To see the other types of publications on this topic, follow the link: Cybercrim.

Journal articles on the topic 'Cybercrim'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybercrim.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Billah, Muhammad Masum. "Sufficiency of Omani Laws to Suppress Cybercrimes in Light of the un Comprehensive Study on Cybercrimes." Arab Law Quarterly 32, no. 2 (2018): 158–84. http://dx.doi.org/10.1163/15730255-12321010.

Full text
Abstract:
Abstract To address the problem of cybercrimes and related issues, Oman has adopted two new pieces of legislation, the Electronic Transactions Law (etl) and the Cybercrime Law. Of the two, the etl, enacted in 2008, is the older one. It addresses only some cybercrimes, in particular, the ‘target cybercrimes’ in its last chapter. In 2011, Oman enacted the Cybercrime Law to specifically address cases of cybercrime. The law covers almost every type of target cybercrime and some tool cybercrimes. This article analyses the concept of cybercrime and whether Omani law addresses all such crimes. In eva
APA, Harvard, Vancouver, ISO, and other styles
2

Eboibi, Felix E. "Cybercrime prosecutors and non-retroactivity of the nigerian cybercrimes act 2015." Revista Acadêmica Escola Superior do Ministério Público do Ceará 10, no. 1 (2018): 237–51. http://dx.doi.org/10.54275/raesmpce.v10i1.135.

Full text
Abstract:
The role of cybercrime prosecutors in the quest to eradicate the proliferation of cybercrime and enhance the administration of cybercrime justice in Nigeria cannot be overemphasized. However, the recent enactment of the Nigerian Cybercrimes Act 2015 which ordinarily should be a tool in the hands of cybercrime prosecutors, raises pungent questions as to the legality or otherwise of bringing pending cybercrime matters before courts and the prosecution of perpetrators of cybercrime prior to the commencement of the Act under the Nigerian Cybercrimes Act 2015. The dilemma that this portends for the
APA, Harvard, Vancouver, ISO, and other styles
3

Ivaniuk, Viktoriia, and Serhiy Banakh. "Cryptocurrency-Related Cybercrimes in Ukraine." osteuropa recht 66, no. 1 (2020): 217–24. http://dx.doi.org/10.5771/0030-6444-2020-1-217.

Full text
Abstract:
Cybercrime, including cryptocurrency-related cybercrime, has become widespread in recent years. Despite a thorough study of cybercrime issues, there is still no legislative position on the legal regulation of cryptocurrencies and the responsibility for cryptocurrency-related cybercrime in Ukraine. The authors classify and characterize all cryptocurrency-related cybercrimes into five groups. In view of the spread of cryptocurrency-related cybercrimes, the EU’s counteraction measures have been analyzed. Ways to prevent and counteract to cryptocurrency-related cybercrimes in Ukraine are suggested
APA, Harvard, Vancouver, ISO, and other styles
4

Babanina, Viktoria, Iryna Tkachenko, Olena Matiushenko, and Mykola Krutevych. "Cybercrime: History of formation, current state and ways of counteraction." Revista Amazonia Investiga 10, no. 38 (2021): 113–22. http://dx.doi.org/10.34069/ai/2021.38.02.10.

Full text
Abstract:
The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet
APA, Harvard, Vancouver, ISO, and other styles
5

Mirzakarimova, Dilafruz. "TYPES OF CYBERCRIMES AND THEIR CHARACTERISTICS." Criminology and Criminal Justice 5, no. 2 (2025): 32–41. https://doi.org/10.51788/tsul.ccj.5.2./yfun7169.

Full text
Abstract:
This article provides information about cybercrimes, their types, origin, and history of development. First of all, what crimes are meant by cybercrime, their classification and characteristics are interpreted. In addition, the reasons for the growth of cybercrime in the modern digital world and measures to combat it were discussed. The reasons for the commission of cybercrimes, the gaps in the security system that create the basis for them, the issue of responsibility for cybercrimes, as well as the current state of affairs in this area were discussed. The article also uses the copying method
APA, Harvard, Vancouver, ISO, and other styles
6

B, Ajoy P. "Effectiveness of Criminal Law in Tackling Cybercrime: A Critical Analysis." Scholars International Journal of Law, Crime and Justice 5, no. 2 (2022): 74–79. http://dx.doi.org/10.36348/sijlcj.2022.v05i02.005.

Full text
Abstract:
A significant number of nations around the world have enacted cybercrime laws for the purpose of controlling the occurrence of cybercrimes and mitigating its ill effects. However, in spite of enacting such cybercrime laws, available data show that the incidence of cybercrime is rapidly increasing. There are many factors that contribute to the failure of criminal law to fully control cybercrime. These factors include anonymity related issues, jurisdictional issues, extradition related challenges, problems associated with the law enforcement machinery, non-availability of data relating to cyberc
APA, Harvard, Vancouver, ISO, and other styles
7

McKoy, Coleman. "Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally." ABC Journal of Advanced Research 10, no. 2 (2021): 159–74. http://dx.doi.org/10.18034/abcjar.v10i2.601.

