Open Access Open Access  Restricted Access Subscription or Fee Access

Cyber Crime: Description and Differentiation

Osman Goni

Abstract


We are living in the Modern Era. Our lives are made easier and more comfortable in the modern world. The modern world has given rise to a wide range of crime. One of them is cybercrime. Cybercrime is an all-too-common occurrence around the world. People engage in cyber crime by disrupting networks, stealing others' valuable and private data, documents, hacking bank details and accounts, and moving money to their own accounts. As the computer has become fundamental to commerce, entertainment, and government, cyber crime, particularly through the Internet, has grown in prominence. Cyber crime is defined as the use of a computer for criminal reasons such as fraud, trafficking in child pornography and intellectual property, stealing identities, or invading privacy. Cybercrime has its ramifications on society in the form of economic disruption, psychological dysfunction, and a threat to national security, among other things. Cyber-crime restriction is contingent on a thorough examination of their behaviour and an awareness of their ramifications at all levels of society. Cybercrime is becoming more prevalent by the day. People have suffered severely as a result of it. It not only causes human pain, but it also has an impact on it. As a result, cybercrime is one of the most common crimes committed by computer experts.


Full Text:

PDF

References


P. R.K.Chaubey, "An Introduction to Cyber Crime and Cyber law," in An Introduction to Cyber Crime and Cyber law, Kamal Law House, 2012.

S. D. a. T. Nayak, "IMPACT OF CYBER CRIME: ISSUES AND CHALLENGES," vol. 6, no. 2, October 2013.

Y. S. R. T. Hemraj Saini, "Cyber-Crimes and their Impacts: A Review," vol. 2, no. 2, 2012.

K. A. I. T. T. J. S. R. A. H. I. H. C. Shusmoy Kundu1, "Cyber Crime Trend in Bangladesh, an Analysis and Ways Out to Combat the Threat," Dhaka-1216, Bangladesh, 2018.

January 2016. [Online]. Available: http://www.ripublication.com/irph/ijict_spl/ijictv4n3spl_06.pdf. [Accessed 4 January 2016].

January 2016. [Online]. Available: http://www.oxforddictionaries.com/definition/english/cybercrime. [Accessed 4 January 2016].

January 2016. [Online]. Available: www.naavi.org/pati/pati_cybercrimes_dec03.htm. [Accessed 4 January 2016].

January 2016. [Online]. Available: http://cybercrime.org.za/definition. [Accessed 4 January 2016].

January 2012. [Online]. Available: http://www.imdb.com/title/tt0373414/. [Accessed 28 January 2012].

V. D. Virus Glossary (2006), 28 January 2012. [Online]. Available: http://www.virtualpune.com/citizen-centre/html/cyber_crime_glossary.shtml. [Accessed 28 January 2012].

C. O. a. a. a. o. A. Legal Info (2009), 28 January 2012. [Online]. Available: http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory. html. [Accessed 28 January 2012].

N. I. Shantosh Rout (2008), 28 January 2012. [Online]. Available: http://www.santoshraut.com/ forensic/ cybercrime.htm. [Accessed 28 January 2012].

By Jessica Stanicon (2009), 28 January 2012. [Online]. Available: http://www.dynamicbusiness.com/articles/articles-news/one-in-five-victims-of-cybercrime3907.html. [Accessed 28 January 2012].

A. Aman Gupta, "Ethical Hacking and Hacking Attacks," International Journal Of Engineering And Computer Science, vol. 6, no. 4, pp. 21042-21050, 4 April 2017.

Y. P. Palash Sandip Dusane1, "Logic Bomb: An Insider Attack," International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 3, pp. 3662-3665, May - June 2020.

H. S. Obaid, "Denial of Service Attacks: Tools and Categories," International Journal of Engineering Research & Technology (IJERT), vol. 9, no. 03, pp. 631-636, March-2020.

M. L. Pittaro1, "Cyber stalking: An Analysis of Online Harassment and Intimidation," International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License, vol. 1, no. 2, p. 180–197, 2007.

N. P. S. K. S. S. P. A. P. Nabha Kshirsagar1, "Credit Card Fraud Detection System using Hidden Markov Model and Adaptive Communal Detection," (IJCSIT) International Journal of Computer Science and Information Technologies, vol. 6, no. 2, pp. 1795-1797, 2015.

M. A. A. B. S. M. M. J. A.-A. Asalah F Altwairqi, "Four Most Famous Cyber Attacks for Financial Gains," International Journal of Engineering and Advanced Technology (IJEAT), vol. 9, no. 2, pp. 2131-2139, December, 2019.

M. S.-T. (PhD, "Software Piracy: Some Issues," in Columbus State University, University Ave, Columbus, 4225 University Ave, Columbus, GA, 31907, October 2013.

K. C. Vadza, "Cyber Crime & its Categories," vol. 3, no. 5, 2013.

D. M. Joshi, "CYBER PORNOGRAPHY: AN INTERDISCIPLINARY STUDY OF TECHNOLOGY LED CRIME AGAINST WOMEN AND CHILDREN.," International Journal of Creative Research Thoughts (IJCRT), vol. 9, no. 12, pp. b297-b301, 2021.

E. a. P. Cyber Crime: Rise, 1 July 2020. [Online]. Available: https://www.researchgate.net/publication/344349620. [Accessed 1 July 2020].

P. a. 2. Rajan, "A Critical Study on Cyber Defamation and Liability of ISPS," International Journal of Pure and Applied Mathematics, vol. 119, no. 17, pp. 1717-1726, December 2018.

P. Mark Griffiths, "Internet Gambling," in IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited., Nottingham Trent University, UK, 2008.

n. p. Brigadier General Md. Khurshid Alam, "CYBERCRIME IN BANGLADESH: IMPLICATIONS AND RESPONSE STRATEGY".




DOI: https://doi.org/10.37628/ijtet.v7i2.1610

Refbacks

  • There are currently no refbacks.