Publisher: CCSE   (Total: 43 journals)   [Sort by number of followers]

Showing 1 - 43 of 43 Journals sorted alphabetically
Applied Physics Research     Open Access   (Followers: 9)
Asian Culture and History     Open Access   (Followers: 12)
Asian Social Science     Open Access   (Followers: 5)
Cancer and Clinical Oncology     Open Access   (Followers: 9)
Computer and Information Science     Open Access   (Followers: 15)
Earth Science Research     Open Access   (Followers: 8)
Energy and Environment Research     Open Access   (Followers: 14)
Engineering Management Research     Open Access   (Followers: 6)
English Language and Literature Studies     Open Access   (Followers: 18)
English Language Teaching     Open Access   (Followers: 32)
Environment and Natural Resources Research     Open Access   (Followers: 6)
Environment and Pollution     Open Access   (Followers: 10)
Global J. of Health Science     Open Access   (Followers: 6, SJR: 0.416, CiteScore: 1)
Higher Education Studies     Open Access   (Followers: 68)
Intl. Business Research     Open Access   (Followers: 6)
Intl. Education Studies     Open Access   (Followers: 7)
Intl. J. of Biology     Open Access   (Followers: 1)
Intl. J. of Business and Management     Open Access   (Followers: 15)
Intl. J. of Chemistry     Open Access   (Followers: 10)
Intl. J. of Economics and Finance     Open Access   (Followers: 13)
Intl. J. of English Linguistics     Open Access   (Followers: 11)
Intl. J. of Marketing Studies     Open Access   (Followers: 13)
Intl. J. of Psychological Studies     Open Access   (Followers: 4)
Intl. J. of Statistics and Probability     Open Access   (Followers: 3)
Intl. Law Research     Open Access   (Followers: 1)
J. of Agricultural Science     Open Access   (Followers: 5)
J. of Education and Learning     Open Access   (Followers: 2)
J. of Educational and Developmental Psychology     Open Access   (Followers: 15)
J. of Food Research     Open Access   (Followers: 3)
J. of Geography and Geology     Open Access   (Followers: 12)
J. of Management and Sustainability     Open Access   (Followers: 7)
J. of Materials Science Research     Open Access   (Followers: 9)
J. of Mathematics Research     Open Access  
J. of Molecular Biology Research     Open Access   (Followers: 4)
J. of Plant Studies     Open Access   (Followers: 1)
J. of Politics and Law     Open Access   (Followers: 9)
J. of Sustainable Development     Open Access   (Followers: 25)
Mechanical Engineering Research     Open Access   (Followers: 20)
Modern Applied Science     Open Access   (Followers: 1)
Network and Communication Technologies     Open Access   (Followers: 4)
Public Administration Research     Open Access   (Followers: 2)
Review of European Studies     Open Access   (Followers: 13)
Sustainable Agriculture Research     Open Access   (Followers: 3)
Similar Journals
Journal Cover
Journal of Politics and Law
Number of Followers: 9  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1913-9047 - ISSN (Online) 1913-9055
Published by CCSE Homepage  [43 journals]
  • Reviewer Acknowledgements for Journal of Politics and Law, Vol. 17, No. 2

    • Abstract: Reviewer acknowledgements for Journal of Politics and Law, Vol. 17, No. 2, 2024
      PubDate: Wed, 29 May 2024 08:45:42 +000
       
  • Criminalization Challenge and Analysis of Network Crime Assistance
           Behaviors

    • Abstract: The rapid development of the network society is in sync with the current era's pace. In comparison to traditional criminal methods, the utilization of the internet for criminal activities has progressively emerged and become increasingly prevalent. Nonetheless, this also poses a challenge in characterizing the offender's behavior. The objective of the study is to reveal the inadequacies in existing laws, policies and practices, and clarifying the harm of assisting in cybercrime and the plight of victims will help develop more effective support services and coping strategies, thereby improving the efficiency and quality of assistance to victims. This study focuses on the identification disputes that arise during the adjudication process of practical cases, combined with the existing legal provisions of the data for qualitative and quantitative analysis, and carries out a type study on the identification of helping behavior of cybercrime. Although China has specified the crime of assisting information network criminal activities in Article 287 bis of the Criminal Law, it remains controversial in distinguishing this offense from other crimes in actual cases. The study found that the techniques and means of cybercrime continue to evolve, from simple scams to sophisticated cyberattacks and data breaches, indicating that perpetrators are adapting to technological developments and changes in security measures. Consequently, it is crucial to clearly elucidate the connection between various recognition schemes from the theoretical perspective of norm violation and legal interest infringement, in order to provide an effective solution for the resolution of identification disputes in actual cases.
      PubDate: Wed, 29 May 2024 08:31:40 +000
       
