scholarly journals Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques

Author(s):  
T. Venkat Narayana Rao, Sreeja Reddy

Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files.

2020 ◽  
Author(s):  
Swati Sharma ◽  
Vikash Kumar Sharma

Cyber Crime is a crime which is difficult to detect and stop once occurred leave a long term effect on victims. Cyber Crime is increasing day by day due to over use of social media, online shopping, and internet banking which need sensitive financial and personal data.The development in emerging internet technology and its wide spread knowledge leads to security issues, cyber crime, internet hackers and intruders. The charm of internet enhances the network structure that construct vast online theft, fraud are called as cyber attacks or cyber crime. In order to keep ourselves free from cyber crime we need to know how to protect ourselves from cyber crime. In this paper we propose different mode of cybercrime and the types of its illegal activities over the internet. Either national or international cybercrime is creating huge negative impacts over society. By focusing on various techniques we examine the cybercrime web data due to social media. Social networking websites are used as a medium of interaction and communication among all the people across the world. Due to over use and lack of awareness leads to increase the cyber crimes by several aspects.


2020 ◽  
Vol 44 (2) ◽  
pp. 89-100
Author(s):  
Robyn K. Rowe ◽  
Julia Rowat ◽  
Jennifer D. Walker

First Nations people in Canada have demonstrated and continue to demonstrate persistent and resilient cultural, linguistic, and traditional endurance: survivance. The devastation resulting from centuries of health pandemics such as smallpox, influenza, cholera, tuberculosis, measles, and scarlet fever reinforce the ongoing resilience of First Nations people, cultures, and traditions in Canada. Despite the history of pandemic-related trauma and a myriad of social, political, environmental, and health challenges, as well as the added burden that COVID-19 is placing on the healthcare system in Canada, First Nations’ organizations and leadership are enacting their inherent rights to sovereignty and governance. While First Nations are bracing for the expected negative impacts of COVID-19, they are doing so in ways that respect and honor their histories, cultures, languages, and traditions. First Nations are acting to protect some of the most vulnerable people in their communities including elders, knowledge keepers, and storytellers who carry with them irreplaceable traditional and cultural knowledges.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


Author(s):  
Mohammed S. Gadelrab ◽  
Ali A. Ghorbani

New computing and networking technologies have not only changed the way traditional crimes are committed but also introduced completely brand new “cyber” crimes. Cyber crime investigation and forensics is relatively a new field that can benefit from methods and tools from its predecessor, the traditional counterpart. This chapter explains the problem of cyber criminal profiling and why it differs from ordinary criminal profiling. It tries to provide an overview of the problem and the current approaches combined with a suggested solution. It also discusses some serious challenges that should be addressed to be able to produce reliable results and it finally presents some ideas for the future work.


2018 ◽  
Vol 11 (5) ◽  
pp. 808-827 ◽  
Author(s):  
Becca Castleberry ◽  
John Scott Greene

PurposeOklahoma has seen rapid growth in the development of wind energy over the past decade. Residents are concerned about the negative impacts of turbines such as noise or their appearance. This has raised concerns about property values. Thus, this paper aims to examine and quantify the overall impact of wind turbines upon real estate prices in Western Oklahoma.Design/methodology/approachSales prices and the history of approximately 23,000 residential real estate records for both platted and unplatted properties in five counties were examined prior to the announcement of construction, after announcement and after construction. A hedonic analysis was undertaken to examine the real estate prices of the properties near wind farms.FindingsWhile there may be isolated instances of lower property values for homes near wind turbines, results show no significant decreases in property values over homes near wind farms in the study area. Similar results are found for the unplatted properties.Practical implicationsThis paper highlights that in spite of mixed attitudes toward wind farms and misconceptions regarding the link between turbines and property values, Oklahoma’s growing wind industry can continue to thrive without negatively impacting nearby home and land values and prices.Originality/valueAlthough there have been numerous studies examining the relationship between wind turbine locations and real estate prices, no study has combined the large quantity of records (over 23,000) as well as both platted and unplatted locations.


2006 ◽  
Vol 33 (4) ◽  
pp. 353-363 ◽  
Author(s):  
PHILIP DEARDEN ◽  
MICHELLE BENNETT ◽  
RICK ROLLINS

One activity with potential to provide a direct incentive for reef conservation is scuba diving. In the absence of effective management, diving can also have negative impacts. This study shows how an understanding of diver specialization can be used to help manage diving and increase its effectiveness as an incentive-driven conservation activity. Surveys were used to assess motivations, satisfactions and dive history of divers in Phuket (Thailand) and categorize divers by degree of specialization. Highly specialized divers were more likely to be on a live-aboard trip than less specialized divers and placed greater importance on the characteristics of the dive itself rather than the trip. Less specialized divers put more emphasis on non-dive characteristics. Satisfaction levels differed significantly among specialization groups in terms of overall satisfaction with the dive experience, satisfactions compared with motivations and satisfactions with specific trip characteristics. Overall there was a decline in satisfaction levels with increasing specialization. These finding are compared to a wildlife tourism model that links impacts with client characteristics and suggests a displacement of specialists by generalists and changes in the limits of acceptable change (LAC) over time. The dive data supported this progression leading to increased industry competition and reduced opportunities to sustain a broad-based dive industry that will act as an incentive-driven mechanism for reef conservation. Specific actions related to reef access and zoning according to a diver opportunity spectrum (DOS), establishing LAC and monitoring programmes, enforcing safety and environmental regulations are suggested to promote a more sustainable approach to dive management. Social science insights can be used to aid reef management strategies and increase the potential for diving to contribute towards reef conservation.


