Global Journal of Information Security and Cyber Criminology [ISSN: 2581-7744 (online)] https://technology.eurekajournals.com/index.php/IJISCC <p style="text-align: justify;"><em>Global&nbsp;Journal of Information Security and Cyber Criminology</em>&nbsp;aims to provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on Information Security and Cyber Criminology. IJISCC aims to publish original, previously unpublished, research, survey and tutorial papers, plus case studies and short research notes, on both applied and theoretical aspects in Information Security and Cyber Criminology domain.</p> Eureka Journals en-US Global Journal of Information Security and Cyber Criminology [ISSN: 2581-7744 (online)] 2581-7744 Unethical Misconduct on Twitter: Publishing with Integrity as Toll for Bulliesvia Tweets https://technology.eurekajournals.com/index.php/IJISCC/article/view/806 <p>In recent years, Twitter has become a platform for widespread communication and interaction among individuals in various fields, including academia. However, there has been a rise in unethical behavior on Twitter, particularly in the form of bullying and harassment. This article explores the troubling trend of problematic publishing with suspicious integrity problem that bullies targeting famous academic journals, institutes or scientists through malicious tweets on X.com. The good example is “Publishing with Integrity”. The impact of this misconduct on the affected individuals and the academic community at large is discussed, as well as potential solutions to address and prevent such behavior in the future.</p> Pathum Sookaromdee Viroj Wiwanitkit 5 1 Cybercrime: Nature, Impact, and Prevention Measures https://technology.eurekajournals.com/index.php/IJISCC/article/view/807 <p>This research paper explores the various aspects of cybercrime and its impact on society. It provides a comprehensive understanding of cyber threats and the preventive measures individuals should be aware of. Additionally, the paper discusses the tools available for basic cyber check-ups and provides guidance on how to respond when falling victim to cybercrimes. Furthermore, the paper delves into the different techniques used for online deception, presenting 14 diverse forms of online frauds.</p> Rujittika Mungmunpuntipantip Viroj Wiwanitkkit 5 1 The Ethics of Online Commenting in Academic and Research Communities https://technology.eurekajournals.com/index.php/IJISCC/article/view/808 <p>This article explores the ethical considerations surrounding online commenting in academic and research communities. While it may be legal to post critical comments, it is important to consider the impact on others and the overall integrity of the field. This article emphasizes the importance of providing feedback in a respectful and professional manner, without resorting to personal attacks or anonymity. The article also highlights the significance of transparency and honesty in maintaining trust and credibility within the academic and research community.</p> Rujittika Mungmunpuntipantip Viroj Wiwanitkkit 5 1 Effective Strategies for Information Retrieval: Endnote application https://technology.eurekajournals.com/index.php/IJISCC/article/view/809 <p>This article explores three essential aspects of information retrieval, namely the process of searching for data, the importance of referencing bibliographies, and the practical application of Endnote 20 software. Each section provides comprehensive insights into the topic and aims to equip readers with the knowledge to enhance their information retrieval skills.</p> Rujittika Mungmunpuntipantip Viroj Wiwanitkit 5 1 An Inquiry into Cybersecurity Challenges in Jamaica https://technology.eurekajournals.com/index.php/IJISCC/article/view/810 <p class="paragraph" style="text-align: justify; line-height: 115%; vertical-align: baseline; margin: 0cm 0cm 10.0pt 0cm;"><span class="normaltextrun"><span lang="EN-US" style="color: #002060; background: white;">This research investigates the cybersecurity challenges faced by Jamaica amidst the country’s rapid digitalisation. As global cyber threats evolve, Jamaica’s critical sectors-finance, education, and small businesses-become increasingly vulnerable to sophisticated cyberattacks. The study examines cyberattacks' technical and psychological impacts, including the effects on public trust and economic stability. It also explores how local and global incidents, such as the WannaCry attack, have influenced the development of Jamaica’s cybersecurity infrastructure. The research identifies significant cybersecurity awareness, training, and defence