Academic literature on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"

1

Kaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.

Full text
Abstract:
Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.
APA, Harvard, Vancouver, ISO, and other styles
2

Blank, Grant. "The Digital Divide Among Twitter Users and Its Implications for Social Research." Social Science Computer Review 35, no. 6 (October 12, 2016): 679–97. http://dx.doi.org/10.1177/0894439316671698.

Full text
Abstract:
Hundreds of papers have been published using Twitter data, but few previous papers report the digital divide among Twitter users. British Twitter users are younger, wealthier, and better educated than other Internet users, who in turn are younger, wealthier, and better educated than the off-line British population. American Twitter users are also younger and wealthier than the rest of the population, but they are not better educated. Twitter users are disproportionately members of elites in both countries. Twitter users also differ from other groups in their online activities and their attitudes. These biases and differences have important implications for research based on Twitter data. The unrepresentative characteristics of Twitter users suggest that Twitter data are not suitable for research where representativeness is important, such as forecasting elections or gaining insight into attitudes, sentiments, or activities of large populations. In general, Twitter data seem to be more suitable for corporate use than for social science research.
APA, Harvard, Vancouver, ISO, and other styles
3

Tennakoon, Hemamali, George Saridakis, and Anne-Marie Mohammed. "Child online safety and parental intervention: a study of Sri Lankan internet users." Information Technology & People 31, no. 3 (June 4, 2018): 770–90. http://dx.doi.org/10.1108/itp-09-2016-0213.

Full text
Abstract:
PurposeToday’s world of digital and mobile media does not require actual physical contact, between the suitable target and the motivated offender, as with traditional crime. In fact, as Mesch (2009) contended that the internet is not merely an information channel but it creates a new space of activities for children, where they are exposed to motivated offenders and the actors of fourth party. Therefore, for the sake of children’s safety, the practice of parental mediation control is increasingly becoming more pertinent everyday. Thus, the purpose of this paper is to examine how parental mediation control in Sri Lanka is influenced by their internet self-efficacy, their experience as online victims and their trust in online users.Design/methodology/approachThis paper uses a unique data set of computer and internet users from Sir Lanka to examine parental intervention in their children’s online activities. Specifically, the data set contains 347 responses from computer and internet users. To analyze the data, the authors use a binary dependent (probit) model.FindingsThe results show that such factors alter the baseline probability of parental intervention. However, some differences are found between younger and older parents, with the latter group responding more to trust in online users and victimization experience while the former is mainly driven from computer self-efficacy. In particular, the older group is less likely to trust online internet users in terms of never adding unknown persons in the social media. Finally, being self-employed and an older parent has a positive effect on the likelihood of adopting parental controls, possibly because of the non-pecuniary attributes of self-employment.Originality/valueThis study adds to the emerging parental mediation control literature by looking at the likelihood of younger and older parents who were victims of cybercrimes, who have greater internet self-efficacy and lower online third-party trust to adopt parental mediation control behaviors. Also another contribution to the literature is the role of occupation type on parental monitoring behaviors.
APA, Harvard, Vancouver, ISO, and other styles
4

Kirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (December 30, 2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.

Full text
Abstract:
Crimes that happen in the virtual environment created by digital technologies inflict considerable economic damage. Mercenary motives of criminals in the information society are giving rise to increasingly more and more sophisticated methods of abusing the trust of computer networks’ users. The harmonization of Russian legislation on counteracting cybercrimes with the legal standards of the Council of Europe is inevitable due to the trans-border character of crimes committed using information and telecommunication technologies, and to their high public danger. The methodology of researching cybercrime is based on the comparative analysis of Russian law enforcement practice on crimes in the sphere of computer information and the most progressive practices of counteracting cybercrime in the member states of the Council of Europe. The methods of inclusive observation and discursive analysis make it possible to identify latent delicts in contemporary information space. The analysis of criminal legislation and the practices of criminal behavior in cyberspace are aimed at improving the measures of counteracting the violations of fundamental human rights in the process of the digitization of economy, when fraud based on the abuse of network users’ trust becomes the most typical virtual crime. Internet users are interested in reporting the facts of offences in the information space on the condition that the state protects their fundamental freedoms. The creation of closed social networks by criminal organizations and the widening technical opportunities for extortion result in the creation of universal schemes that enrich criminals, who are not only interested in reducing the state’s influence on public relations, but are also trying to establish their dominance in the economic space of information society. The effective policy of law enforcement bodies on counteracting economic crimes in the global information space requires an international consensus regarding the development of public-private partnership in identifying cybercrimes and suppressing criminal practices connected with the use of information technologies.
APA, Harvard, Vancouver, ISO, and other styles
5

Olukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (September 16, 2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.