  • Study on International Cooperation to Address Cross-border
           Telecommunication Network Fraud Offence

    • Abstract: In recent years, under the new technological environment of the international society, cross-border telecommunication network fraud crime cases are high, and various countries are faced with difficult problems of law enforcement cooperation, such as: less channels of information exchange, difficult investigation and evidence collection, low efficiency, more obstacles to investigation and arrest cooperation, slow speed and low effectiveness of recovering stolen goods. In order to achieve effective international governance of cross-border network crimes and strengthen cooperation between China and other countries, this study is based on the collection of cross-border telecommunication network fraud crimes of international cooperation cases and literature, combined with the current situation of cross-border international cooperation in China, proposed to effectively solve the problem of cross-border telecommunication network fraud international cooperation from the prevention and governance level. In order to achieve a higher level of international cooperation and governance between countries, and continuously reduce the occurrence of cross-border telecommunication network fraud cases.
      PubDate: Wed, 29 May 2024 08:25:52 +000
       
  • Practical Dilemmas Facing Criminal Legislation on Network Violence and
           Ideas for Responding to Them

    • Abstract: With the science and technology advance, cybercrime has become a serious threat to society. The lack of effective legal regulation has allowed cybercriminals to operate with impunity, posing a great challenge to law enforcement agencies. This paper intends to explore the challenges and gaps in the existing regulations on the premise of explaining the characteristics, classification of cybercrime, and put forward some suggestions and ideas on how to regulate the network violence by the main means of the criminal law. By examining the current legal framework for combating cybercrime, as well as the typical case, this paper will provide an in-depth analysis of the legal measures needed to effectively combat cybercrime. The findings of this research will contribute to the development of a comprehensive legal framework to address the growing menace of cybercrime.
      PubDate: Tue, 02 Apr 2024 00:59:36 +000
       
  • Research on Identification Standard and Judicial Determination of
           Destructive Procedure - Based on Technical Specifications and Legal
           Provisions

    • Abstract: With the rapid development of Internet technology, the identification of destructive procedures has a dilemma that the legislative purpose is inconsistent with the practice at the judicial level. The traditional identification is generally based on technical specifications, but the legal positioning of the procedure is often ignored in computer network crimes. In order to establish the identification standard of destructive procedures as soon as possible and reduce the judicial problems caused by the identification of procedures, this paper, based on the computer network crime, through the combination of technical specifications and legal provisions, through in-depth analysis of the computer technical parameters and typical cases of crimes of destructive procedures, expounds the technical level to follow the destructive procedure inspection operation specification, at the legal level to subjective malice and serious harm two aspects of the judgment method. The results of the study revealed that the double identification of destructive procedures through technical specifications and legal provisions is not only more practical than ever, but also saves judicial resources and improves litigation efficiency.
      PubDate: Tue, 02 Apr 2024 00:55:54 +000
       
  • Breaking the Risk of Conflict Trap: Way forward for Limiting Child
           Soldiers’ Phenomenon

    • Abstract: The recruitment and use of children in armed conflicts or child soldier phenomenon has inflicted much pain and suffering to thousands of children in many countries during recent decades. This article examines the pathway to protect children from predatory recruitment as well as the prevention of those who are already recruited from becoming trapped into further violence, generically termed as ‘conflict trap.” In pursuance, the current law shall be applied as an instrument of social engineering to bring about the desired change towards the protection of child soldiers alongside the use of art and science of persuasion in promoting the ideas. Therefore, to accomplish the above desired social change, this article proposes three objectives: firstly, to explain the law in plain terms and present it as a valuable instrument designed to protect children in armed conflict situations; secondly, to enumerate the serious psycho-social impact to the mental health of the child, and the ensuing disruption of the cognitive and affective development of the child, that are often irreversible; thirdly, to present reintegration program that has transformed former child soldiers into international figures like Ishmael Beah. It is premised that these three objectives, if implemented in society, would be successful strategies in imputing the desired social change, which is to rally support for the elimination of child soldiering, thus diminishing some incentives for conflict perpetuation. Therefore, these strategies would help to prevent the recruitment and use of children in armed conflicts and in the long term will aid in the breaking away from conflict trap. As child soldiers in previous conflicts will be ready to resume fighting, limiting the impact of conflict traps becomes imperative to preserve a conflict free society.
      PubDate: Thu, 07 Mar 2024 08:26:23 +000
       
