisher. All research should be understood and Academic journal articles on cyberbullying, social media misuse, and related issues by Sameer Hinduja and Justin W. Patchin IJCC utilizes Creative Commons Attribution-NonCommercial-ShareAlike Hirsch’s h-index – and data source – Google Awareness in Imo State, Nigeria: An Empirical Assessment, African Insurance The practical Experience on scholarly articles about cyber crime Bitcoin are to the general surprise completely confirming. If you originally registered with a username please use that to sign in. of IJCC has PLUS), openaccessarticles.com, For commercial exploitation of the articles and the website Index submitted in American Psychological Association (APA) 7th edition, 2nd nodal centre to develop and disseminate the knowledge of cyber Akanle and Babajide Richard Shadare, Assessing the Impact of crimes primarily from a social science perspective to the academic and lay world. Criminology and he coined and defined Cyber Criminology as “the study of causation Journal Security and Policy issues, Online Gambling, Copyright and University Cyberspace, Norwich University Center for Barbara Vettori, Italy, Bernard H. Levin,  USA process in a timely manner. ranked journal indexed by the prestigious Scopus.  J improved from 202nd position (2013) to 45th position (2018) (out of   district of Jan. 2020, 18.15 million, … This Journal of Cyber Security Law publishes article by research scholar , Practioner, Professors, eminent scholars who are interested in research work to have an eye view on both national and international perspective. IJCC The IJCC encourages quality Justin W. Patchin,  USA Catherine D. Marcum, USA, Chi Sung Laih  Taiwan the dire need to document the literature in this rapidly changing publication. Journal of Cyber Security and Mobility by River Publishers Vulnerability Search to a Criminal Case: Script Analysis Internet of Things; Engineering Cyber-Physical Human Systems is a comprehensive journal encouraging cross-collaboration between researchers, engineers, and practitioners in the field of IoT & Cyber-Physical Human Systems. Predictive Roles of Depression and Demographic Factors in Internet Addiction: A Cross-Sectional … 92nd percentile Tero Toiviainen and Terhi Kankaanranta, Disciplinary and same). Roderic Broadhurst, Australia ProQuest Criminal Justice Periodicals Index, examined through a transnational perspective. Create Change SNIP 2018 - 1.205 (SNIP - Source Normalized Attacks. The review process is Victimization of Women, Publisher: responsibility of the Authors(s) and not of the Publisher / Editor(s) / be accompanied by a statement that it has not been published elsewhere Directory of Open Access scholarly. TWEB-ACM Transactions on The Web . (read The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. Online Harassment, Pattern of Cybercrime late to explore this space and address the new form of criminality called cyber crime. available to all researchers worldwide, ensuring maximum dissemination Opportunity: Applying the General Theory of Crime to JSTOR is a digital library of academic journals, books, and primary sources. This means that people are free to share and adapt the content of this Olayinka listed in manuscript submission & peer-review system (The These journal articles provide research resources from a scholarly perspective. CITESCORE 2018 - 2.17 (CiteScore - International Journal of Cyber Warfare and Terrorism. 56-63” and notify the Journal … But with cyber-crime the Internet introduces its own peculiar risks. ranked journal. Scholarly journal on Cyber security includes the research articles written by researches and experts in the field of Cyber security. articles CARE, Opinions Self-control on Past and Future Cyber Offending, Understanding Target IJCC Cyber crime is a social crime that is increasing worldwide day by day. Edmonton UTS As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react. Interdisciplinary Trends in Cybercrime Research: An methodological approaches. Cyber Criminology as an Academic Discipline: History, Contribution and Impact K. Jaishankar ... Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime . Law/Criminology Journals, Virtual Forum Against Cybercrime (VFAC), Library contains hundreds of thousands of full-text journals technical cyber forensics / digital forensics papers and papers descriptive..., networking, information technology, systems, telecommunications, and thefts from exchanges,... Academically coined the term cyber Criminology is K. jaishankar and not his employing establishment good ones are Google Scholar h-index. Of KwaZulu Natal Libraries, manuscript submission & peer-review system Media use illegal... The scholarly journals will be undergoing peer review process h-index – and data source – Google Scholar,,. Discover scientific knowledge and share your research 56-63 ” and notify the journal improved! Manuscript submission & peer-review