scholarly journals Challenges in Cyber Crime and Security

Definition: - Computer crime is an offence or an attack done by the third party or the individual or group of people. It may be done in terms of many possible reasons like to steal some crucial information or data or money and all that possible things that may affect the victim mentally, financially or physically. Resources: - Internet, phone, hardware devices. Effects: - The coders may pollute some sort of codes which termed as viruses in the computers of the country men and may affect the security of the people at a very nominal grade but this is not all, it may also affects the norms and the rules of the organizational companies and may steal their crucial information. These types of people are termed as HACKER in the context of Cyber Security They also have an adverse effect on the economy of the country as the country may not have the proper rules and the cyber experts for securing of data and in that type of country no businessman may invest . Securing yourself: - Actually the computer polluters are the well-known people who have good enough knowledge of their work but we can still get out the attack held on us by using some precaution and using the proper paid and genuine antivirus as an survey has declared that in 58% of pc’s people have viruses due to their unpaid and local antivirus.

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Vihang Dilip Gaokar ◽  
Karan Harish Tundejwala

In the world of full of technology and digitization security is the main concern right now. With the help of internet, we can do most of our work like shopping, office work, e-banking, other transactions, etc. With mobile banking everyone knows how to do transactions, online shopping, but most of the people don’t know what the security while doing any kind of online work, people have lack of knowledge in cyber security and hacker, cyber criminals take advantage of that. According to report in 2020, the transaction volume share in India stood at 15.6 per cent and 22.9 per cent for instant payments and other electronic payments respectively, while paper-based payments had a considerable share of 61.4 per cent. And by the 2024 the electronic transaction will increase by 50% and this will touch 71.7% by 2025. India is a developing country and is moving forward in digitization. While this is happening securing the online data or transaction will become more and more challenging. E- banking makes work easier and fast but it is not safe, it will never be 100% secure. And cybercrime is increasing faster than we imagine. This study paper mainly focuses on banking frauds in India, online transaction, scenarios faced by cyber victims, e-banking challenges. It also focuses on the cyber security and how can we avoid most of the e-banking fraud.


2020 ◽  
Vol 14 (1) ◽  
pp. 43
Author(s):  
Haitao Chen

With the continuous revision and improvement of the Civil Procedure Law and relevant judicial interpretations, China has formed a complete system to protect the rights and interests of the third party not involved in the original trial, including enforcement objection, execution objection lawsuit, the third party revocation lawsuit and retrial procedure. However, at present, the legal provisions on the cis-position of application of the above procedures are still vague. In order to explain and solve this problem more clearly, this thesis divides the time after the judgment is made into three stages - "from the time when the judgment is made to before the judgment takes effect", "the stage of execution" and "after the stage of execution". Based on the characteristics and purposes of each procedure and the functional characteristics of judicial organs, the cis-position of each procedure in different stages is determined reasonably.


Author(s):  
Anu Sween Thomas

One of the major concerns of this electronic world is the need to develop innovations in the field of health care cybersecurity. Data reveals that the first ransom attack was reported to be in the year 1989, which was quickly mitigated because of its simplicity1. But 2020 ransomware attacks appear to be more complicated with the sophisticated tool that helps the third-party or cyber attackers to hide from undetected breach detectors. Here arises the need to be aware on the topic and measures to prevent it. This article shall provide a brief knowledge regarding cybersecurity in health care system, threats and pointout some measures to prevent it.


2018 ◽  
Vol 11 (4) ◽  
pp. 139
Author(s):  
Zheni Liang

The third-party revocation action is a new system established in the Civil Procedure Law of the People's Republic of China of 2012. Although the academic community is quite controversial, it is undeniable that due to the increasing use of the judicial system to infringe on the rights and interests of others. For example, infringement of the lawful rights and interests of the parties or third parties through false litigation, malicious litigation, imposing litigation, etc., the third-party revocation action as a system that can effectively protect the legitimate rights and interests of third parties outside the case has great practical significance in China. Therefore, how to better understand and apply the third-party revocation system has become a problem that must be paid attention to by the current theoretical and practical circles. On the basis of introducing the system of revocation of the third party in China, the article discusses the existing problems such as the scope of the parties, the litigation procedure and the application of similar procedures.The article proposes that the third party with independent claim and the third party without independent claim should be brought into the scope of the third-party revocation action’s subject. As for the choice of the procedure, the procedure of first instance should be applied to the trial of the third-party revocation action. When a lawsuit and an application for retrial by an outsider can be applied simultaneously, the litigant can only be allowed to choose one procedure. If the litigant simultaneously initiates a lawsuit for cancellation by a third party and the outsider applies for retrial, the third-party revocation action shall be applied preferentially.