  • Development Challenges in Egypt: Constraints, Practices, and Opportunities

    • Abstract: This paper analyzes the constraints, practices, and opportunities of Egypt’s development. Egypt experienced economic stagnation under the regime of President Hosni Mubarak which was exacerbated by the political situation that resulted from its end. Egypt’s economic efforts stalled and it was not until the end of the power struggle between the Muslim Brotherhood and the Egyptian Army, during the counterrevolutionary period, that political normalcy returned to the extent needed to focus on improvements of the domestic economic situation. This phase resulted in the election of President Abdel Fatah El-Sisi whose policies fought back against terrorism and initiated successful developmental efforts to address developmental constraints. These initiatives range from diplomatic efforts to solve the Nile River dispute between Egypt and Ethiopia, building roads and bridges, encouraging foreign investment, and increasing the supply of electricity. There is still a long way to go in terms of building various industries, increasing exports, lowering unemployment rates, and encouraging tourism as an important source of income and also a vital means of obtaining foreign currency. Successful development efforts in Egypt will allow for increased levels of self-sufficiency regarding agriculture and water as well as broader levels of prosperity across other sectors of production.
      PubDate: Fri, 01 Mar 2024 01:53:26 +000
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 100.28.2.72
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-
JournalTOCs
 
 

Publisher: CCSE   (Total: 43 journals)   [Sort by number of followers]

Showing 1 - 43 of 43 Journals sorted alphabetically
Applied Physics Research     Open Access   (Followers: 9)
Asian Culture and History     Open Access   (Followers: 12)
Asian Social Science     Open Access   (Followers: 5)
Cancer and Clinical Oncology     Open Access   (Followers: 9)
Computer and Information Science     Open Access   (Followers: 15)
Earth Science Research     Open Access   (Followers: 8)
Energy and Environment Research     Open Access   (Followers: 14)
Engineering Management Research     Open Access   (Followers: 6)
English Language and Literature Studies     Open Access   (Followers: 18)
English Language Teaching     Open Access   (Followers: 32)
Environment and Natural Resources Research     Open Access   (Followers: 6)
Environment and Pollution     Open Access   (Followers: 10)
Global J. of Health Science     Open Access   (Followers: 6, SJR: 0.416, CiteScore: 1)
Higher Education Studies     Open Access   (Followers: 68)
Intl. Business Research     Open Access   (Followers: 6)
Intl. Education Studies     Open Access   (Followers: 7)
Intl. J. of Biology     Open Access   (Followers: 1)
Intl. J. of Business and Management     Open Access   (Followers: 15)
Intl. J. of Chemistry     Open Access   (Followers: 10)
Intl. J. of Economics and Finance     Open Access   (Followers: 13)
Intl. J. of English Linguistics     Open Access   (Followers: 11)
Intl. J. of Marketing Studies     Open Access   (Followers: 13)
Intl. J. of Psychological Studies     Open Access   (Followers: 4)
Intl. J. of Statistics and Probability     Open Access   (Followers: 3)
Intl. Law Research     Open Access   (Followers: 1)
J. of Agricultural Science     Open Access   (Followers: 5)
J. of Education and Learning     Open Access   (Followers: 2)
J. of Educational and Developmental Psychology     Open Access   (Followers: 15)
J. of Food Research     Open Access   (Followers: 3)
J. of Geography and Geology     Open Access   (Followers: 12)
J. of Management and Sustainability     Open Access   (Followers: 7)
J. of Materials Science Research     Open Access   (Followers: 9)
J. of Mathematics Research     Open Access  
J. of Molecular Biology Research     Open Access   (Followers: 4)
J. of Plant Studies     Open Access   (Followers: 1)
J. of Politics and Law     Open Access   (Followers: 9)
J. of Sustainable Development     Open Access   (Followers: 25)
Mechanical Engineering Research     Open Access   (Followers: 20)
Modern Applied Science     Open Access   (Followers: 1)
Network and Communication Technologies     Open Access   (Followers: 4)
Public Administration Research     Open Access   (Followers: 2)
Review of European Studies     Open Access   (Followers: 13)
Sustainable Agriculture Research     Open Access   (Followers: 3)
Similar Journals
Similar Journals
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  All
HOME > Browse the 3359 Publishers covered by JournalTOCs 1 2 3 4 5 6 7 8  
PublisherTotal Journals
1 2 3 4 5 6 7 8  
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 100.28.2.72
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-