Full text
Abstract:
AbstractInternet crime can be defined as unlawful acts using the computer as either a tool or a target or both. Internet networks are used positively to conduct businesses, manage industrial and governmental activities, engage in personal communications, and conduct research. Also, certain confidential information is stored or passed through the medium of the internet. Credit cards containing information of users are used as the major means of buying and selling on the internet. Information infrastructure has become a critical part of the backbone of global economies; therefore, it is imperative that the general public be able to rely on the availability of such informational services with confidence that their communications and data are safe from unauthorized access or modification. It then becomes important for these and other information to be more secured. However, the speed of the internet, its affordability, and its elimination of distance make the internet the hotbed of crimes globally. Cybercrime growth has skyrocketed in recent times, especially in Nigeria; hence, the need for immediate action by law makers to stem the tide. This research, therefore, examines the adequacy or otherwise of the Nigerian legal framework in checking crimes being perpetrated using the internet as a platform with a view to making useful suggestions.
APA, Harvard, Vancouver, ISO, and other styles
6

Nurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (April 10, 2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.

Full text
Abstract:
With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security
APA, Harvard, Vancouver, ISO, and other styles
7

Sekhavat, Yoones A. "Nowcasting Mobile Games Ranking Using Web Search Query Data." International Journal of Computer Games Technology 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9859813.

Full text
Abstract:
In recent years, the Internet has become embedded into the purchasing decision of consumers. The purpose of this paper is to study whether the Internet behavior of users correlates with their actual behavior in computer games market. Rather than proposing the most accurate model for computer game sales, we aim to investigate to what extent web search query data can be exploited to nowcast (contraction of “now” and “forecasting” referring to techniques used to make short-term forecasts) (predict the present status of) the ranking of mobile games in the world. Google search query data is used for this purpose, since this data can provide a real-time view on the topics of interest. Various statistical techniques are used to show the effectiveness of using web search query data to nowcast mobile games ranking.
APA, Harvard, Vancouver, ISO, and other styles
8

Soni, Soni, Afdhil Hafid, and Didik Sudyana. "ANALISIS KESADARAN MAHASISWA UMRI TERKAIT PENGGUNAAN TEKNOLOGI & MEDIA SOSIAL TERHADAP BAHAYA CYBERCRIME." JURNAL FASILKOM 9, no. 3 (November 14, 2019): 28–34. http://dx.doi.org/10.37859/jf.v9i3.1664.

