The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia

2021 ◽  
Author(s):  
Nooraneda Laidey
Keyword(s):  

2011 ◽  
Author(s):  
Jakub Lickiewicz
Keyword(s):  


2017 ◽  
Vol 8 (16) ◽  
Author(s):  
Agata C. Amato Mangiameli (Universidade de Roma – Tor Vergata)

This paper aims investigate the general theory and the elements of the computer crimes as well it social engineering, because as technology advances, more and more people use it according to their needs.



Author(s):  
Dmitry A. Lipinsky ◽  
Aleksandra A. Musatkina ◽  
Konstantin N. Evdokimov
Keyword(s):  


2014 ◽  
Vol 8 (2) ◽  
pp. 29-34
Author(s):  
Alin Teodorus Drăgan

Hacking involves the attempt to compromise the security of a computer system in orderto gain unauthorized access. In the course of time it has turned out that the Internet is avulnerable system, and this has generated a framework for criminal activities, resulting in theemergence of new crimes, among which computer fraud.



Author(s):  
Elena Rossinskaya ◽  
Igor Ryadovskiy

The authors analyze problems connected with malware from the standpoint of the doctrine of the methods of computer crimes/offenses as one of the components of the theory of information-computer support of criminalistic work. Most methods of computer crimes are based on the unauthorized access to computer facilities and systems gained through malware that, in fact, acts as a weapon of crime. The authors present a classification of malware based on different parameters: from the standpoint of criminal law and criminology; the standpoint of information technology; the standpoint of the doctrine of computer crimes/offenses. Various grounds for the classification of malware are examined. A general classification, widely used by the developers of antiviral software, includes virus-programs, worm-programs and trojan-programs. In the modern situation of massive digitization, it is not practical to regard masquerading as a legitimate file as a dominant feature of trojan software. On the contrary, criminals try hard to hide from the user the downloading, installation and activity of malware that cannot self-propagate. The key method of propagating trojan programs is sending mass emails with attachments masquerading as useful content. The classification of malware by the way and method of propagation - viruses, worms and trojan programs - is only currently used due to traditions and does not reflect the essence of the process. A different classification of malware into autonomous, semi-autonomous and non-autonomous programs is based on the possibility of their autonomous functioning. At present there is practically no malware whose functions include only one specific type of actions, most of it contains a combination of various types of actions implemented through module architecture, which offers criminals wide opportunities for manipulating information. The key mechanisms of malwares work are described and illustrated through examples. Special attention is paid to harmful encryption software working through stable cryptographic algorithms - ransomware, when criminals demand ransom for restoring data. There is no criminal liability for such theft. The authors outline the problems connected with the possibility of the appearance of new malware that would affect cloud resources.



Author(s):  
Samira T. Akhmedkhanova ◽  
Sabina T. Akhmedkhanova ◽  
Almira K. Kahbulayeva
Keyword(s):  


Author(s):  
Elena Maksimova ◽  
◽  
Mariya Berdnik ◽  
Vadim Tsybanov ◽  
Anna Alekseenko ◽  
...  
Keyword(s):  




1994 ◽  
Vol 1994 (4) ◽  
pp. 16-19
Author(s):  
Silvano Ongetta
Keyword(s):  


Author(s):  
Jo Anne Cote ◽  
Eun G. Park

In the digital world, several ways to organize and describe digital rights management (DRM) have been developed to enforce fairness and transparency in business trades. Metadata is beginning to serve this purpose as it attempts to address property rights, licensing, privacy, and confidentiality issues in a manner that ideally renders information or content easily accessible over a variety of platforms (Koenen, 2001). With the rise of security breaches and computer crimes such as identity theft, DRM is increasingly an issue for creators, content owners, purveyors, and consumers of all sorts of digital materials. This article defines what DRM is and explains how it is implemented into description and assessment in practical metadata schemes. DRM components are discussed, in particular those related to identification and rights expression. The two commonly used standards of describing DRM are discussed with Open Mobile Alliance and MPEG-21 (Rosenblatt, 2005). Issues and problems of metadata in DRM are also discussed for future implications.



Sign in / Sign up

Export Citation Format

Share Document