scholarly journals Perception About Cyber Crimes Among Students in Arts and Science Colleges in Chennai

The internet helps us in providing information as well as storing all our data, with the rapid increase in our modern technology; it has become very difficult to keep our private information safe. The Internet has also bred a new kind of crime CYBER-CRIME. The other name for Cyber crimes are "Internet Games" and "yahoo yahoo". Common internet users are unaware of Cyber crimes like hacking, identity theft, Credit/debit card frauds, cyber terrorism and many more crimes. This paper attempts to draw out the awareness level of students about cyber crime.

GIS Business ◽  
2019 ◽  
Vol 14 (3) ◽  
pp. 196-201
Author(s):  
S S KARTHIK KUMAR

Crime is a common word that we always hereof in this era of globalization. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have been associated with man since time immemorial. Cyber crime is a new type of crime that occurs in these years of Science and Technology. There are a lot of definitions for cyber crime. It is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. In addition, cyber crime also includes traditional crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud, identity theft, and credit card account thefts. In simple word, cyber crime can be defined as any violence action that been conducted by using computer or other devices with the access of internet.


Internet has become an innovative relief for the modern generation, at it also promote a burden on the society. The internet acts as the genesis and breeding ground for a new kind of crime called the “cyber crime”. Common internet users are not aware of cyber crimes and they are not conscious on the precautionary aspects to over come such attacks from taking place. This paper aims to analyze the awareness levels of internet users towards various forms of cyber crimes. This study was conducted in Krishna and Guntur districts of Andhra Pradesh. Descriptive Research Design was adopted for the study and a sample size of 160 respondents were selected using Random Sampling Technique involving both the genders among the internet users. The findings of the study shows that the awareness levels of the internet users towards cyber crimes in the study area are very low and they have very less perception towards various forms of cyber crimes that exists in the modern times.


2021 ◽  
Vol 18 (2) ◽  
pp. 257-266
Author(s):  
Vićentije Darijević

The development of the Internet affects human society in two ways: it enables society to progress and endangers security.Online access platforms facilitate business, education and contacts.On the other hand, individuals who access virtual platforms expose their privacy and their assets to the risk of cyber attacks.Unfortunately, one gets the impression that legislation cannot keep pace with technological advances so that many crimes committed on the internet remain unsanctioned. This paper points out the characteristics of cybercrime, gives an overview of international documents aimed at establishing cyber security.A list of domestic legislative regulations by which the Republic of Serbia seeks to solve the problems caused by cybercrime is also given.It also points out the characteristics of this type of crime that directly affect the impossibility of global regulation and protection of Internet users.


Author(s):  
K. S. Umadevi ◽  
Geraldine Bessie Amali ◽  
Latha Subramanian

Security, safety, and privacy are of paramount importance to anyone who likes to crawl on the web. Keeping the best interest of the internet users in mind, India has laid down very solid foundations to safeguard its people from cyberattacks and cyber terrorism. The word “cyber law” encompasses all the cases, statutes, and constitutional provisions that affect persons and institutions who control the entry to cyberspace, provide access to cyberspace, create the hardware and software that enable people to access cyberspace or use their own devices to go “online” and enter cyberspace. Cyber crimes are unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief, all of which are subject to the Indian Penal Code.


Author(s):  
Sopna A/P Sinnathamby Sehgar ◽  
Zuriati Ahmad Zukarnain

Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. The availability of personal information on the Internet has increased the chances of this cyber-crime. Online identity theft crime is the result of a combination of cyber-crimes on the one hand and lack of awareness and training of users on the other hand to protect personal data on the other. Education and awareness, which also contributes to early detection, is the strongest tool for consumers to safeguard themselves from online identity fraud. This paper provides a comprehensive explanation of online identity theft, the various approaches that thieves use to attack individuals and organizations and the types of fraud involved in this cyber-crime. The aim of this research is to evaluate the need for a reformulation of the concept of identity theft in order to be compatible with the evolution of behaviors and fraud.


Author(s):  
Prof. Simranpreet Kaur

Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 65-72
Author(s):  
Dr.T. Ambika ◽  
Dr.K. Senthilvel

The computer and network are utilized each and every aspect of humans wherein the internet gives equal opportunities for every aspect of human development. As the client of the internet becomes progressively differing and the scope of online communication extends, there is development in the digital violations for example break of online agreements, execution of online torts and violations, and so forth. The development of computer technology has many times proved that individuals and some groups in the country are using computer technology to threaten international governments and citizens of a country. This research paper clarifies the different types of cyber crime descriptively and particularly analyze cyber crimes against the state.


Author(s):  
Konstantin S. Sharov

The paper is concerned with a study of the changing content and style of non-canonical Christian religious preaching in the digital age. Special attention is paid to the analysis of modern rhetoric Christian preachers practice in their Internet channels, forums and blogs. It is shown that the content of the Internet sermon is largely determined by the Internet users themselves and the topics of their appeals. The fundamental characteristics of the content of the Internet sermon are: 1) focus on the individual, their private goals and objectives, not just on theological problems; 2) rethinking the phenomenon of the neighbour; 3) a shift from the Hesychast tradition of preaching the importance of inner spiritual concentration to the preaching of religious interactivity. The observed stylistic features of the digital preaching can be summarised as follows: 1) moving away from simple answers to the rhetoric of new questions addressed to the audience; 2) empathy, co-participation with a person in his/her life conflicts and experiences; 3) desire to share religious information, not to impose it; 4) resorting to various rhetorical techniques to reach different audiences; 5) a tendency to use slang, sometimes even irrespective of the audience’s language preferences and expectations. It should be pointed out that the Orthodox Internet sermon in the Russian Internet space has a dual and contradictory nature. On the one hand, this phenomenon can be regarded as positive for the Orthodox preaching in general, since it is a means of spreading Christian ideas in the social groups that do not constitute a core of parishioners of Orthodox churches, for example, schoolchildren, students, representatives of technical professions, etc. On the other hand, the effectiveness of such preaching is still unclear. Lack of reliable statistics as well as the results of the survey related to the Orthodox Internet preaching gives us no opportunity to judge about effectiveness or ineffectiveness of the phenomenon at this stage of its development.


Author(s):  
Bill Ag. Drougas

Internet today is one of the most useful tools for information, education and business or entertainment. It is one of the modern technology tools giving us many applications world wide in various fields. One of the most important applications of the Internet is the e-commerce for quality health and medical products. There are an enormous number of Web sites offering health products with the method of E-commerce but still there are many problems with the quality of these products. To the other side many individuals are not able to choice and to know about the quality of these health products that offered today on line with the Internet companies. There are many serious proposals today in to the direction of the quality of the products in health. In this paper summarized many informations about the on line commerce for health products, some of the most popular products and the methodology to train individuals in to the direction to buy and choose quality products. In this paper also presented and analyzed the characteristics and criteria of one serious Internet health company and its Web site. Also how the different scientific organizations can help people and the electronic health commerce to be more effective in to various fields in the division of the popular health. This will be more effective after training and giving criteria and or educating Internet users for a serious choice in to their on line commerce with the E-Health Commerce Web Organizations.


2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 


Sign in / Sign up

Export Citation Format

Share Document