Cybercrime, Cybersecurity, and Financial Institutions Worldwide

Author(s):  
Pauline C. Reich

While the benefits of the Internet and other forms of computer networks are streamlining financial institutions, the same institutions are often among the first institutions to be affected by Cybercrime and Cybersecurity issues due to the financial incentives as well as their strategic place in each nation’s infrastructure and economy. We must look not only at the efficiency, but also at the negative aspects of the use of technology by financial institutions. Consumers as well as business must be well informed about conducting transactions in the safest manner possible. The nature of the Internet is cross-border, and thus Cybercrime and Internet Security issues involving financial institutions should be made known by international organizations, regional organizations and when there have been cross-border law enforcement collaborations in investigations, extraditions, etc. At present, due to the fact that law is generally written at the national (or even state level, as is the case of Identity Theft law in the US), there is a need for reporting of cross-border cases in the literature if such data can be obtained from law enforcement officials by scholars.

Author(s):  
Balkis Hamdane ◽  
Sihem Guemara El Fatmi

The internet was initially proposed to interconnect a few trusted hosts. However, its continued success has caused many security problems. New internet services, such as e-government, must address these security issues. A host-centric security model tied to information location and based on various partial corrections has been proposed. However, this model hasn't brought radical solutions and has largely contributed to architecture ossification. In this context, the idea of a clean slate approach, satisfying the new requirements and without any compatibility obligation, has emerged. The information-centric networking approach represents one of these architectures. Its main idea is to consider the named information as the central element rather than the IP addresses. To ensure security requirements, it adopts an information-centric security. This chapter is a survey on security in the ICN, satisfying the internet security requirements in general and particularly e-government services.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


2003 ◽  
Vol 28 (2) ◽  
pp. 89-124
Author(s):  
Golaka C. Nath ◽  
Y. V. Reddy

Traditionally Indian banking system provided the much-needed financial support to industry and commerce. Till the onset of financial sector reforms in early 1990s the Indian industry depended heavily on banks and development financial institutions for their working capital and long-term projects respectively. Capital was scarce and hence, needed rationing to areas and sectors where the government wanted and prioritized. The existence of Controller of Capital Issues was the guiding force behind investment where public support was needed. At the time of its liberation from the British in 1947 India had only the traditional commercial banks and these banks were small and owned by private companies who had other interests in business and promoted banks to channelize resources to their activities. It was no different from earlier fragmented banking system of the USA. These banks supplied shorter maturity credit for working capital needs of the industry and commerce as major infrastructure, manufacturing facilities, etc. were financed by the Government through priorities in Five Year Plans. Public sector undertakings were set up to achieve the industrial self reliance objective of the nation. The role of creating capital formation was shifted primarily to the PSUs. The banks were willing to fund basically the working capital requirements of the credit-worthy borrowers on the security of tangible assets. These PSUs were funded through budgetary support as well as support from the DFIs. Thus emerged a well-knit structure of national and state level development financial institutions (DFIs) for meeting requirements of medium and long-term finance of all range of industrial units, from the smallest to the very large ones. Government as well as Reserve Bank of India nurtured DFIs through various types of financial incentives and other supportive measures.


2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.


2012 ◽  
Vol 3 (1) ◽  
pp. 26-41 ◽  
Author(s):  
Beth Knobel ◽  
Jonathan Sanders

This paper examines the case of Russian Police Major Aleksei Dymovsky, who took the unprecedented step of posting a video on the Internet in 2009 in which he exposed the corrupt practices of Russian law enforcement officials. When the video went “viral,” Dymovsky set off a national debate about corruption, but was quickly crushed by the authorities for whistleblowing. This paper uses the example of the Dymovsky affair to examine the power of streaming video as a political tool in Russia. It also examines the difference between the underground literature of the Soviet-era, samizdat, and the new-style video samizdat of the Internet era. The case of Dymovsky allows the power of the Internet in contemporary Russia to be examined and provides an opportunity to test current theories about the power of the Internet as an organizing force.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Rechtsidee ◽  
2015 ◽  
Vol 2 (2) ◽  
pp. 157
Author(s):  
Sri Ayu Astuti

Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015). Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2), 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82


2021 ◽  
Vol 5 (S4) ◽  
pp. 858-869
Author(s):  
Yevgen V. Kotukh ◽  
Denis V. Kislov ◽  
Tykhon S. Yarovoi ◽  
Ruslana O. Kotsiuba ◽  
Oleksandr H. Bondarenko

Unlike traditional types of crime, such as murder or theft, that have a long history, cybercrime is a relatively young phenomenon and a new one that emerged with the advent of the Internet. It should be noted that the very nature of the Internet is quite favourable for committing crimes. Its properties such as globality, cross-border nature, the anonymity of users, wide audience coverage, distribution of main network nodes, and their interchangeability create advantages for cybercriminals who use the Internet at all stages of crime and also allow them to effectively hide from law enforcement agencies. An important aspect of cybercrime that contributes to its spread and hinders the fight against it is the subculture of cybercriminals. This subculture needs to be given special attention, so this issue is discussed in detail in the article. Therefore, the purpose of the article was to analyse cybercrime as one of the youngest types of crime in the modern world. The history of the emergence of cybercrime and cyber-security was considered, the types of cybercrime were characterized, and the functions of cybercrime were analysed. 


Sign in / Sign up

Export Citation Format

Share Document