Full text
Abstract:
Abstract Students are one of the many users of technology and the internet. Based on data from the Association of Indonesian Internet Service Providers, it states that as many as 100% of student respondents stated using the internet every day. So that the potential for students to become victims of cyber crime continues to increase. This is because many internet users are not careful in using it. Cyber ​​crimes that often occur include identity theft, kidnapping, online fraud, burglary and so forth. During this time many users who write their personal identity on social media, not even a few who post about the location they visit. Then many students are fond of using free wifi. Cyber​​crime will not occur if there is vigilance and caution from its users. Students should be able to realize the negative effects of cyberspace. For this reason, an analysis is needed regarding the presence of social media users. In this research, analysis of student awareness in the informatics engineering study program, computer science faculty, Muhammadiyah University of Riau to find out how much the level of student awareness about the dangers of cybercrime is based on the social media and user awareness categories. From the results of the study, it was concluded that students of the Department of Informatics had a fairly good level of awareness. This is evidenced from the average results obtained in the social media category, 83.4% of students have a fairly good awareness while the average user awareness category of 72.7%. However, the university, faculty and study programs must still provide assistance, education or outreach to those who do not have a good level of vigilance because there are still a few percent who still do not have a good level of vigilance. Keywords: cybercrime, students, awareness, social media, internet Abstrak Mahasiswa merupakan salah satu pengguna teknologi dan internet yang cukup banyak. Berdasarkan data dari Asosiasi Penyedia Jasa Internet Indonesia, menyebutkan bahwa sebanyak 100% responden dari mahasiswa menyatakan menggunakan internet setiap harinya. Sehingga potensi mahasiswa menjadi korban kejahatan siber pun terus meningkat. Hal ini disebabkan karena banyak pengguna internet yang tidak berhati-hati dalam menggunakannya. Kejahatan cyber yang sering terjadi diantaranya adalah pencurian identitas, pembulian, penipuan online, perampokan dan lain sebagainya. Selama ini banyak pengguna yang menuliskan identitas pribadinya di media social, bahkan tidak sedikit yang memposting tentang lokasi yang mereka kunjungi. Kemudian banyak mahasiswa yang gemar menggunakan wifi gratis. Kejahatan cyber tidak akan terjadi jika ada kewaspadaan dan kehati-hati dari para penggunanya. Seharusnya para mahasiswa dapat menyadari dampak negatif dari dunia maya. Untuk itu perlu dilakukan analisis terkait kesadaarn pengguna media sosial. Dalam penelitian ini, analisis kesadaran mahasiswa di program studi teknik informatika, fakultas ilmu komputer, universitas muhammadiyah riau untuk mengetahui seberapa besar tingkat kesadaran mahasiswa tentang bahaya cybercrime didasarkan pada kategori media sosial dan kesadaran pengguna. Dari hasil penelitian, disimpulkan bahwa mahasiswa Jurusan Teknik Informatika memiliki tingkat kesadaran yang cukup baik. Hal ini dibuktikan dari hasil rata-rata yang diperoleh pada kategori media sosial, 83,4% mahasiswa mempunyai kesadaran yang cukup baik sedangkan pada kategori kesadaran pengguna rata-rata sebanyak 72,7%. Namun pihak universitas, fakultas dan juga program studi tetap harus memberikan pendampingan, edukasi ataupun sosialisasi bagi yang belum memiliki tingkat kewaspadaan yang baik karena masih ada beberapa persen masih masih belum mempunyai tingkat kewaspadaan yang baik. Kata kunci: cybercrime, mahasiswa, kesadaran, media social, internet
APA, Harvard, Vancouver, ISO, and other styles
9

Putri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (October 9, 2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.

Full text
Abstract:
Advances in information technology provides much convenience for human life, but even this progress simultaneously cause a variety of problems that are not easy to find a way out. One of the problems arising from the development of information technology, namely the birth of crimes that refers to activities undertaken in the virtual world using a computer or computer network technology, known as cybercrime (cybercrime). Crime cybercrime common daily life such Decency, Gambling, humiliation or defamation, extortion or threatening, Spreading false news, Abuse, Hacker, Cracker, falsification of data, due to internet users, or lack of awareness about the Law Number 11 Year 2008 Information and Electronic Transaction applicable. Therefore, this study aims to develop an expert system using programming language PHP (Hypertext Preprocessor) and MySQL database-based web using a forward chaining method to make it easier, knowing, and assist in taking an answer or conclusion of cases and sanctions crime cyberspace (cybercrime) based on Law No. 11 of 2008 on Information and Electronic Transactions applicable.
APA, Harvard, Vancouver, ISO, and other styles
10

Hikmatulloh, Reza, and Evy Nurmiati. "Analisis Strategi Pencegahan Cybercrime Berdasarkan UU ITE Di Indonesia (Studi Kasus: Penipuan Pelanggan Gojek)." Kosmik Hukum 20, no. 2 (July 22, 2020): 121. http://dx.doi.org/10.30595/kosmikhukum.v20i2.6449.

Full text
Abstract:
Cybercrime can be defined as illegal activities with computer intermediaries that can be carried out through global electronic networks. In computer networks such as the internet, the problem of crime is becoming increasingly complex due to its wide scope. The purpose of this study is to see what strategies are suitable for preventing cybercrime actions via cell phones based on the ITE Law in Indonesia. The data analysis method used in this study is to use routine activity theory. Cohen and Felson's incidence that crime against crime is related to three variables, namely someone who is motivated, the target who is the target, and the absence of protection from the target (absence of a capable guard). The suggestion is that Gojek provides education about awareness in this fraud case. Gojek appeals to users on their social media to be more careful in trusting information. In addition, the government should not only give warnings to its users as a form of vigilance, but the government should be more optimal in giving more effort.Keywords: Cybercrime, ITE Law, Routine Activity Theory
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"

1

Alshalan, Abdullah. "Cyber-crime fear and victimization." Diss., Mississippi State : Mississippi State University, 2006. http://library.msstate.edu/etd/show.asp?etd=etd-01232006-095728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Skaf, Faten. "La justice pénale face à la cybercriminalité." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.

