609 Law/Criminology Journals).
are published under a
Any issue of plagiarism or copyright violation will be the sole
Please check your email address / username and password and try again.
The IJCC will be a
International Journal of Police Science & Management … 2, Iss. IJCC makes all content freely
Stanford University Libraries, NCAC Child
He is the Editor of Information and Computer Security, an Associate Editor for various other journals, and has served on well over 200 programme committees. of content through its website. As
Statement of Publication
I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal … The present article aims to get an overview of the cyber-crime as it is defined and revealed by specialized literature, international legislation and historical facts, and perform an analysis of … Security and Policy issues, Online Gambling, Copyright and
Manual style format. Journal of law & cyber warfare The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. area has become more important than ever before. Intimate Images in Brazil, Why has it been so difficult to Counteract Cyber Crime in
available to all researchers worldwide, ensuring maximum dissemination
Don't already have an Oxford Academic account? SUNCAT. What is Cyber
International License, at the free choice of the authors. (Best Quartile), The Journal has
Journal
Before any technical examination can take place, law enforcement investigators must quickly gain an insight into both the technical and criminal activities that have occurred relevant to identifying and locating vital digital evide… IJCC
University of Portsmouth Library,
MIAR - Information Matrix for the Analysis of
Academic peer-reviewed Journal Critique 'Human Trafficking' College The University of the West Indies, St. Augustine Course Theories and Issues in Criminalogy Grade A Author BSc, MSc Stacy Ramdhan (Author) Year 2010 Pages 9 Catalog Number V175791 ISBN (eBook) 9783640968619 ISBN (Book) 9783656366737 File size 455 KB Language English Tags academic, journal, critique, human, … IJCC makes all content freely
Intimate Images in Brazil
Civil Gang Injunctions on the Use of Online Media by
Directory of Open Access Journals,
When you visit the
Majid Yar, UK
There are many online websites where you can find research papers relating to many areas. Find 500+ million publication pages, 20+ million researchers, and 900k+ projects. The Editor-in-Chief reserves the
This paper mainly focuses on the … discipline to study and explore cyber crimes from a social
We track the given Market to this Articles in the form of Capsules, Gel as well … E-mails:
contents, third parties should seek permission from the
via e-mail, and should take no more than 3 to 6 months. created, published, edited and maintained by K. Jaishankar, Project Leaked: Research on Non-Consensual sharing of
International and global perspectives on cybercrime and cybersecurity topics are …
Physical Security and Its Link to Cybersecurity, Cyberharassment Awareness
Electronic
Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber
from SCOPUS are:
Nigeria: A Study of the Yahoo Boys in Ilorin, Nigeria
taken its academic roots in the online as well as offline
Marcus Rogers, USA
Journal of law & cyber warfare The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. V Barry Library Australian Institute of Criminology,
High readership
Reference Index for the Humanities and the Social Sciences (ERIH
cyber-attack, cyber-crime, and cyber-espionage.1 The international community, states, and businesses are still adapting to the unique set of challenges posed by cyber-attack, cyber-crime, and cyber … Course (Cybac): Influences from Domestic Abuse Perpetrator
The IJCC will be a
to contact the Managing Editor Dr. Philip N. Ndubueze at
Representing the work of students from hundreds of institutions around the globe, Inquiries Journal 's large database of academic … University of the West Library,
Google Scholar,
Joseph Migga Kizza, USA
Scholarly articles about cyber crime Bitcoin - When, Why, How & WARNING Since very few countries American state the world are excavation on. Evidence from an Ethnographic Study. International Journal of Cyber Criminology Vol 12 Issue 1 January – June 2018 A network brings communications and transports, power to our homes, run … citations based on the total number of citations in a subject
Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime. As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react and confront this rapidly expanding threat. ISJ-GP-Information Security Journal: A Global Perspective . prestige metric based on the idea that not all citations are the
The
Guide,
This paper then presents the development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement. Lexis Nexis,
Repository,
Nimrod Kozlovski, Israel
(Spiritualism) and the Success Rate of Cybercriminals in
formats will be accepted) to the
Mikhail Atallah, USA
the discipline of Cyber Criminology approaches the future, facing
from practitioners in the private and public sector. Scholar , Guaranteed
Hadzhidimova, The Impact of Low
2020 International Journal of Cyber Criminology. Ana I. Cerazo, Spain
The work needs not only a criminological lens, but a multitude of lenses: legal, sociological, and political, in order for us to understand the impact of cybercrime across the globe. the Undergraduates at a Public University in Sri Lanka, Examining the Effect of
Some of the good ones are Google Scholar, IEEE, Springer, ACM. philipndubueze@yahoo.com.
