scholarly journals Cyber crime as a security risk on the internet

2021 ◽  
Vol 18 (2) ◽  
pp. 257-266
Author(s):  
Vićentije Darijević

The development of the Internet affects human society in two ways: it enables society to progress and endangers security.Online access platforms facilitate business, education and contacts.On the other hand, individuals who access virtual platforms expose their privacy and their assets to the risk of cyber attacks.Unfortunately, one gets the impression that legislation cannot keep pace with technological advances so that many crimes committed on the internet remain unsanctioned. This paper points out the characteristics of cybercrime, gives an overview of international documents aimed at establishing cyber security.A list of domestic legislative regulations by which the Republic of Serbia seeks to solve the problems caused by cybercrime is also given.It also points out the characteristics of this type of crime that directly affect the impossibility of global regulation and protection of Internet users.

The internet helps us in providing information as well as storing all our data, with the rapid increase in our modern technology; it has become very difficult to keep our private information safe. The Internet has also bred a new kind of crime CYBER-CRIME. The other name for Cyber crimes are "Internet Games" and "yahoo yahoo". Common internet users are unaware of Cyber crimes like hacking, identity theft, Credit/debit card frauds, cyber terrorism and many more crimes. This paper attempts to draw out the awareness level of students about cyber crime.


Author(s):  
Konstantin S. Sharov

The paper is concerned with a study of the changing content and style of non-canonical Christian religious preaching in the digital age. Special attention is paid to the analysis of modern rhetoric Christian preachers practice in their Internet channels, forums and blogs. It is shown that the content of the Internet sermon is largely determined by the Internet users themselves and the topics of their appeals. The fundamental characteristics of the content of the Internet sermon are: 1) focus on the individual, their private goals and objectives, not just on theological problems; 2) rethinking the phenomenon of the neighbour; 3) a shift from the Hesychast tradition of preaching the importance of inner spiritual concentration to the preaching of religious interactivity. The observed stylistic features of the digital preaching can be summarised as follows: 1) moving away from simple answers to the rhetoric of new questions addressed to the audience; 2) empathy, co-participation with a person in his/her life conflicts and experiences; 3) desire to share religious information, not to impose it; 4) resorting to various rhetorical techniques to reach different audiences; 5) a tendency to use slang, sometimes even irrespective of the audience’s language preferences and expectations. It should be pointed out that the Orthodox Internet sermon in the Russian Internet space has a dual and contradictory nature. On the one hand, this phenomenon can be regarded as positive for the Orthodox preaching in general, since it is a means of spreading Christian ideas in the social groups that do not constitute a core of parishioners of Orthodox churches, for example, schoolchildren, students, representatives of technical professions, etc. On the other hand, the effectiveness of such preaching is still unclear. Lack of reliable statistics as well as the results of the survey related to the Orthodox Internet preaching gives us no opportunity to judge about effectiveness or ineffectiveness of the phenomenon at this stage of its development.


2020 ◽  
Vol 15 (47) ◽  
pp. 5-34
Author(s):  
Marta Mitrović

The paper examines the views of Internet users concerning the protection of their rights on the Internet. The Web survey, conducted by the snowball sampling, included 783 Internet users who expressed their views regarding the ways the state (Serbia) and private agents (Facebook and Google) relate to the right of freedom of expression and privacy on the Internet. Also, the survey was used to examine the individual responsibility of users when it comes to the use of Internet services. Several hypotheses suggested that Internet users in Serbia do not have confidence in the country and private actors on the issue of protecting their rights. However, users also do not demonstrate a satisfactory level of individual responsibility. The most important findings indicate that: 1) only one-sixth of the respondents consider that the Government of the Republic of Serbia does not violate the privacy of Internet users; 2) almost half of the respondents do not feel free to express their views criticizing the government; 3) almost 90% of users are not satisfied how Facebook protects their privacy, while it is 1% lower in the case of Google; 4) a third of respondents answered positively to the question whether they had read terms of use of the analyzed companies, but half of them did not give a correct answer to the main questions; 5) only 8.9% of respondents who claimed to have read terms of use are aware of the fact that Facebook shares their data with third parties.


2020 ◽  
Vol 1 (2) ◽  
pp. 75-85
Author(s):  
Irma Amelia Dewi ◽  
Lisye Fitria ◽  
Arie Desrianty ◽  
Alif Ulfa Afifah ◽  
M. Faishal Dzaky

Nowadays, the benefits of using the internet can be felt in society or even in the industrial world, either for business or just for entertainment purposes. Until 2017, Indonesia is one of the countries with the highest internet users globally, with around 112,6 million internet users. On the other hand, many small businesses have not used the internet to advertise their products. This project's main objective is to design and develop a company profile website of CV Rian as one of the brick micro-industry in Nagrek, West Java, enabling people to search and access information easily and quickly. This project uses Waterfall Model as Sofware Development Life Cycle (SDLC), MySQL as the database, and PHP for server-side scripting. The database is used for storing posts, admin data, and images. 