Full text
Abstract:
La justice pénale est aujourd’hui confrontée au numérique et le développement des données dématérialisées, dont la valeur patrimoniale ne cesse de s’accroître, lui pose des défis de nature idéologique, sociologique, économique, géopolitique et, bien évidemment juridique. Elle doit faire face à la cybercriminalité qui se joue du temps, de l’espace et des législations puisque les actes illicites se déroulent désormais dans le cyberespace. Mais, pour que le système de justice pénale puisse contribuer efficacement à la lutte contre la cybercriminalité, les États doivent pouvoir s’appuyer sur un ensemble de règles juridiques contre cette criminalité et des systèmes de justice pénale qui fonctionnent correctement, doivent avoir les capacités nécessaires pour démêler les affaires pénales qui peuvent être complexes et coopérer à la répression de la cybercriminalité au plan international
Nowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"

1

Internet safety. Chicago, Ill: Heinemann Library, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Writings In The Psychology Of New Media. Taylor & Francis Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gendertrolling: How misogyny went viral. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer users Internet users Computer crimes Computer users Internet users Crime forecasting"

1

Herath, Tejaswini. "Internet Crime." In Handbook of Research on Social and Organizational Liabilities in Information Security, 433–45. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-132-2.ch026.

Full text
Abstract:
It is estimated that over 1 billion people now have access to the Internet. This unprecedented access and use of Internet by individuals around the world, however, is accompanied by malicious and mischievous activities online. With the traditional crimes such as fraud, identity theft, and harassment now being committed with the use of the Internet, and networked home computers being exploited to carry out attacks such as denial of service, spamming, phishing and virus/worm propagation, it has become important to investigate security and privacy issues as they pertain to individual Internet users. To date very little is known about what characteristics of internet users affect their computing and on-line behaviors as they relate to security online. While some attention has been paid to understand the security issues affecting corporations, research investigating security issues as they relate to home users is still in infancy. Drawing from disciplines such as criminology, sociology, consumer fraud, and information security, this study seeks to find the role of computing skills and computer training, social influence, and gender on person’s vulnerability to Internet crimes. Our findings are significant and shed light in this important area of Internet crime contributing to the information security literature.
APA, Harvard, Vancouver, ISO, and other styles
2

Luong, Hai Thanh. "Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam." In Combating the Exploitation of Children in Cyberspace, 68–94. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2360-5.ch004.

Full text
Abstract:
Since officially joining the globally connected computer network in 1997, Vietnam has made impressive progress with 64 million internet users as of June 2017, accounting for 67% of the population and is also among the countries with the highest number of internet users in Asia. Social media is widely available with a large focus on young groups. This chapter provides the overall situation on online sex assaults and exploitations child in Vietnam with its detailed characteristics and figures as well as shares the specific efforts of government and law enforcement authorities to prevent and combat this crime from 2010 to 2018 after the professional task force of Vietnamese police established in 2010 till now. The chapter also analyzes the difficulties, challenges, and barrier to fight it before introducing the proposals, strategies, and focuses on anticipate, prevent, and combat this crime of Vietnam's authorities.
APA, Harvard, Vancouver, ISO, and other styles
3

Luong, Hai Thanh. "Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam." In Combating the Exploitation of Children in Cyberspace, 68–94. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2360-5.ch004.