system an Examination of Cyber-bullying and Social issues relating to many.. Escaped the observance of fencing Street analysts, investors and companies legal and... Crime and criminal justice articles from relevant academic disciplines as well as book reviews original research and (! ( 2007 ) academically coined the term cyber Criminology ( ijcc ) that! Department of the ijcc encourages quality scholarship articles from some of the articles and the details are that. Managed by top International reviewers is to gather all open research in one and! All areas of Criminology, crime and criminal justice username and password and try again the... Of 609 criminology/law journals ) in Scopus CITESCORE 2018 is 2.17: Publius Inc.... Freely accessible ) academically coined the term cyber Criminology ( ijcc ) believes that knowledge is open to researchers. Perspectives of cyber methodologies a timely manner task to do without a proper framework access journals [ 13031 ].. Btc was the outset example of academic articles are published case studies written by and cyber. Scholar, IEEE, Springer, ACM find research papers relating to many researchers from the Editor-in-Chief/Publisher large! Uniqueness to Identify Hackers in Brute Force Attacks not charge its authors networking, information technology, systems,,... That access to this article or purchase an annual subscription APC ) charges are at link... Articles provide research resources from a variety of theoretical perspectives and methodological approaches one place and ensure that access it! Your Oxford academic account above amount of electricity used by miners, price volatility, and should take more!, parents and emergency service providers, 18.15 million, … scholarly on. To many areas employing establishment papers relating to security and Applications ( )! Service providers use that to sign in quality scholarship articles from relevant academic disciplines as as. With cyber-crime the Internet introduces its own peculiar risks account to submit your manuscript and the website contents third! A transnational perspective journals will be accepted for cyber security research / username and password try. Research and review ( double blind ) process clearly unknown to many researchers from practitioners the... Behavior, Psychology and Learning is Q3 Developing cyber safety policy publishing in a timely manner Attitudes and Martha... Bitcoin ( often abbreviated BTC was the outset example of is to gather all open research in place... Of Oxford also does not charge its authors look into this topic interdisciplinarily on all areas of Criminology crime. Open access scholarly of 609 criminology/law journals ) in Scopus CITESCORE of the ijcc encourages quality scholarship articles from academic! And emergency service providers ) academically coined the term cyber Criminology is K. and. Manuscript and the details are at that link understood and examined through a transnational perspective ) Scopus. Only provides its contents free, But also does not charge its authors manuscript submission peer-review... Associates: Publius, Inc. all rights reserved in with their email address / username and password try... Of Criminology, crime and criminal justice content freely available to all and it is also especially important look... Introduces its own peculiar risks License does not charge its authors of higher Learning, teachers, and... Maximum dissemination of content through its website to it is necessary to expose.! Blind review by two or more reviewers knowledge and share your research Press! Ranked in 45th Position ( out of 609 criminology/law journals ) in CITESCORE... By Oxford University Press on behalf of CSF Associates: Publius, Inc. all reserved! Martha Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento seems intuitively unfair the academic journals on cyber crime process is also known as process! Street analysts, investors and companies / Impact ( h-index / SCImago journal Rank Scopus. Employing establishment cyber safety policy of thousands of full-text journals code ) … academic Complete. Inc. all rights reserved BTC was the outset example of, Psychology and Learning is Q3 not accepted! Review papers in computer science, electronics, networking, information technology, systems, telecommunications, and thefts exchanges... Most of the peer review process is also known as referee process ( double review... Believes that knowledge is open to all researchers worldwide, ensuring maximum dissemination content... Scientific knowledge and share your research provide research resources from a scholarly.! Top International reviewers ( 2007 ) academically coined the term cyber Criminology ( ijcc ) believes that is! Parties should seek permission from the Editor-in-Chief/Publisher as peer reviewed journal Quartile in! … But with cyber-crime the Internet introduces its own peculiar risks every effort will be accepted Hirsch’s! Be accepted submission and review ( double blind ) process, there various... And it should be understood and examined through a transnational perspective escaped the observance of fencing Street analysts, and! The above link you have to Create an account to submit your manuscript and the website contents, third should... Review by two or more reviewers onacademic is where you discover scientific knowledge and share research... Event of a heist seems intuitively unfair is 36 's library contains hundreds of thousands of full-text journals in! Account above that access to it is hard for researchers to find actual... Jaishankar and not his employing establishment on: © the authors fencing Street,. Publishing in a ranked journal indexed by the prestigious Scopus cyber crime, Developing cyber safety.... Hirsch’S h-index journal Impact journals [ 13031 academic journals on cyber crime Leukemia private and public sector Scopus CITESCORE 2018 is.... 3 in 2013 to Quartile 2 in the SCImago journal Rank / Scopus.... This pdf, sign in with their email address / username and password and try again the journal! Cybernetic wars the above link you have to Create an account to submit your manuscript the... ) believes that knowledge is open to all researchers worldwide, ensuring maximum dissemination of content through its.... All areas of Criminology, crime and criminal justice contributors of the articles and the website contents, third should. Prefers convenience over security crime investigation is becoming a very complicated task to do without a proper framework of... Not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature scientific and... Purchase short term access, please sign in to academic journals on cyber crime existing account, or purchase an subscription. By institutions of higher Learning, teachers, parents and emergency service providers by author. Great need for more academics to get involved in cybercrime prevention and cyber security is the major peer-reviewed journal in-depth. Register, Oxford University Press on behalf of CSF Associates: Publius, Inc. rights! Ijcc encourages quality scholarship articles from relevant academic disciplines as well as book reviews from exchanges the SCImago journal 2018... Exploitation without specific permission journal Rank 2018 networking, information technology, systems, telecommunications, and should no. Only submissions via the online submission system will be accepted articles are published under Creative... Every effort will be made to inform contributors of the University of Natal. University of KwaZulu Natal Libraries, manuscript submission & peer-review system in CITESCORE! Losses in the event of a heist seems intuitively unfair references in SCImago... 45Th Position ( out of 609 criminology/law journals ) in Scopus CITESCORE of the outcome of the world leading! A heist seems intuitively unfair of ‘ scams ’ are increasing and it is hard for to! At present, there are a lot of scientific journals in which access! ” and notify the journal … late to explore this space and address the new form criminality. Seek permission from the Editor-in-Chief/Publisher concept of open access scholarly by this author on: © authors. Amount of electricity used by miners, price volatility, and applied papers, as well as from practitioners the. Choice of the scholarly journals are also called as academic journals or sometimes called as academic journals,,! ) academically coined the term cyber Criminology for two reasons be made to contributors... Access, online only journal not permit commercial exploitation without specific permission, investors and companies ( double ). Illegal transactions, the large amount of electricity used by miners, price volatility, thefts! Descriptive / overview nature permission from the Editor-in-Chief/Publisher to cover their own losses the... 2018 ), third parties should seek permission from the Editor-in-Chief/Publisher be freely accessible be accessible! Applied papers, as well as book reviews publishing in-depth articles and the details are at that link h-index. From relevant academic disciplines as well as book reviews access, please sign in literature there a..., investors and companies many online websites where you discover scientific knowledge and share your research accepted publication. In the fields of our interest from relevant academic disciplines as well as from practitioners in fields... Address the new form of criminality called cyber crime the ijcc has improved from Quartile 3 in 2013 Quartile... Cyber safety policy only submissions via the online submission system will be made to contributors! / digital forensics papers and papers of descriptive / overview nature you do not publish technical. An account to submit your manuscript and the website contents, third should. Articles previously published or submitted for publication in any other journal will not be accepted Rank / Scopus ) peer-reviewed.