Cyber Crime Detection and Protection: Third World Still to Cope-Up

Author(s):  
Virginiah Sekgwathe ◽  
Mohammad Talib
2018 ◽  
Vol 7 (3.19) ◽  
pp. 39 ◽  
Author(s):  
Moses Adah Agana ◽  
Ruth Wario

This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals. 


2021 ◽  
pp. 126-141
Author(s):  
Eva Ignatuschtschenko

This chapter discusses a harm concept that enables a more comprehensive assessment of the consequences of cyber crime. Even though harm resulting from cyber crime is not fundamentally different from harm that is caused by other forms of crime or crime in general, the reach, scope, and volume of crime facilitated by information and communications technology have transformed risks posed to individuals, organizations, and nations, and challenge conventional approaches of crime detection and prevention. Assessments of the impact of cyber crime have been focusing on estimating the cost in monetary value. However, most significant harm might not be experienced as a loss of money, but as a disruption or destabilization of systems that are built on trust. This article advocates for a human-centric approach to cyber security, which emphasizes harm mitigation strategies.


2020 ◽  
Vol 2 (4) ◽  
Author(s):  
Ibrahim Goni ◽  
Murtala Mohammad

The mobile Cyber Crime detection is challenged by number of mobile devices (internet of things), large and complex data, the size, the velocity, the nature and the complexity of the data and devices has become so high that data mining techniques are no more efficient since they cannot handle Big Data and internet of things. The aim of this research work was to develop a mobile forensics framework for cybercrime detection using machine learning approach. It started when call was detected and this detection is made by machine learning algorithm furthermore intelligent mass media towers and satellite that was proposed in this work has the ability to classified calls whether is a threat or not and send signal directly to Nigerian communication commission (NCC) forensic lab for necessary action. 


2019 ◽  
Vol 6 (3) ◽  
Author(s):  
Bambang Tri Bawono

Technological progress and the presence of globalization in third world countries including Indonesia has a variety of consequences, this includes the negative impact of increasing cybercrime in Indonesia. Increasing cybercrime in the community with a variety of increasingly sophisticated modus operandi, in reality, is not balanced by the existence of a comprehensive legal umbrella, and also the absence of adequate facilities and pre-facilities is a separate issue in the enforcement of cybercrime cases in a dynamic society. Enforcement weaknesses are the lack of human resources of investigators who understand cybercrime and the lack of means and pre-law enforcement facilities in cybercrime. so it is necessary to increase the HR of the relevant law enforcers as well as the improvement of facilities and pre-facilities related to law enforcement in cybercrime. Enforcement weaknesses are the lack of human resources of investigators who understand cybercrime and the lack of means and pre-law enforcement facilities in cybercrime. So it is necessary to increase the HR of the relevant law enforcers as well as the improvement of facilities and facilities related to law enforcement in cybercrime.


Sign in / Sign up

Export Citation Format

Share Document