Full text
Abstract:
Since officially joining the globally connected computer network in 1997, Vietnam has made impressive progress with 64 million internet users as of June 2017, accounting for 67% of the population and is also among the countries with the highest number of internet users in Asia. Social media is widely available with a large focus on young groups. This chapter provides the overall situation on online sex assaults and exploitations child in Vietnam with its detailed characteristics and figures as well as shares the specific efforts of government and law enforcement authorities to prevent and combat this crime from 2010 to 2018 after the professional task force of Vietnamese police established in 2010 till now. The chapter also analyzes the difficulties, challenges, and barrier to fight it before introducing the proposals, strategies, and focuses on anticipate, prevent, and combat this crime of Vietnam's authorities.
APA, Harvard, Vancouver, ISO, and other styles
4

R., Parkavi, Anitha S., and Gayathri R. "Digital Steganography Security." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 144–73. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1558-7.ch009.

Full text
Abstract:
Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information exchange between two parties. It has been propelled to the forefront of the current security techniques. The main objective of the technique is to provide an imperceptible way of transferring secret messages to the recipient. Another issue to be noted is that the term steganography completely differs from cryptography. The above-stated analysis is used in digital forensics. There are many steganography software tools available for ordinary computer users.
APA, Harvard, Vancouver, ISO, and other styles
5

Umadevi, K. S., Geraldine Bessie Amali, and Latha Subramanian. "Digital Forensics and Cyber Law Enforcement." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, 1–20. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8241-0.ch001.

Full text
Abstract:
Security, safety, and privacy are of paramount importance to anyone who likes to crawl on the web. Keeping the best interest of the internet users in mind, India has laid down very solid foundations to safeguard its people from cyberattacks and cyber terrorism. The word “cyber law” encompasses all the cases, statutes, and constitutional provisions that affect persons and institutions who control the entry to cyberspace, provide access to cyberspace, create the hardware and software that enable people to access cyberspace or use their own devices to go “online” and enter cyberspace. Cyber crimes are unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief, all of which are subject to the Indian Penal Code.
APA, Harvard, Vancouver, ISO, and other styles
6

Ajewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes, 125–46. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.

Full text
Abstract:
This chapter discusses basic software that should be found in a typical cybercafé setup. ‘Software requirements’ are broadly divided into requirements for the server side and client side of the network. As a commercial venture, it is of great importance that only necessary software be found installed in a cybercafé, to meet the café user’s need. Starting with an introduction, a general overview of the café user’s needs are set forth, thereby leading to the division into two broad areas: server and client side. An outline of the chapter is given. The background section gives some details on some basic terminologies (server, client, operating system, etc.) that a cybercafé user/prospective operator might want to get acquainted with. Software requirements for the server side of the café network are discussed first; general features of timing softwares, notes on Internet security, viruses, and spyware. As the café server is a very important element in café management, it is necessary that the server is not overwhelmed by unnecessary tasks thereby leading to a generally slow network. Software for the client side of the café network is discussed next with emphasis on basic software applications often used/requested by café users. Examples of such are word processing applications and graphics viewing software. Since a lot of computer literate people are familiar with the Windows operating system, all software discussed for client use derives from such a perspective. Some security issues necessary for maintaining crisp client computers are also discussed. Due to lack of in-depth knowledge about information security among internet users, the future trends section discusses the applicability of the personal Internet communicator in the Nigerian environment, because of its portability and built in security. Other possible trends in security and cyber-crime are also discussed. The chapter ends with a note that café users will continue to demand faster Internet speeds, and therefore operators must be on the search for latest software to meet their needs, latest security software to keep their café network always clean and secure. Future research directions include software development research to allow café users modify or design their desktops to their own taste while in the café. Complete café solution software is also proposed to cater for everything from operating systems to end-user applications which can be installed once, and from a single source.Literature used for this chapter is sourced mainly from the Internet, and from personal experience of the author, as there are not literatures dealing with ‘cybercafé software’ on a specific note. A whole lot of software are been used, and could be used in a café. This depends actually on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments.
APA, Harvard, Vancouver, ISO, and other styles
7

Zlatanovska, Katerina. "Hacking and Hacktivism as an Information Communication System Threat." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 68–101. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8793-6.ch004.

Full text
Abstract:
The distribution of information technology is a step forward in accelerating rapidity and efficiency of transferring information. As each system, that is subjected on different anomalies, so that computer information systems are also subjected to different disorders to make a stop or destruction of it. There is a question: who would like to do harm to the system which is produced for people and society needs? HUMAN BEING is the response. However, it is not every human being, but a person, popularly called a hacker, who is educated in the information technology field and who makes damage, using computers and the Internet. Hacking and hacktivism as a function of information systems and technologies, expressed as a pattern of ethical or unethical hacking, represent a global menace, for some people, as well as whole institutions and arrangements. The actual problem, imposing here, is how creators and users of computer information systems can find a solution, or compatible protection and preventive acting in those areas where such a problem appears.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chia-Hui, Ray-I. Chang, and Jan-Ming Ho. "Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection." In Wireless Technologies, 713–24. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch313.

