Women's Involvement in Cybercrime: A Premilinary Study

2015 ◽  
Vol 3 (3) ◽  
pp. 266-270
Author(s):  
Muhamad Asyraf Ahmad Termimi ◽  
Muhammad Ikhlas Rosele ◽  
Khairul Azhar Meerangani ◽  
Syamsul Azizul Marinsah ◽  
Mohd Anuar Ramli

Cyber crimes is a new millennium threat to society nowadays which brings by developments of technology and information. Various forms of cyber crimes exist either theft and fraud involving money and property or safety threat involving contamination of dignity. Therefore, this study will identify cyber crimes related to women in Malaysia for cases of theft and fraud of money and property through cyberspace. Cyber crimes will be identified and classified according to cases that often occurred in Malaysia and legal protection provided to the victim. The results showed lack of awareness about cyber security transactions and the provision of existing law that exists for cyber crime cause women to be victims of cyber crime.

Yuridika ◽  
2018 ◽  
Vol 33 (2) ◽  
pp. 212 ◽  
Author(s):  
Hardianto Djanggih

The development of internet nowadays does not only give a positive impact but also gives a negative impact in the form of crime that targets everyone, including children. Cyber crime which impact children as a victim should be handled seriously, this considering the fact that children need to get optimal protection to ensure their growth as the hope of nation. This study aims to determine and analyze the impact on cyber crime that impact children as its victim. This research uses juridical-sociological research method which is analyzed descriptively. The results show that the development of cyber crime that afflicts children as victims every year increases with various forms of development and crime mode. However, the legal protection aimed to reduce such crime is still very weak due to weak legislation, law enforcement performance and cyber security in Indonesia. The research is intended to provide recommendation for the government, law enforcers and the public, so that cyber crime that impact children as victims could be reduced and ensure protection for children.


With the rapid advancements in technology, our lives have become completely digitalised. We sit in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking, through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including businesses, organisations and governments of different nations. This paper aims to determine the association between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and the gender. Descriptive research has been carried out which helps us to understand the characteristics of an individual or a group. The sampling method used here is convenient sampling where the samples have been chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of the respondent and that there is no significant difference between the main cause of cyber-crime and gender. With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more effective ways of cyber security in order to protect the society.


Author(s):  
Aruna Devi

Cybercrime is a multifaceted and forever changing phenomenon. It is found that Cyber criminals who are becoming more classy and stylish are making consumers of both private and public organizations their prey. To prevent attacks additional layers of defense are required. It has been observed that Cyber crime has increased in density and complexity and financial costs ever since organizations have adopted the use of computers in carrying out their business processes. An example of the case studies carried out on cyber crimes is the Parliament attack case. The main points discussed in this chapter are Cyber crime and cyber security, the unusual cyber crimes that we come across. Various prevention techniques and detection techniques like Tripwires, Honey Pots, anomaly detection system, configuration checking tools and operating system commands, various acts that have been imposed against Cyber crime and online safety tips are also discussed.


2021 ◽  
Vol 9 (09) ◽  
pp. 274-279
Author(s):  
Sumanta Bhattacharya ◽  
◽  
Bhavneet Kaur Sachdev ◽  
Arpan Kundu ◽  
Khewan Bansal ◽  
...  

Cyber space industry has made massive profit during this pandemic with everything going online along with the electronic industry in India , Today , Asia has the maximum population playing video gamers, the gaming industry is earning in billions , digital education , digital economy , work from home everything went online over night , which gave rise to cyber crime cases in India . India data is vulnerable and there is no cyber law which talks about privacy , more than 50% of the population lost their sensitive information online , there was cases of online job frauds and debit and credit fraud . The cyber law in India requires reform where phishing and cyber warfare are given legal protection in India , DATA protection , privacy and spamming requires legal attention . Banks are sensitive to cyber criminal because of the poor cyber security system and not so strong cyber laws which has affected the economy , people have lost many in lacs in these months , The cases of risen in 2020 to 2021 . India also needs to upgrade its cyber security policy and bring in professional in this field.


Author(s):  
Prof. Simranpreet Kaur

Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2021 ◽  
pp. 000486582110039
Author(s):  
Benoît Dupont ◽  
Chad Whelan

‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing ( Brodeur, 2010 ) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber- crime and cyber- security and to call for more fruitful alliances between cybercrime and cybersecurity researchers.


Author(s):  
T. Venkat Narayana Rao, Sreeja Reddy

Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Sign in / Sign up

Export Citation Format

Share Document