<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 5, 2026 at 7:09 pm by All in One SEO v4.5.7.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://accp-cybercrime.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Accp</title>
		<link><![CDATA[https://accp-cybercrime.org]]></link>
		<description><![CDATA[Accp]]></description>
		<lastBuildDate><![CDATA[Tue, 17 Dec 2024 14:01:19 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://accp-cybercrime.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/mzukisi-njotini/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/mzukisi-njotini/]]></link>
			<title>Mzukisi Njotini</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 14:01:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/venansius-baryamureeba/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/venansius-baryamureeba/]]></link>
			<title>Venansius Baryamureeba</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:26:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 07 May 2024 11:58:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/copyrights/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/copyrights/]]></link>
			<title>Copyrights</title>
			<pubDate><![CDATA[Wed, 01 May 2024 09:42:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/]]></link>
			<title>Fellows</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 14:13:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/alana-maurushat/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/alana-maurushat/]]></link>
			<title>Alana Maurushat</title>
			<pubDate><![CDATA[Wed, 08 May 2024 10:14:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/muaath-s-al-mulla/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/muaath-s-al-mulla/]]></link>
			<title>MUAATH S. AL-MULLA</title>
			<pubDate><![CDATA[Wed, 01 May 2024 11:33:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/affiliates/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/affiliates/]]></link>
			<title>Affiliates</title>
			<pubDate><![CDATA[Tue, 07 May 2024 11:55:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/subhajit-basu/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/subhajit-basu/]]></link>
			<title>Subhajit Basu</title>
			<pubDate><![CDATA[Tue, 07 May 2024 11:08:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/dana-van-der-merwe/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/dana-van-der-merwe/]]></link>
			<title>Dana van der Merwe</title>
			<pubDate><![CDATA[Thu, 02 May 2024 14:54:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/useful-links/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/useful-links/]]></link>
			<title>Useful Links</title>
			<pubDate><![CDATA[Wed, 01 May 2024 09:45:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/mohamed-mekkawi/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/mohamed-mekkawi/]]></link>
			<title>Mohamed Mekkawi</title>
			<pubDate><![CDATA[Thu, 07 Nov 2024 12:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/mohammad-shadi-alhakeem/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/mohammad-shadi-alhakeem/]]></link>
			<title>Mohammad Shadi Alhakeem</title>
			<pubDate><![CDATA[Sun, 19 May 2024 12:38:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/artificial-intelligence/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/artificial-intelligence/]]></link>
			<title>Artificial Intelligence</title>
			<pubDate><![CDATA[Tue, 23 Apr 2024 13:55:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/advisory-board/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/advisory-board/]]></link>
			<title>Advisory Board</title>
			<pubDate><![CDATA[Tue, 15 Oct 2024 08:26:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/abubakari-yushawu/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/abubakari-yushawu/]]></link>
			<title>ABUBAKARI YUSHAWU</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 13:53:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/mohamed-eissa/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/mohamed-eissa/]]></link>
			<title>MOHAMED EISSA</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 13:50:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/sylvia-papadopoulos/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/sylvia-papadopoulos/]]></link>
			<title>SYLVIA PAPADOPOULOS</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 13:41:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/adamou-iro/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/adamou-iro/]]></link>
			<title>Adamou Iro</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 13:12:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/jason-jordaan/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/jason-jordaan/]]></link>
			<title>JASON JORDAAN</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 12:57:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/dr-maureen-o-mapp/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/dr-maureen-o-mapp/]]></link>
			<title>Dr. Maureen O. Mapp</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 12:22:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/ethirajan-rajan/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/ethirajan-rajan/]]></link>
			<title>ETHIRAJAN RAJAN</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 12:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/glenn-s-dardick/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/glenn-s-dardick/]]></link>
			<title>Glenn S. Dardick</title>
			<pubDate><![CDATA[Mon, 29 Apr 2024 12:04:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/media/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/media/]]></link>
			<title>Media</title>
			<pubDate><![CDATA[Sun, 21 Apr 2024 10:49:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/the-metaverse/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/the-metaverse/]]></link>
			<title>The Metaverse</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 13:42:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/wayne-wei-wang/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/wayne-wei-wang/]]></link>
			<title>Wayne Wei Wang</title>
			<pubDate><![CDATA[Mon, 28 Oct 2024 12:00:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/jurisdiction/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/jurisdiction/]]></link>
			<title>Jurisdiction</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 13:39:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/the-center-in-brief/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/the-center-in-brief/]]></link>
			<title>The Center in Brief</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 14:02:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/blockchain/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/blockchain/]]></link>
			<title>Blockchain</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 11:13:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/the-internet-of-things-iot/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/the-internet-of-things-iot/]]></link>
			<title>The Internet of Things (IOT)</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 11:09:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/privacy/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/privacy/]]></link>
			<title>Privacy</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 13:36:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/cybercrime/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/cybercrime/]]></link>
			<title>Cybercrime</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 10:56:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/get-involved/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/get-involved/]]></link>
			<title>Get Involved</title>
			<pubDate><![CDATA[Wed, 27 Mar 2024 13:37:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/]]></link>
			<title>Associates</title>
			<pubDate><![CDATA[Thu, 07 Nov 2024 12:34:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/online-security/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/online-security/]]></link>
			<title>Online Security</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 13:38:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/cloud-computing/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/cloud-computing/]]></link>
			<title>Cloud Computing</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 13:38:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/organisation/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/organisation/]]></link>
			<title>Organisation</title>
			<pubDate><![CDATA[Wed, 27 Mar 2024 13:56:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/associates/akalemwa-ngenda/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/associates/akalemwa-ngenda/]]></link>
			<title>Akalemwa Ngenda</title>
			<pubDate><![CDATA[Wed, 20 Mar 2024 10:44:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/david-wall/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/david-wall/]]></link>
			<title>David Wall</title>
			<pubDate><![CDATA[Wed, 20 Mar 2024 10:32:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/coordinators/sizwe-snail/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/coordinators/sizwe-snail/]]></link>
			<title>Sizwe Snail</title>
			<pubDate><![CDATA[Wed, 20 Mar 2024 10:30:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/jaishankar-karuppannan/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/jaishankar-karuppannan/]]></link>
			<title>Jaishankar Karuppannan</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:33:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/jonathan-clough/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/jonathan-clough/]]></link>
			<title>Jonathan Clough</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:31:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/jos-dumortier/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/jos-dumortier/]]></link>
			<title>Jos Dumortier</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:30:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/kim-kwang-raymond-choo-jp/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/kim-kwang-raymond-choo-jp/]]></link>
			<title>Kim-Kwang Raymond Choo JP</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/maureen-owor/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/maureen-owor/]]></link>
			<title>Maureen Owor</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:29:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/tana-pistorius/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/tana-pistorius/]]></link>
			<title>Tana Pistorius</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:27:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/fellows/thierry-piette-coudol/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/fellows/thierry-piette-coudol/]]></link>
			<title>Thierry Piette-Coudol</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 12:26:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/contact-us/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Sun, 07 Apr 2024 13:36:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/directors/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/directors/]]></link>
			<title>Directors</title>
			<pubDate><![CDATA[Sun, 07 Apr 2024 12:39:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://accp-cybercrime.org/research-areas/]]></guid>
			<link><![CDATA[https://accp-cybercrime.org/research-areas/]]></link>
			<title>Research areas</title>
			<pubDate><![CDATA[Mon, 15 Apr 2024 13:42:54 +0000]]></pubDate>
		</item>
				</channel>
</rss>