Full text
Abstract:
Thanks to fast technology advancement of micro-electronics, wired/wireless networks and computer computations in past few years, the development of intelligent, versatile and complicated video-based surveillance systems has been very active in both research and industry to effectively enhance safety and security. In this chapter, the authors first introduce the generations of video surveillance systems and their applications in potential risk and crime detection. For effectively supporting early warning system of potential risk and crime (which is load-heavy and time-critical), both collaborative video surveillance and distributed visual data mining are necessary. Moreover, as the surveillance video and data for safety and security are very important for all kinds of risk and crime detection, the system is required not only to data protection of the message transmission over Internet, but also to further provide reliable transmission to preserve the visual quality-of-service (QoS). As cloud computing, users do not need to own the physical infrastructure, platform, or software. They consume resources as a service, where Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and pay only for resources that they use. Therefore, the design and implementation of an effective communication model is very important to this application system.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Chia-Hui, Ray-I. Chang, and Jan-Ming Ho. "Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection." In Surveillance Technologies and Early Warning Systems, 194–204. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-865-0.ch010.

Full text
Abstract:
Thanks to fast technology advancement of micro-electronics, wired/wireless networks and computer computations in past few years, the development of intelligent, versatile and complicated video-based surveillance systems has been very active in both research and industry to effectively enhance safety and security. In this chapter, the authors first introduce the generations of video surveillance systems and their applications in potential risk and crime detection. For effectively supporting early warning system of potential risk and crime (which is load-heavy and time-critical), both collaborative video surveillance and distributed visual data mining are necessary. Moreover, as the surveillance video and data for safety and security are very important for all kinds of risk and crime detection, the system is required not only to data protection of the message transmission over Internet, but also to further provide reliable transmission to preserve the visual quality-of-service (QoS). As cloud computing, users do not need to own the physical infrastructure, platform, or software. They consume resources as a service, where Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and pay only for resources that they use. Therefore, the design and implementation of an effective communication model is very important to this application system.
APA, Harvard, Vancouver, ISO, and other styles
10

Woodcock, Leone E., and San Murugesan. "Gender Differences in Ethics Perceptions in Information Technology." In Information Security and Ethics, 3433–41. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch230.

Full text
Abstract:
Greater emphasis is now placed on ethics in information technology (IT) which covers a broad range of issues such as privacy, honesty, trustworthiness, software reliability, data storage, the environment, security breaches, hacking, viruses, and acknowledging the intellectual property of others. Further, legal aspects tend to overlap ethics perceptions. For example, issues such as copying computer programs, music CDs, images, or videos are more than just ethical problems; they also pose legal problems. The ethical dimensions also extend to issues such as computer crime and fraud, information theft, and unauthorized information dissemination. These ethical issues are becoming more complex as continuing advances in IT present many new ethical situations and fresh dilemmas. Developments such as the Internet, electronic commerce, and wireless/mobile communications present a new set of ethical issues and challenge current of codes of ethics, copyright laws, and their authors. In addition, computer users’ ethical standards may also vary from one situation to another (Wikipedia, 2005). What is ethical is subjective, and more so in the areas of IT. Perceptions of ethics in IT vary to a degree from individual to individual. Further, there seems to be significant differences in the perception of ethics among males and females. According to Adam (2000), male and female judgment is most often influenced by their personal values and whether an action is considered legal. Woodcock (2002) conducted a study on ethical perceptions among 405 male and female students from universities, technical colleges, and schools in North-Eastern Australia and found significant differences in some ethical situations between males and females. This article presents common issues and dilemmas that confront IT professionals, students, and the general community. In particular, it presents gender differences in perceptions of ethics and legalities in IT and highlights the different ethical perceptions of male and female students. These insights are particularly significant as the ethical beliefs and perceptions that students have may influence their ethical behaviors during their working careers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography