internet crime
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 10)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Preetha S ◽  
P. Lalasa ◽  
Pradeepa R

In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions.


Author(s):  
D.V. Zhmurov ◽  

The article presents an analysis of the cybervictimization phenomenon. The author justifies the use of an integrative (interdisciplinary) approach to the study of this problem, proposes the definition of the term under study as a process or end result of becoming a crime victim in the sphere of unified computer networks. A theoretical and methodological matrix for the analysis of cybervictimization (PCPPE model) was developed. The model includes five system characteristics of cybervictimization, the comprehensive study of which to a maximum extent will simplify the understanding of the essence of the object of study. These characteristics include: profiling, conditionality, prevalence, predictability and epidemicity. Each of these aspects is explained in detail: the author developed a detailed nomenclature of cybervictimization forms. The problems of identifying its extent, as well as the determinant role of gender, age, behavioral and personal factors are discussed in the article, and a list of key cybervictimization acts is formulated. This meta-analysis includes thirteen global categories and about seventy of its accent forms. Among the global categories the following ones are identified: threats, harassment, illegal interest, infringement, insult, spoofing, disclosure, compulsion, seizure, infecting, access and use. The prevalence rates of cybervictimization on the example of the United States (Internet Crime Report) are also studied, certain aspects of the methodology of cyber victim number counting are considered.


Author(s):  
Shamil Khasanovich Gonov ◽  
Anton Vladimirovich Milovanov

The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mechanisms of crimes using information systems, and the technologies of information safety provision and deanonymization. The main task of the research is to develop the scientifically-grounded ideas aimed at the enhancement of the technique of analysis and assessment of crimes committed via information and telecommunication systems. The scientific novelty of the research consists in the fact that the authors systematize, generalize and analyze the standard mechanisms of committing crimes using information technologies. Based on this analysis, the authors formulate suggestions and recommendations. The article considers the main methods and mechanisms of information safety provision (anonymity on the Internet, and some promising technologies of deanonymization which can be used in the process of crime detection and investigation. The authors formulate a basic model of an offender which can be used for a primary profiling of a criminal. They also formulate an approach to the assessment of his potential which takes into account the peculiarities of using computer equipment in criminal activities in information and telecommunication networks.   


2020 ◽  
pp. 3387-3396
Author(s):  
Sakinat Oluwabukonla Folorunso ◽  
Femi Emmanuel Ayo ◽  
Khadijah-Kuburah Adebisi Abdullah ◽  
Peter Ibikunle Ogunyinka

Phishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency.  This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing website dataset suggest that the ensemble model significantly outperformed the hybrid model in terms of the measures used. Finally, DTree and STACKING methods showed superior performances compared to the other models.


2020 ◽  
Vol 3 (1) ◽  
pp. 185-195
Author(s):  
Ibrahim Abdulai Sawaneh

The internet hosts all online activities either for public or private usage. It is a powerful online podium where people socialize, make new friends, conduct academic research, perform online business transactions, share sensitive data, communication over the internet, surveillance purpose by security agencies, monitor climatic condition, used in e-healthcare system, online banking, online pay, e-commerce, defense system, and host of others critical infrastructures are the new order of the day. This has attracted online criminals to diverse numerous malicious techniques to invade people’s privacy and also exploit those data. A new game has resulted in these online malicious activities are known as “cybercrime or internet crime” which is a rewarding business as of today. Therefore, it has become difficult to protect those online activities as cybercrimes are growing daily, which suggests that effective and appropriate countermeasures are needed to combat those threats and make online activities more secure. The research paper presents the various types of cybercrime activities, countermeasures, and suggestions for online users.


The emergence of ICT has provided an unrivalled opportunity for women to exploit their capabilities to improve their quality of life as well as to contribute to the welfare of the society. Internet has also become a social and communication tool with e-mails being an efficient communication tool. Internet offers new possibilities for networking and participative democracy but feminists are failing to challenge the use of the Internet for furthering more dangerous and discriminatory agendas, including Internet crime committed against women and the proliferation of pornography. Many youth are engaging socially through common social network like WhatsApp, Facebook, twitter, msn, my space and are actually addicted to these Internet social activities, making them vulnerable to Internet crimes. The increased dependency of individual / organisations on cyberspace has led to the increase in the cybercrimes. In India we find there is minimal proper training and education regarding such developments and the ignorance towards these advancements has paved way for cybercrimes. Even the authorities and officers who handle such cases have no proper training and the essential expertise for undertaking cybercrimes against women and girls in particular. India should consider adopting a coactive approach wherein technology and proper legislative framework combine to fight the cybercrime in the society. The threatening atmosphere created by such heinous cybercrimes against women and girls need radical change in technology, behaviour and legal affairs; facilitated by proper education and training. This study examines the problems and issues of cybercrime against women and girls in order to exhibit preventive strategies and means to fight back with the support of cohesive forces.


2019 ◽  
Vol 8 (2) ◽  
pp. 179-198
Author(s):  
Firda Laily Mufid ◽  
Tioma Roniuli Hariandja

The presence of the internet can make it easier for humans to obtain, process and present information so that humans are very smooth in carrying out their affairs at the national and international levels, for example in terms of education, culture, kinship, technology, art, commerce, banking, and government. One of the crimes that can be placed on line is the dissemination of false news (hoaxes). Hoax aims to create public opinion, lead opinion, form perceptions, also to have fun that tests the intelligence and accuracy of internet and social media users. . The Hoax case occurred and the spread was so rapid because of the people who easily believed. So that the dissemination of information easier to spread good word of mouth that spread through the media oline like whatsapp and facebook. And one of the villages that will be studied by the researchers is Desa Sanenrejo, Kecamatan Tempurejo, Jember.Keywords: internet, internet crime, hoax


2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db


Sign in / Sign up

Export Citation Format

Share Document