2017 ◽  
Vol 9 ◽  
pp. 1-11 ◽  
Author(s):  
W. Qiu ◽  
S. Rutherford ◽  
A. Mao ◽  
C. Chu

The Pandemic has a long history, but the term of “pandemic” is still not been defined by many medical texts. There have been many significant pandemics recorded in human history, and the pandemic related crises have caused enormous negative impacts on health, economies, and even national security in the world. This article will explore the literature for the concept and history of pandemics; summarises the key features of a pandemics, and discusses the negative impacts on health, economy, social and global security of pandemics and disease outbreaks.


2021 ◽  
pp. 1111
Author(s):  
Yuwono Prianto ◽  
Nabila Annisa Fuzain ◽  
Afif Farhan

Digital activity during the pandemic is increasing this is because people are asked to stay at home doing all activities online, this makes people vulnerable to becoming victims of cyber crime. Cybercrime itself is a cyber crime by using a computer or computer network as a tool, or as a target, as well as the location of the crime, the absence of space and time limits makes it easier for cyber criminals to carry out their actions in the cyber world. The author's purpose in conducting this analysis is to discuss what are the obstacles in handling cybercrime cases during the Covid-19 pandemic and how to enforce the law for cybercrime perpetrators. This article is the result of normative legal research that focuses on the use of secondary data. Cyber crimes need special attention from law enforcement, both national and international. The perpetrators of cybercrime have not been fully prosecuted due to the weakness of the cyber legislation system in Indonesia and the limited number of experts to handle this case. Cyber law has not been clearly spelled out in the regulations governing the technical implementation. The perpetrators of cyber crime come from various countries, limited human resources and infrastructure are the main obstacles. It requires a strong commitment from the leadership, law enforcement institutions to improve the quality and quantity of human resources as well as to prepare an adequate budget for the procurement of facilities and infrastructure as well as to establish cooperation with higher education to accelerate the handling of existing limitations. Aktivitas digital pada masa pandemi semakin meningkat hal ini disebabkan masyarakat diminta untuk tetap di rumah melakukan semua kegiatan dilakukan secara daring, hal ini membuat masyarakat rawan menjadi korban kejahatan cyber. Cybercrime sendiri adalah kejahatan dunia maya dengan menggunakan komputer atau jaringan komputer sebagai alat, atau sebagai sasaran, serta lokasi terjadinya kejahatan, tidak adanya batasan ruang dan waktu memudahkan penjahat cyber untuk melakukan aksinya di dunia cyber. Tujuan penulis melakukan analisis ini  adalah untuk membahas apa saja yang menjadi kendala dalam menangani kasus cybercrime di saat masa pandemi Covid-19 dan bagaimana penegakan hukum bagi para pelaku cybercrime. Artikel ini meruupakan hasil dari penilitian hukum normatif yang fokus pada penggunaan data sekunder. Kejahatan cyber  crime perlu mendapatkan perhatian khusus dari penegak hukum baik nasional maupun Internasional. Pelaku cybercrime belum seluruhnya dapat di proses hukum karena lemahnya sistem perundangan-undangan siber di Indonesia dan terbatasnya tenaga ahli yang dimilki untuk menangani kasus ini, Undang-Undang cyber belum dijabarkan dengan jelas didalam Peraturan yang mengatur mengenai teknis pelaksanaannya. Pelaku cyber crime berasal berbagai dari negara, terbatasnya SDM dan prsarana menjadi kendala utama. Diperlukan komitmen yang kuat dari pimpinan, Institusi penegak hukum untuk meningkatkan kualitas dan kuantitaf SDM serta penyiapan anggaran yang memadai untuk pengadaan sarana dan prasana serta menjalin kerjasama dengan pendidikan tinggi untuk mempercepat penanganan keterbatasan yang ada.


With the rapid advancements in technology, our lives have become completely digitalised. We sit in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking, through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including businesses, organisations and governments of different nations. This paper aims to determine the association between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and the gender. Descriptive research has been carried out which helps us to understand the characteristics of an individual or a group. The sampling method used here is convenient sampling where the samples have been chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of the respondent and that there is no significant difference between the main cause of cyber-crime and gender. With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more effective ways of cyber security in order to protect the society.


Sign in / Sign up

Export Citation Format

Share Document