Author(s):  
Ewan McKendrick

This chapter examines the impact of a contract on third parties. It addresses two main questions: whether or not a third party can acquire any rights under the contract, and whether or not the contract can impose upon him obligations or liabilities. The general rule adopted by English law is that the contract creates rights and imposes obligations only between the parties to the contract: the third party thus neither acquires rights under the contract nor is he subject to liabilities. This general rule is known as the doctrine of privity of contract. The Contracts (Rights of Third Parties) Act 1999, however, provides a relatively simple mechanism by which contracting parties can confer upon a third party a right to enforce a term of their contract. The dominant philosophy that underpins the 1999 Act is one of freedom of contract and, this being the case, the success of the Act in practice will depend upon contracting parties themselves. The chapter examines the individual sections of the 1999 Act, the exceptions to the doctrine of privity that existed at common law and under various statutes prior to the enactment of the 1999 Act. The chapter concludes by considering the extent to which a third party can be subject to an obligation by a contract to which he is not a party.


2021 ◽  
Vol 56 (5) ◽  
pp. 415-423
Author(s):  
Suwardi ◽  
Achmad Choerudin

This study aims to optimize the utilization of the Local Government's asset in supporting Local Original Income (PAD) in Salatiga City, involving: (1) Asset lease to a third party not based on leasing tariff because Salatiga City Government has not had Local Regulation yet about redistribution of local wealth; (2) The direct use of income resulting from the asset leasing to the third party in which the leasing income is used directly for repairing the damaged object. It is because of an agreement loosely governing right and obligation; and (3) Inadequate supervision over object/asset that the third party can utilize. This research uses a survey method conducted in Salatiga, Central Java, Indonesia, which involves relevant regional apparatus organizations, resource persons, and community leaders. The local asset has strategic value. The quality of asset management should be improved along with the attempt to optimize local income. The effectiveness and efficiency of institutional management can be seen, among others, from the comparison between asset size and income. Asset management of Salatiga City Government is conducted, not merely referring to legislation. However, it should also pay attention to usefulness value to improve local original income and usefulness to the people. This research found that asset optimization is inhibited by the function sustainability of internal management and legislative technique.


Author(s):  
Amr Ahmed Otaifi

The study aimed at uncovering the role of the lexicon in establishing the concept of citizenship. Where two methods of contemporary language courses were used: The descriptive approach by describing the manifestations of the lexicon of the principles that fuel the feelings of national belonging among the people of the language. The second is lexical criticism. The research consists of two chapters: the first is the definition of significance in the Arabic dictionary, the second is the term of citizenship, its origin and meaning, and the third is the requirements of the new lexicon. And the second section of the homeland and citizenship in the contemporary and basic, and includes the demands of four: the first root (و ط ن), the second - the terms of common terminology, and the third - the formulation of the definition in the lexicons, and IV - supporting examples of citizenship. The study concluded that the studied lexicons contain many information with a national flavor, although one of them is not present in the previous dictionaries, with a clear effort, in which the modern lexicological industries are realized and the meaning of the fact that the individual belongs to one country without another and has his loyalty on the other , As well as the existence of educational inputs related to participation and real effectiveness.


1993 ◽  
Vol 72 (3_suppl) ◽  
pp. 1071-1074 ◽  
Author(s):  
Eugene W. Mathes ◽  
Christine Verstraete

The purpose of this research was to test the hypothesis that when an individual's romantic partner is sexually unfaithful the individual will be more angry with and aggressive toward the partner than the third party. 40 college men and women participated in this study. Each subject rated how angry and aggressive he or she would be toward him- or herself, the partner, and the third party if the partner were unfaithful. Intensity of love, degree of commitment, and mode of anger/aggression expression were also investigated. Support was found for the hypothesis.


Author(s):  
Myriam Dunn Cavelty

This chapter examines the implications of cyber-security for national security. It first provides the necessary technical background on why the information infrastructure is inherently insecure, how computer vulnerabilities are conceptualized, who can exploit them, and how. In particular, it considers definitions and concepts relevant to information security, such as cyberspace, Big Data, and hacking. It then describes three interconnected cyber-security discourses: the first is about computer viruses and worms; the second deals with the interrelationship between cyber-crime and cyber-espionage; the third is concerned with the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the chapter evaluates a range of protection measures from each of the three discourses. It concludes by suggesting that the level of cyber-risk is generally exaggerated.


Sign in / Sign up

Export Citation Format

Share Document