mechanisms gaps by reviewing Jamaica's National Cyber Security Strategy and analysing current mitigation efforts. Particular attention is given to the need for public-private collaboration, targeted cybersecurity education for youth, and affordable solutions for small enterprises. </span></span><span lang="EN-US" style="color: #002060;">Phishing remains prevalent, with 67% of respondents reporting such incidents in the past year. Several users have encountered cybersecurity incidents, such as phishing, malware, and data breaches, in the past year (n=165 (39.2%). The overwhelming majority of respondent, 399 (94.8%,) stress the perceived need for enhanced security measures in a rapidly digitising culture and think that businesses should increase their cybersecurity spending as digital technology develops. <span class="normaltextrun"><span style="background: white;">The study concludes with recommendations for strengthening Jamaica’s cybersecurity posture, emphasising the importance of international cooperation and continued investment in technology and training to counter the growing risks.</span></span></span></p> Sheldon Shortridge Conroy Greaves Joevan Duhaney Willard Welch Shayne Gregory Clifton Foster Dennis Brooks Paul Andrew Bourne 5 1 Cybercrime and its Implications: A Comparative Study of Cybercrime Laws Worldwide https://technology.eurekajournals.com/index.php/IJISCC/article/view/811 <p>This paper aims to provide an in-depth understanding of the basic principles of criminology and focuses on cybercrime, its significance in our daily lives, and the repercussions it has on individuals and society. Additionally, it explores prominent examples of cybercrime in Thailand and other countries. The main focus is on cybercrime legislation and its effectiveness in combating this modern form of criminal activity. The paper also includes an overview of cybercrime laws in Thailand and compares them with international legal frameworks. The findings highlight the need for robust and comprehensive legislation to effectively address the complexities of cybercrime in the digital age.</p> Pathum Sookaromdee Viroj Wiwanitkit 5 1 An Inquiry into Cybersecurity Knowledge Levels among High School Students in Central Jamaica: A Case Study https://technology.eurekajournals.com/index.php/IJISCC/article/view/820 <p><strong>Introduction</strong>: Cybersecurity protects computers, mobile devices, servers, electronic systems, networks, and data from malicious attacks. In the 1970s, researcher Bob Thomas initiated cybersecurity monitoring by creating Creeper, which is capable of traversing the Advanced Research Projects Agency Network (ARPANET.</p> <p><strong>Objectives</strong> are Identifying gaps in cybersecurity awareness and knowledge among secondary school students, assessing how inadequate knowledge impacts students' online safety, and evaluating the specific challenges experienced by secondary school students in Central Jamaica.</p> <p><strong>Method</strong>: The study employed a descriptive cross-sectional survey research design. This design allows for an overarching plan that logically and cogently combines the many study components to ensure the research topic is answered successfully. This research’s target population was a group of eleventh, twelfth, and thirteenth graders from a non-traditional secondary school in Central Jamaica. The secondary school has 2,500 students and about 127 staffmembers.</p> <p><strong>Findings</strong>: One-half of the respondents are familiar with cybersecurity best practices. Accordingly, this group could have a stronger foundation in securing online or system-related activities. The other half needs to familiarise themselves with cybersecurity best practices, highlighting a significant gap in awareness. This lack of knowledge may increase their vulnerability to cyber threats since they may need to employ critical security measures like strong passwords, regular software updates, or data encryption.</p> <p><strong>Conclusion</strong>: Overall, this study underscores the importance of bridging the gap between knowledge and action in cybersecurity education, particularly in the school environment. By enhancing cybersecurity awareness and ensuring practical application, students can be better protected against the increasing threats in the digital world. Schools must develop targeted training programs to increase students' knowledge and ensure they apply these practices to protect themselves and the school's digital infrastructure.</p> Michael Dixon Paul Andrew Bourne PhD, Dr. PH Zandy U. Elliott, PhD, DHSc 2024-10-16 2024-10-16 5 1