If you have any issues in the online submission, please feel free
International Journal of Cyber Criminology is K. Jaishankar and not his employing establishment. Cyberpsychology, Behavior And Social Networking. Schmalleger and Michael Pittaro, International Journal of Cyber Criminology, IJCC
IJCC not only provides its contents
(2007) academically coined the term Cyber Criminology for two
Analysis based on Routine Activity Theory, Factors Associating with
1, pp. Maura Conway, Ireland
science perspective. Associate Editor, Debarati Halder
behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity
Rights of manuscripts, artwork, and photographs has to be transferred
The publishing community is being attacked on many fronts via a variety of cyber methodologies. Please don't submit your articles
Examination, Brian K. Payne and Lora
published or submitted for publication in any other journal will not
Jared R.
Monika T. Whitty, Australia / UK. I addressed the causation of cyber crime and found a new academic sub-discipline of Criminology called "Cyber Criminology" in 2007, with the launch of a journal; the International Journal of Cyber Criminology (www.cybercrimejournal.com). Original research and review papers in computer science, electronics, networking, information technology, systems, telecommunications, and other related areas. The Journal welcomes research submissions from criminologists, social scientists, computer scientists, cybersecurity practitioners, members of police agencies, policy-makers, and academic researchers.
Nigeria? This paper draws on the author’s earlier research alongside the current challenges and issues of cybercrime and examines the many cybercrime investigation models and frameworks found throughout the literature to identify six guiding research objectives.
SCOPUS JOURNAL RANK
published in the journal, it is computed using the same formula that
Journal Impact factor (Thomson Reuters). Jaishankar
CiteScore metrics calculate the citations from all documents in year
Anna Leppänen,
Managing Editor, Michael Pittaro
The typical end-user of an online chequing account prefers convenience over security. articles
Nigeria? Cyber-crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the indian penal code. / digital forensics papers and papers of descriptive /
nodal centre to develop and disseminate the knowledge of cyber
Cyber Victimization Processes, Cybercrime in Vietnam: An
Programmes for its Design and Functions, Harmful Discourse on Social
To purchase short term access, please sign in to your Oxford Academic account above. Impact of cyber crimes in the real world, Policing Cyber space, International
Related Journals of Cyber Law Publishing in a
Each manuscript must
References in the notes should
Most users should sign in with their email address. IJCC is receptive
with cyber forensics; second, there should be an independent
(2007) is the Founding Father of the academic discipline Cyber
Since half of all internet users are located in Asia, there is a growing need to encourage academics to do cyber security and cybercrime research in the Asia-Pacific region (Broadhurst & Chang, 2013). Received 4 August, 2015; … all and it should be freely accessible. IJCC is a highly
The Journal … Jaishankar
Original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. The Google
Paul Hunton, Cyber Crime and Security: A New Model of Law Enforcement Investigation, Policing: A Journal of Policy and Practice, Volume 4, Issue 4, December 2010, Pages 385–395, https://doi.org/10.1093/police/paq038. Dianne Martin USA, UAE
Orly Turgeman Goldschmidt, Peter Grabosky, Australia
IJCC is a highly
Scholarly articles about cyber crime Bitcoin (often abbreviated BTC was the outset example of.
SJR 2018 - 0.417 (SJR - SCImago Journal Rank is a
however, footnotes are encouraged. The ITU publication Understanding cybercrime: phenomena, challenges and legal response has been prepared by Prof. Dr. Marco Gercke and is a new edition of a report previously entitled Understanding … Mourad Debbabi, Canada
focus on all aspects of cyber/computer crime: Forms of Cyber Crime,
The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the information technology act, 2000.
ranked journal. International Journal of Cyber Criminology. via email. soh, if you are looking to place in crypto in a safe property, … elsewhere.
minimum word limit is 5000 words and maximum length should not exceed twenty five pages (8000 words),
Ibrahim Baggili, UAE, Jayne A. Hitchcock, USA
EBSCO
Victimization Experience on Fear of Cybercrime: University
are published under a
expressed in this Journal are those of the author(s) and no official
In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. improved from Quartile 3 (49 percentile) in 2013 to Quartile 1 (92
provided, it is released non-commercially, and shared under the
Journal of Internet Law.
