Cyber Security Crime and Punishment

Author(s):  
Evon Abu-Taieh ◽  
Auhood Alfaries ◽  
Shaha Al-Otaibi ◽  
Ghadah Aldehim

Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.

2019 ◽  
pp. 126-140
Author(s):  
Evon Abu-Taieh ◽  
Auhood Alfaries ◽  
Shaha Al-Otaibi ◽  
Ghadah Aldehim

Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.


2019 ◽  
pp. 1369-1383
Author(s):  
Evon Abu-Taieh ◽  
Auhood Alfaries ◽  
Shaha Al-Otaibi ◽  
Ghadah Aldehim

Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.


2018 ◽  
Vol 8 (3) ◽  
pp. 46-59 ◽  
Author(s):  
Evon Abu-Taieh ◽  
Auhood Alfaries ◽  
Shaha Al-Otaibi ◽  
Ghadah Aldehim

Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.


Author(s):  
Keyurbhai Arvindbhai Jani ◽  
Nirbhay Chaubey

The Internet of Things (IoT) connects different IoT smart objects around people to make their life easier by connecting them with the internet, which leads IoT environments vulnerable to many attacks. This chapter has few main objectives: to understand basics of IoT; different types of attacks possible in IoT; and prevention steps to secure IoT environment at some extent. Therefore, this chapter is mainly divided into three parts. In first part discusses IoT devices and application of it; the second part is about cyber-attacks possible on IoT environments; and in the third part is discussed prevention and recommendation steps to avoid damage from different attacks.


Author(s):  
Brij B. Gupta ◽  
Amrita Dahiya ◽  
Chivesh Upneja ◽  
Aditi Garg ◽  
Ruby Choudhary

DDoS attack always takes advantage of structure of Internet and imbalance of resources between defender and attacker. DDoS attacks are driven by factors like interdependency of Internet's security, limited resources, fewer incentives for home users and local ISPs, flexibility of handlers to control multiple compromised systems at the same time, untraceable nature of malicious packets and unfair distribution of resources all over the Internet. This survey chapter gives a comprehensive view on DDoS attacks and its defense mechanisms. Defense mechanisms are categorized according to the deployment position and nature of defense. Comprehensive study of DDoS attacks will definitely help researchers to understand the important issues related to cyber security.


2016 ◽  
Vol 01 (01) ◽  
pp. 1650002 ◽  
Author(s):  
Zuopeng Justin Zhang ◽  
Zhen Zeng ◽  
Li Zhang

Few studies have investigated the emerging category of Pro-Ams and its impact on knowledge markets over the Internet. We tend to address this gap in our study. Our research proposes a formal framework of knowledge expertise with mass amateurization and analyzes its impact on Internet-based knowledge markets. Specifically, the new definition of knowledge expertise consists of three major components: primary, searching, and learning expertise. Due to the effect of mass amateurization, questions posted by knowledge seekers on Internet-based knowledge markets are more likely to be answered by knowledge providers, resulting in more knowledge transactions to be consummated. This paper also discusses the impact of mass amateurization on different types of Internet-based knowledge markets. This research provides valuable insights for practitioners to manage knowledge markets with effective policies.


2020 ◽  
Vol 11 (87) ◽  
Author(s):  
Kateryna Havryliuk ◽  
◽  
Mariia Rudkiska ◽  

In this article the special attention is paid to the publishing business. The shortage of funding for the advertising campaign for publications actualizes the search for different ways how to promote products. The data indicate that the Internet publications and electronic books become more successful and the sales of tra-ditional printed books are down. The publishers and advertisers should begin to use modern marketing instruments and new advertisement types for hold on a target au-dience's attention on goods. Because the advertising is the main element of the mar-keting system which can broadcasts briefly information about the product to the po-tential consumers. That is why this article is relevant. The present article analyzes different types of advertisement that can be used in the publishing houses with vari-ous amount of funding. There are surplus and deficit budgets. It means that for the second kind of budget is necessary to determine a set of precise promoting options. Many recent scientist’s studies have focused on the goals and definition of adver-tisement in general, but this article is investigating a few contemporary methods for promoting books: blogger’s advertising, merchandise, sponsorship, websites and Google Ads. Based on the practical experience of Ukrainian publishers these methods have been described. The authors questioned group of people and received the result. In the consumer’s opinion, the blogger's advertising is the most priority and useful type of all. It is recommended to use Internet for promoting because it has not border and can be advantageous. For monitoring results of the calculation, the second place belongs to merchandise. In the article also has been provided a summary table with advice about the expediency of application different advertisement types, advice how publishers with different funding can choose the most effective type of advertisement for their business and how to use it in their marketing campaign. Each type also has the recommendations for publishing owners how to optimize all costs. This article contains the research of the different advertisement types and suggestion how to use it in publishing houses.


SPIEL ◽  
2019 ◽  
Vol 4 (1) ◽  
pp. 95-119
Author(s):  
Kathrin Fahlenbrach

The Internet has become a central place for protest communication: the organization of protest actions, the networking of potential activists, the dissemination of information, the calling for participation in protest actions, and the mobilization of support for protest concerns. All these and other practices have migrated from the analog to the digital sphere of publicity on the Internet. Thus the forms and strategies of public protest and activism have also changed and expanded. The article traces the special conditions of protest mobilization on the Internet. Against this background it examines different types of activist online videos with their specific audiovisual rhetorical strategies.


1986 ◽  
Vol 18 (4-5) ◽  
pp. 15-26 ◽  
Author(s):  
D. A. Segar ◽  
E. Stamman

Most historical marine pollution monitoring has proven useless in a management context. A strategy for development of effective marine pollution monitoring programs is outlined. This strategy is based on the following steps: 1) systematic evaluation of the management information needs, 2) identification of the hypothetical impacts associated with those management concerns, and 3) investigation of the feasibility of monitoring those effects such that the existence, or absence, of a specified level of effects can be established in a statistically-valid manner. There are two fundamentally different types of monitoring program: site-specific and regional. These two types of program differ markedly in scope and approach when designed through application of this strategy. The strategy requires development of null hypotheses which address management concerns and which are amenable to scientific testing. In order for the program to be successful, the null hypotheses selected for inclusion in a marine pollution monitoring program must address levels of effect which are predefined to be environmentally significant. The definition of environmentally significant effect levels is a difficult process which must be primarily the responsibility of the managerial community.


Author(s):  
Dan Jerker B. Svantesson

This chapter takes us into the domain of legal theory and legal philosophy as it places the questions of Internet jurisdiction in a broader theoretical, and indeed philosophical, context. Indeed, it goes as far as to (1) present a definition of what is law, (2) discuss what are the law’s tools, and (3) to describe the roles of law. In addition, it provides distinctions important for how we understand the role of jurisdictional rules both in private international law and in public international law as traditionally defined. Furthermore, it adds law reform tools by introducing and discussing the concept of ‘market sovereignty’ based on ‘market destroying measures’––an important concept for solving the Internet jurisdiction puzzle.


Sign in / Sign up

Export Citation Format

Share Document