2016 ◽  
Vol 2 (1) ◽  
pp. 86
Author(s):  
Aihua Wen

Internet users have given two existing phrases in Chinese, “Jiang Zhen” and “Lao Siji” new second definitions. “Jiang Zhen” which exists in some southern Chinese dialects is gradually becoming a new Mandarin phrase. The phrase’s meaning is being transformed and this new meaning is being used by Chinese netizens. This new and transformed meaning has spread quickly throughout the internet. On the other hand, “Lao Siji” now has several new meanings and has become more popular in online and real life conversations. From the three dimensions of language namely semantics, syntax and pragmatics, the two new phrases have their intrinsic connotations. Currently, different sections of the public hold different attitudes to these two new phrases, so their vitality is still waiting for the test of time.


Scientax ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 184-202
Author(s):  
Rinaningsih

Tax revenues paid by taxpayers are the main source of state revenue at this time. Individual and corporate taxpayers owed tax in Indonesia are spread throughout the territory of Indonesia. However based on the data, the tax ratio of each province is vary. Therefore, in this paper we will discuss whether the existing tax regulations are in accordance with the existing conditions.This study uses a qualitative descriptive method. Based on the research, due to the principle "can be implemented" in the Law of the Republic of Indonesia Number 12 of 2011, several current tax regulations have been formulated without considering existing conditions namely   the geographical conditions of various tax offices’s work areas, the uneven availability of the internet in each region along with the unsupported behavior of internet users for electronic services,  and  unavailability of the postal services in some villages.  Those make taxation regulations difficult to be implemented in all regions of Indonesia  and do not support the optimum collection of taxes in all regions of Indonesia. The aim of the research is to provide recommendations to the DGT to improve the tax regulations to a better level.


2000 ◽  
Vol 77 (1) ◽  
pp. 71-79 ◽  
Author(s):  
Guido H. Stempel ◽  
Thomas Hargrove ◽  
Joseph P. Bernt

This national survey of media useshows a huge gain for Internet use in the last four years and decline for both local and network television news and for newspapers. Comparison of those who use the Internet and those who do not shows that Internet users are more likely than non-users to be newspaper readers and radio news listeners. For both local and network television news viewing, there is no significant difference between users and non-users of the Internet. Clearly, the Internet is not the cause of the decline in use of the other media.


Author(s):  
Natanael Christianto ◽  
Wiwin Sulistyo

Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.


Author(s):  
Alexandru Tarna ◽  

The protection of fundamental rights has become an axiom that no longer requires the luxury of argumentation. From another point of view, the protection of human rights on the Internet is only emerging. This is all the more so, as the internet plays an important role in people’s daily lives and in all aspects of human society. The impact of the Internet on social, economic and cultural activity is also growing. The scientific research will be devoted to the following aspects related to meetings and participations in the digital space in the Republic of Moldova: (1) freedom to choose web pages, applications or other services for setting up, joining, mobilizing and participating in groups and social assemblies; (2) the right to peaceful online protest; (3) freedom to use available online tools to participate in local, national and global public policy debates, legislative initiatives and public elections.


2019 ◽  
pp. 28-35
Author(s):  
Héctor David Ramírez-Hernández ◽  
Roberto Contreras-Juárez ◽  
Nelva Betzabel Espinoza-Hernández ◽  
Eduardo Sánchez-Mendoza

Cryptography incorporates the techniques with which it seeks to guarantee protection of information, in front of unauthorized persons. This way of protecting information has existed since ancient times, where there were elements that only certain people were able to understand and interpret. In the beginning, cryptography was used for the purposes of war and power, but thanks to the great technological advances developed at the end of the last century, we have seen the need to safeguard the information that everyone manages and shares through the internet. That is why cryptography takes on greater importance. Current cryptography is based on two types of protocols, one of symmetric cryptography and the other corresponding to asymmetric cryptography. In this paper, an asymmetric type protocol based on elliptic curves on the finite field GF(p) was analyzed, proposing a library developed in PHP that allows to encrypt and decrypt information, which aims to provide security services, authentication, integrity and confidentiality of the information.


Sign in / Sign up

Export Citation Format

Share Document