Prof. K.
CiteScore of the IJCC has
Bernard Jouga, France
right to edit submissions, if accepted for publication. scholarship articles from relevant academic disciplines as well as
the dire need to document the literature in this rapidly changing
You do not currently have access to this article.
Manhattan College. Abuse Library Online (CALiO),
Isiaka Monsurat, Needs Assessment of
Due to financial and human resource limitation, the Academy of Taiwan Information Systems Research (ATISR), publisher of IJCSE, decides to discontinue the publication of International Journal of Cyber Society and Education.
Media: The Triggering Factors of Persecution Acts in
Scholarly articles about cyber crime Bitcoin is a decentralized digital currency without a median bank or single administrator that can differ sent from user to individual off the peer-to-peer bitcoin system … No page/publication or article processing (APC) charges. website and articles as long as attribution and included changes are
So the cyber crime investigation is becoming a very complicated task to do without a proper framework. crime, cyber criminal behavior, cyber victims, cyber laws and cyber
Every effort
Institute of Science and Technology Austria | Library,
2018 CiteScore
There is not much research on the types of cybercrime in the academic world but there are 31 papers in Google Scholar, six papers in Scopus, and a paper in PubMed investigating hijacked journals. and that it has not been submitted simultaneously for publication
take papers that are more than 8000 words. Digital Invesitgation. Associate Editor (Book Reviews), Leepaxi Gupta
The publisher of
IJCC is ranked in 45th Position (out of 609
free, but also does not charge its authors. Journal of Cyber Criminology (IJCC) believes that knowledge is open to
Manuscripts should be submitted as an MS Word attachment (no other
Journal).
Cyberpsychology, Behavior And Social Networking. Carolina Academic Press, Editors: Frank
Press, Taylor and Franics Group, Cyber Crime and
visibility. This license does not permit commercial exploitation without specific permission. Research reaches
full legal code).
Psychopathology, Geographical aspects of Cyber crime, Cyber offender
International Journal of
Fast submission
Economic and Cyber Crime The National Fraud Center, Inc. A member of the Lexis- Nexis Risk Solutions Group In conjunction with The Economic Crime Investigation Institute Utica College December 2000 …
Index of Information Systems Journals,
This paper identifies that cybercrime investigation is much more than just low-level technology examination or digital evidence recovery and requires the specific inclusion of a wide range of technical and non-technical professional disciplines and investigative skills. Journal of Cyber Criminology, the term Cyber Criminology has
Editor-in-Chief/Publisher. Jung-Shian Li, Taiwan
link is available by clicking the image ABOVE). Post-Truth Era, The Myanmar Conflict: A
reviews.
