scholarly journals A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security

Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 289-295
Author(s):  
Mohammed I. Alghamdi

The cyber-security development for future generations is at stake as a global concern. The existing strategic and policy structures on cyber security and awareness-raising at many levels needs more investigation in order to formulate workable and efficient strategic vision that addresses actual needs and challenges. The justification for this work is therefore to test the robustness, in contrast with some of the most technologically advanced countries on the Asian Continent and others like the USA, Japan, of Saudi Arabia's current cyber security strategy in order to keep the NCSS up-to-date. This research aimed to develop a strategic vision to combat cybercrime to enhance cyber security. The research results confirmed the approval of the members of the study community to a medium degree on the reality of digital extremism and cyber terrorism as seen by the researcher. Moreover, the approval of the members of the study community was to a high degree on the role of combating cybercrime in promoting human security as seen by the researcher. The members of the study community agreed with a high degree on the obstacles identified by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia. There was a high approval of the study community members on the strategic vision developed by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia.

2021 ◽  
Vol 12 (3) ◽  
pp. 111-128
Author(s):  
Aljohara Fahad Al Saud

Identifying language affiliation among children for family immigrants is crucial for one’s language identity. This study aimed to determine the role played by Arab families in the Kingdom of Saudi Arabia, Austria, and Britain to attain language affiliation among their children. It also aims to identify the challenges facing families living in these countries in achieving language affiliation among their children. The study population consisted of all the families that live in the Kingdom of Saudi Arabia, in addition to all the Arab families that live in Austria and Britain and the study sample included (120) parents. The researcher adopted the descriptive-analytical approach and used the questionnaire as the study tool. The study reached several results; first, the role played by families in the Kingdom of Saudi Arabia, Austria, and United Kingdom to attain language affiliation among their children got a high degree of response. Second, the challenges facing activating the family’s role in attaining language affiliation of their children in the Kingdom of Saudi Arabia and Austria have got a high degree of response, while in Britain, they obtained a very high degree of response. The study recommended involving all family members in accessing different and creative ways of practicing their native language and activating the role of social media in developing the language affiliation of children.


2020 ◽  
Vol 9 (1) ◽  
pp. 85-93
Author(s):  
A.V. Sechko

The article analyzes the results of a study of recidivism conducted in England, Denmark, Canada, Nigeria, Portugal, New Zealand, the USA, and Scotland. Objective and subjective determinants have been identified that make it possible to predict with a high degree of probability the subsequent criminal prosecution violation, its time parameters. The psychological portrait of the recidivist is described, stress factors of delinquent behavior are revealed. The driving forces of decriminalization of former criminals are revealed. This is an intensive probationary period under the auspices of mentors who are able to build trusting relationships with parole through consistent, non-judgmental actions with the simultaneous possibility of playing the role of guardians of young people in difficult social and criminal settings in solving their economic problems.


2021 ◽  
Author(s):  
Aljohara Fahad Al Saud

Identifying language affiliation among children for family immigrants is crucial for one’s language identity. This study aimed to determine the role played by Arab families in the Kingdom of Saudi Arabia, Austria, and Britain to attain language affiliation among their children. It also aims to identify the challenges facing families living in these countries in achieving language affiliation among their children. The study population consisted of all the families that live in the Kingdom of Saudi Arabia, in addition to all the Arab families that live in Austria and Britain and the study sample included (120) parents. The researcher adopted the descriptive-analytical approach and used the questionnaire as the study tool. The study reached several results; first, the role played by families in the Kingdom of Saudi Arabia, Austria, and United Kingdom to attain language affiliation among their children got a high degree of response. Second, the challenges facing activating the family’s role in attaining language affiliation of their children in the Kingdom of Saudi Arabia and Austria have got a high degree of response, while in Britain, they obtained a very high degree of response. The study recommended involving all family members in accessing different and creative ways of practicing their native language and activating the role of social media in developing the language affiliation of children.


Author(s):  
Fawzia Cassim

This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future. The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.


Author(s):  
Galina Kuleshova ◽  
Elena Kapitonova ◽  
Georgy Romanovsky

The authors discuss the legal specifics of counteracting cyber-terrorism in Russian and in foreign law at the modern stage of the development of information space. They show that such principles of telecommunication technologies as transparency and accessibility are used by terrorist organizations for criminal purposes. The analysis of foreign legislation shows that legislations of most countries do not have a special crime of cyber-terrorism. At the same time, the use of IT in disseminating terrorist ideology is included in these legislations as an aggravating circumstance. The authors conclude that Russian legal scholars do not currently have a common opinion on adding a new special crime of cyber-terrorism to the Criminal Code of the Russian Federation. They argue that such amendment of Russian criminal law is not necessary. The authors also single out different features of cyber-terrorism and present its classification that includes a hybrid type and cyber-terrorism proper. In the former case, the Internet is used for terrorist activities: propaganda, recruitment of supporters, their training, radicalization of society, collecting funds and data, connections, planning of actual terrorist attacks. In the latter case, there are direct attacks against cyber-infrastructure with political, religious and ideological purposes. The authors conclude that the dangers of cyber-terrorism as a threat to the whole infrastructure of society are overstated because ordinary cyber-crimes inflict a much greater damage on the economy of any country. However, as these crimes are not coordinated from one center and because of the ideology of extremism, this type of crime cannot strike a social fear comparable with the fears that could be inspired by references to the activities of terrorist organizations. It is shown that in the USA and in Western Europe cyber-terrorism is greatly politically charged, and the society is encouraged to evaluate the threat of cyber-terrorism though the prism of the level of security of each member of this society. Besides, the society is indoctrinated to believe that it is necessary to carry out cyber-attacks against those countries that might pose a threat. In this connection, the authors conclude that a high level of attention to the problem of cyber-terrorism has a prominent ideological and value component.