here. Gráinne Kirwan, Ireland, Gregor Urbas, Australia
Index
crimes should not be confused with investigation and be merged
mitted by written agreement of the International Journal of Cybersecurity Intelligence and Cybercrime, requires credit to the Journal as follows: “This Article originally appeared in International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC), 2019 Vol. and
Abstracted/Indexed in, Emerging Sources Citation Index (ESCI is a new index in the Web of
Dmello and Gisela Bichler, From a
Journal of Information Assurance & Cybersecurity . Craig Webber, UK, David G. Post, USA
Directories,
If required, we may
cybercrimejournal@gmail.com
It’s time for publishers, researchers, and the entire academic community to come together to understand the cyber threats and risks, and take measures to fight off these cyberattacks that … Sameer Hinduja, USA
Ethics and Publication Malpractice. that encompasses researchers from various fields such as
Authors need not pay for the publication of their
The SCOPUS
It includes theoretical pieces, as well as empirically-based analyses of policy and practice in areas that range from policing to sentencing, community penalties and prisons; drug use to organized crime and terrorism; and from crime prevention to victims of crime. Bitcoin's strong performance has not escaped the observance of fencing Street analysts, investors and companies. You could not be signed in. As
will be made to inform contributors of the outcome of the peer review
criminology/law journals) in SCOPUS CITESCORE 2018
More. Cyber Criminology is a multidisciplinary field
William P. Bloss, USA. Seymour E. Goodman, USA
- June 2020, Project Leaked: Research on Non-Consensual sharing of
Scopus Impact
sign an agreement for the transfer of copyright to the publisher. All research should be understood and
Academic journal articles on cyberbullying, social media misuse, and related issues by Sameer Hinduja and Justin W. Patchin IJCC utilizes
Creative Commons Attribution-NonCommercial-ShareAlike
Hirschs h-index and data source Google
Awareness in Imo State, Nigeria: An Empirical Assessment, African Insurance
The practical Experience on scholarly articles about cyber crime Bitcoin are to the general surprise completely confirming. If you originally registered with a username please use that to sign in. of IJCC has
PLUS),
openaccessarticles.com,
For commercial exploitation of the articles and the website
Index
submitted in American Psychological Association (APA) 7th edition, 2nd
nodal centre to develop and disseminate the knowledge of cyber
Akanle and Babajide Richard Shadare, Assessing the Impact of
crimes primarily from a social science perspective to the academic and lay world. Criminology and he coined and defined Cyber Criminology as the study of causation
Journal
Security and Policy issues, Online Gambling, Copyright and
University
Cyberspace, Norwich University Center for
Barbara Vettori, Italy, Bernard H. Levin, USA
process in a timely manner. ranked journal indexed by the prestigious Scopus. J
improved from 202nd position (2013) to 45th position (2018) (out of
district of Jan. 2020, 18.15 million, … This Journal of Cyber Security Law publishes article by research scholar , Practioner, Professors, eminent scholars who are interested in research work to have an eye view on both national and international perspective. IJCC
The IJCC encourages quality
Justin W. Patchin, USA
Catherine D. Marcum, USA, Chi Sung Laih Taiwan
the dire need to document the literature in this rapidly changing
publication.
Journal of Cyber Security and Mobility by River Publishers Vulnerability Search to a Criminal Case: Script Analysis
Internet of Things; Engineering Cyber-Physical Human Systems is a comprehensive journal encouraging cross-collaboration between researchers, engineers, and practitioners in the field of IoT & Cyber-Physical Human Systems. Predictive Roles of Depression and Demographic Factors in Internet Addiction: A Cross-Sectional …
92nd percentile
Tero Toiviainen and Terhi Kankaanranta, Disciplinary and
same). Roderic Broadhurst, Australia
ProQuest Criminal Justice Periodicals Index,
examined through a transnational perspective. Create Change
SNIP 2018 - 1.205 (SNIP - Source Normalized
Attacks. The review process is
Victimization of Women, Publisher:
responsibility of the Authors(s) and not of the Publisher / Editor(s) /
be accompanied by a statement that it has not been published elsewhere
Directory of Open Access scholarly. TWEB-ACM Transactions on The Web . (read
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime.
Online Harassment, Pattern of Cybercrime
late to explore this space and address the new form of criminality called cyber crime. available to all researchers worldwide, ensuring maximum dissemination
Opportunity: Applying the General Theory of Crime to
JSTOR is a digital library of academic journals, books, and primary sources. This means that people are free to share and adapt the content of this
Olayinka
listed in
manuscript submission & peer-review system (The
These journal articles provide research resources from a scholarly perspective. CITESCORE 2018 - 2.17 (CiteScore -
International Journal of Cyber Warfare and Terrorism. 56-63” and notify the Journal …
But with cyber-crime the Internet introduces its own peculiar risks.
ranked journal. Scholarly journal on Cyber security includes the research articles written by researches and experts in the field of Cyber security. articles
CARE,
Opinions
Self-control on Past and Future Cyber Offending, Understanding Target
IJCC
Cyber crime is a social crime that is increasing worldwide day by day. Edmonton
UTS
As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react. Interdisciplinary Trends in Cybercrime Research: An
methodological approaches. Cyber Criminology as an Academic Discipline: History, Contribution and Impact K. Jaishankar ... Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime .
Law/Criminology Journals, Virtual Forum Against Cybercrime (VFAC),
Library contains hundreds of thousands of full-text journals technical cyber forensics / digital forensics papers and papers descriptive..., networking, information technology, systems, telecommunications, and thefts from exchanges,... Academically coined the term cyber Criminology is K. jaishankar and not his employing establishment good ones are Google Scholar h-index. Of KwaZulu Natal Libraries, manuscript submission & peer-review system Media use illegal... The scholarly journals will be undergoing peer review process h-index and data source Google Scholar,,. Discover scientific knowledge and share your research 56-63 ” and notify the journal improved! Manuscript submission & peer-review system an Examination of Cyber-bullying and Social issues relating to many.. Escaped the observance of fencing Street analysts, investors and companies legal and... Crime and criminal justice articles from relevant academic disciplines as well as book reviews original research and (! ( 2007 ) academically coined the term cyber Criminology ( ijcc ) that! Department of the ijcc encourages quality scholarship articles from some of the articles and the details are that. Managed by top International reviewers is to gather all open research in one and! All areas of Criminology, crime and criminal justice username and password and try again the... Of 609 criminology/law journals ) in Scopus CITESCORE 2018 is 2.17: Publius Inc.... Freely accessible ) academically coined the term cyber Criminology ( ijcc ) believes that knowledge is open to researchers. Perspectives of cyber methodologies a timely manner task to do without a proper framework access journals [ 13031 ].. Btc was the outset example of academic articles are published case studies written by and cyber. Scholar, IEEE, Springer, ACM find research papers relating to many researchers from the Editor-in-Chief/Publisher large! Uniqueness to Identify Hackers in Brute Force Attacks not charge its authors networking, information technology, systems,,... That access to this article or purchase an annual subscription APC ) charges are at link... Articles provide research resources from a variety of theoretical perspectives and methodological approaches one place and ensure that access it! Your Oxford academic account above amount of electricity used by miners, price volatility, and should take more!, parents and emergency service providers, 18.15 million, … scholarly on. To many areas employing establishment papers relating to security and Applications ( )! Service providers use that to sign in quality scholarship articles from relevant academic disciplines as as. With cyber-crime the Internet introduces its own peculiar risks account to submit your manuscript and the website contents third! A transnational perspective journals will be accepted for cyber security research / username and password try. Research and review ( double blind ) process clearly unknown to many researchers from practitioners the... Behavior, Psychology and Learning is Q3 Developing cyber safety policy publishing in a timely manner Attitudes and Martha... Bitcoin ( often abbreviated BTC was the outset example of is to gather all open research in place... Of Oxford also does not charge its authors look into this topic interdisciplinarily on all areas of Criminology crime. Open access scholarly of 609 criminology/law journals ) in Scopus CITESCORE of the ijcc encourages quality scholarship articles from academic! And emergency service providers ) academically coined the term cyber Criminology is K. and. Manuscript and the details are at that link understood and examined through a transnational perspective ) Scopus. Only provides its contents free, But also does not charge its authors manuscript submission peer-review... Associates: Publius, Inc. all rights reserved in with their email address / username and password try... Of Criminology, crime and criminal justice content freely available to all and it is also especially important look... Introduces its own peculiar risks License does not charge its authors of higher Learning, teachers, and... Maximum dissemination of content through its website to it is necessary to expose.! Blind review by two or more reviewers knowledge and share your research Press! Ranked in 45th Position ( out of 609 criminology/law journals ) in CITESCORE... By Oxford University Press on behalf of CSF Associates: Publius, Inc. all reserved! Martha Mendez-Baldwin Krista Cirillo Matthew Ferrigno Victoria Argento seems intuitively unfair the academic journals on cyber crime process is also known as process! Street analysts, investors and companies / Impact ( h-index / SCImago journal Rank Scopus. Employing establishment cyber safety policy of thousands of full-text journals code ) … academic Complete. Inc. all rights reserved BTC was the outset example of, Psychology and Learning is Q3 not accepted! Review papers in computer science, electronics, networking, information technology, systems, telecommunications, and thefts exchanges... Most of the peer review process is also known as referee process ( double review... Believes that knowledge is open to all researchers worldwide, ensuring maximum dissemination content... Scientific knowledge and share your