2019 ◽  
Vol 10 (2) ◽  
pp. 115-128
Author(s):  
Rohit Kalakuntla ◽  
Anvesh Babu Vanamala ◽  
Ranjith Reddy Kolipyaka

Abstract Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the information has become an enormous problem in the current day. The cybersecurity the main thing that originates in mind is ‘cyber crimes’ which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in the region of organizations. The paper also explains the components of cyber terrorism and motivation of it. Two case studies related to cybersecurity also provide in this paper. Some solution about cyber security and cyber terrorism also explain in it.


2010 ◽  
Vol 59 (11) ◽  
pp. 1340-1347 ◽  
Author(s):  
N. Khetsuriani ◽  
T. Kutateladze ◽  
E. Zangaladze ◽  
T. Shutkova ◽  
S. Peñaranda ◽  
...  

Enterovirus surveillance data are useful for establishing temporal and geographical patterns of circulation and for virus characterization to determine phylogenetic relationships between strains. Almost no information is available on circulating enteroviruses in Georgia and the surrounding region. To describe enterovirus circulation in Georgia, determine relationships with previously characterized strains and assess the role of environmental and clinical enterovirus surveillance, this study analysed a total of 112 non-polio enterovirus isolates identified during 2002–2005 from sewage and human stool samples. Viruses were isolated in cell culture using standard methods and typed by partial sequencing of the VP1 gene. A total of 20 different non-polio enterovirus serotypes were identified over the 4-year period. The most commonly detected enteroviruses included echovirus (E) 6 (21 isolates; 18.8 %), E20, E3 and E7 (11 isolates each; 9.8 %), E11, coxsackievirus (CV) B4 and CVB5 (seven isolates each; 6.3 %), and E13, E19 and E30 (six isolates each; 5.4 %). Phylogenetic analysis showed that many serotypes were represented by more than one genetic lineage. The present study showed a very high degree of enterovirus diversity in Georgia and demonstrated the added value of environmental enterovirus surveillance, particularly in settings with limited clinical surveillance. Several serotypes would not have been detected without having both clinical and environmental surveillance in place. Several serotypes detected in Georgia were among those rarely reported in the USA and Europe (e.g. E3, E20 and E19). As the emergence of new genetic lineages of enterovirus in a particular area is often associated with large-scale outbreaks, continued monitoring of enterovirus strains by both environmental and clinical surveillance and genetic characterization should be encouraged.


2021 ◽  
Vol 3 ◽  
Author(s):  
Nawaf Alhalafi ◽  
Prakash Veeraraghavan

Saudi Arabia has a goal of ensuring that it has at least two cities among the top 100 smart cities of the future. However, increasing connectivity and incorporation of smart solutions in cities still raises concerns over cyber security with threats arising daily including denial of services and phishing as some of the most significant. Saudi Arabia, therefore, needs a cybersecurity policy framework that will ensure effective protection for all stakeholders in the smart city from these cyber threats. User acceptance is foremost important in any new technology, including smart-cities. Due to ongoing cyber threats and in the absence of an efficient cyber policies, Saudi end-user community is not keen to accept newer technologies where their interaction with online medium is required. The proliferation of smart cities globally affords the opportunity to analyze and compare the efforts made in Saudi Arabia with other nations like the USA, India and Singapore which is the premier smart city model in the globe currently. This review looks at the similarities and differences between KSA’s cyber security policy framework with these three nations. The review will note some of the defining characteristics and approaches to cyber security in the smart cities of USA, India, and Singapore. After reviewing the current framework in Saudi Arabia, this paper will make suggestions such as updating Saudi’s cybercrime legislation like in the US or formulating a master cyber security plan as seen in Singapore that will improve KSA’s framework creating the best framework model for cyber security in its smart cities.


2020 ◽  
Vol 11 (0) ◽  
pp. 1
Author(s):  
Joëlle Klein ◽  
Kamrul Hossain

The following article revisits existing scholarship on human-centric approaches to security in cyberspace and argues that a holistic understanding of cyber security in the Arctic must include discussion of the use of cyber technology in the everyday lives of individuals and communities, addressing both the ways such tools enable and undermine human security. Simultaneously, the article contextualises the Arctic as a region undergoing rapid change as a result of climate change and increased digitalisation and seeks to understand the consequent implications for human security. In light of these considerations, the article analyses the existing constraints and possibilities that cyber security and digitalisation pose for human security and revisits them from a humancentric perspective of cyber security. It also seeks to contextualise such security influences in relation to the role of climate change and its influence on the region. Finally, several examples are discussed to underline the interdependent implications of digitalisation and climate change from a human-centric perspective of cyber security in the Arctic.


2018 ◽  
Vol 7 (2.3) ◽  
pp. 54
Author(s):  
Sivaram Rajeyyagari ◽  
Abdullah S. Alotaibi

Now a day the human life penetrated with the technology, like in every moment of life such as shopping or financial transactions and more are using technology in its cyber space. At the same time, it has become very difficult to safe guard the information. The online crime or cybercrime increased along with the heavy usage and development of social media. In case of Saudi Arabia, the cyber-attacks increased because of regional conflicts and low-level awareness about cyber security, and also the perception of Saudi Arabia being extremely wealthy. This paper identifies the importance and impact of cybercrime according to the current situation and Study reports of past activities that have taken place in Saudi Arabia. In addition, described about the cyber security and its emerging trends and latest Technologies along with the policies planned and implemented by the Kingdom of Saudi Arabia. However, the growth of Cyber Crimes becomes proportional to the technological advances. The present paper suggest the solutions to deal with the increasing online crimes in Saudi Arabia with few case studies and have been discussed some innovative suggestions for future cyber security.


Sign in / Sign up

Export Citation Format

Share Document