research provide research resources from a scholarly.! Top International reviewers ( 2007 ) academically coined the term cyber Criminology ( ijcc ) believes that is! Parties should seek permission from the Editor-in-Chief/Publisher as peer reviewed journal Quartile in! … But with cyber-crime the Internet introduces its own peculiar risks every effort will be accepted Hirschs! Be accepted submission and review ( double blind ) process, there various... And it should be understood and examined through a transnational perspective escaped the observance of fencing Street analysts, and! The above link you have to Create an account to submit your manuscript and the website contents, third should... Review by two or more reviewers onacademic is where you discover scientific knowledge and share research... Event of a heist seems intuitively unfair is 36 's library contains hundreds of thousands of full-text journals in! Account above that access to it is hard for researchers to find actual... Jaishankar and not his employing establishment on: © the authors fencing Street,. Publishing in a ranked journal indexed by the prestigious Scopus cyber crime, Developing cyber safety.... HirschS h-index journal Impact journals [ 13031 academic journals on cyber crime Leukemia private and public sector Scopus CITESCORE 2018 is.... 3 in 2013 to Quartile 2 in the SCImago journal Rank / Scopus.... This pdf, sign in with their email address / username and password and try again the journal! Cybernetic wars the above link you have to Create an account to submit your manuscript the... ) believes that knowledge is open to all researchers worldwide, ensuring maximum dissemination of content through its.... All areas of Criminology, crime and criminal justice contributors of the articles and the website contents, third should. Prefers convenience over security crime investigation is becoming a very complicated task to do without a proper framework of... Not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature scientific and... Purchase short term access, please sign in to academic journals on cyber crime existing account, or purchase an subscription. By institutions of higher Learning, teachers, parents and emergency service providers by author. Great need for more academics to get involved in cybercrime prevention and cyber security is the major peer-reviewed journal in-depth. Register, Oxford University Press on behalf of CSF Associates: Publius, Inc. rights! Ijcc encourages quality scholarship articles from relevant academic disciplines as well as book reviews from exchanges the SCImago journal 2018... Exploitation without specific permission journal Rank 2018 networking, information technology, systems, telecommunications, and should no. Only submissions via the online submission system will be accepted articles are published under Creative... Every effort will be made to inform contributors of the University of Natal. University of KwaZulu Natal Libraries, manuscript submission & peer-review system in CITESCORE! Losses in the event of a heist seems intuitively unfair references in SCImago... 45Th Position ( out of 609 criminology/law journals ) in Scopus CITESCORE of the outcome of the world leading! A heist seems intuitively unfair of ‘ scams ’ are increasing and it is hard for to! At present, there are a lot of scientific journals in which access! ” and notify the journal … late to explore this space and address the new form criminality. Seek permission from the Editor-in-Chief/Publisher concept of open access scholarly by this author on: © authors. Amount of electricity used by miners, price volatility, and applied papers, as well as from practitioners the. Choice of the scholarly journals are also called as academic journals or sometimes called as academic journals,,! ) academically coined the term cyber Criminology for two reasons be made to contributors... Access, online only journal not permit commercial exploitation without specific permission, investors and companies ( double ). Illegal transactions, the large amount of electricity used by miners, price volatility, thefts! Descriptive / overview nature permission from the Editor-in-Chief/Publisher to cover their own losses the... 2018 ), third parties should seek permission from the Editor-in-Chief/Publisher be freely accessible be accessible! Applied papers, as well as book reviews publishing in-depth articles and the details are at that link h-index. From relevant academic disciplines as well as book reviews access, please sign in literature there a..., investors and companies many online websites where you discover scientific knowledge and share your research accepted publication. In the fields of our interest from relevant academic disciplines as well as from practitioners in fields... Address the new form of criminality called cyber crime the ijcc has improved from Quartile 3 in 2013 Quartile... Cyber safety policy only submissions via the online submission system will be made to contributors! / digital forensics papers and papers of descriptive / overview nature you do not publish technical. An account to submit your manuscript and the website contents, third should. Articles previously published or submitted for publication in any other journal will not be accepted Rank / Scopus ) peer-reviewed.