Full text
Abstract:
Cybercrime has become one of the fastest-growing concerns for law enforcement agencies at the federal, state, and municipal levels. This qualitative case study examined the perceptions of nine law enforcement officers from Texas regarding combating cybercrime at the local level. The study focuses on how do law enforcement officers who respond to traditional crimes describe law enforcement agencies’ preparedness to fight cybercrime locally. Data collection consisted of semistructured interviews, where member-checking helped to enhance trustworthiness. The results from this study helped fill the
APA, Harvard, Vancouver, ISO, and other styles
8

Dremliuga, Roman I., Alexandr I. Korobeev, Alexey Y. Mamychev, and Olga I. Miroshnichenko. "Trends and methods of fighting cybercrime in the Russian Federation in terms of the transition to a digital economy." LAPLAGE EM REVISTA 7, no. 2 (2021): 191–200. http://dx.doi.org/10.24115/s2446-6220202172701p.191-200.

Full text
Abstract:
The article deals with the problem of combating cybercrime in the Russian Federation in the context of its transition to the digital economy. Society and the state in the 90s and early 2000s did not recognize the danger behind cybercrimes. The concept of absolute freedom of dissemination of information, which existed at the time, and other factors have led to a high increase in cybercrime today. The authors concluded that the situation changed only in the last decade, when they began to fight against cybercrime in a comprehensive manner. The article also discusses the issue of delimiting cyber
APA, Harvard, Vancouver, ISO, and other styles
9

Uche, Ijeoma, and Okala Uche. "Perceptions of undergraduates towards cybercrimes at the University of Nigeria, Nsukka." International Journal of Social Sciences and Humanities Invention 10, no. 05 (2023): 7839–52. http://dx.doi.org/10.18535/ijsshi/v10i05.01.

Full text
Abstract:
Cybercrimes are violations committed against a person or a group of persons to hurt innocent people and gain financial advantage. Several people, especially young ones, are seduced by cybercrimes for a variety of reasons. The undergraduate students of the University of Nigeria, Nsukka attitudes regarding cybercrime are the subject of this study. During focus group discussions, data from 54 UNN undergraduates were gathered using an explorative research design. They were chosen at random from the institution's six departments. Themes were used to analyze the data. Study findings showed that ever
APA, Harvard, Vancouver, ISO, and other styles
10

Dumchykov, Mykhailo, Maryna Utkina, and Olha Bondarenko. "Cybercrime as a Threat to the National Security of the Baltic States and Ukraine: The Comparative Analysis." International Journal of Safety and Security Engineering 12, no. 4 (2022): 481–90. http://dx.doi.org/10.18280/ijsse.120409.

Full text
Abstract:
The article is devoted to comparative legal research of cybercrime as a threat to the national security of the Baltic States and Ukraine. The purpose of the scientific article is to study the systems of criminal legislation in the part of cybercrime in the Baltic States and Ukraine, to determine the public danger of cybercrime, as well as to study ways of countering this criminal category. The object of research is cybercrime as a criminal and legal category. The subject of the study is the peculiarities of combating cybercrimes in the Baltic States and Ukraine, and carrying out a comparative
APA, Harvard, Vancouver, ISO, and other styles
11

Veresha, Roman. "Preventive measures against computer related crimes: approaching an individual." Informatologia 51, no. 3-4 (2018): 189–99. http://dx.doi.org/10.32914/i.51.3-4.7.

Full text
Abstract:
Cybercrime is a combination of information, financial and personal security threats. The purpose of this research is to target statistical data to allocate the most effective preventive measures against cybercrime that would contribute to the combat at the level of potential (or real) cyber victims and cyber criminals. Brining the so-called Cyberethics into the life of people will be preventive against cybercrimes, as it will add to their culture of cyberspace through educational and popular science projects (such-like program that was put into action in Nigeria stroke positively). With the ra
APA, Harvard, Vancouver, ISO, and other styles
12

van de Weijer, Steve G. A., Rutger Leukfeldt, and Wim Bernasco. "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking." European Journal of Criminology 16, no. 4 (2018): 486–508. http://dx.doi.org/10.1177/1477370818773610.

Full text
Abstract:
Although the prevalence of cybercrime has increased rapidly, most victims do not report these offenses to the police. This is the first study that compares associations between victim characteristics and crime reporting behavior for traditional crimes versus cybercrimes. Data from four waves of a Dutch cross-sectional population survey are used ( N = 97,186 victims). Results show that cybercrimes are among the least reported types of crime. Moreover, the determinants of crime reporting differ between traditional crimes and cybercrimes, between different types of cybercrime (that is, identity t
APA, Harvard, Vancouver, ISO, and other styles
13

Ch, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, and Abdulrahman Al-Ahmari. "Computational System to Classify Cyber Crime Offenses using Machine Learning." Sustainability 12, no. 10 (2020): 4087. http://dx.doi.org/10.3390/su12104087.

Full text
Abstract:
Particularly in the last decade, Internet usage has been growing rapidly. However, as the Internet becomes a part of the day to day activities, cybercrime is also on the rise. Cybercrime will cost nearly $6 trillion per annum by 2021 as per the cybersecurity ventures report in 2020. For illegal activities, cybercriminals utilize any network computing devices as a primary means of communication with a victims’ devices, so attackers get profit in terms of finance, publicity and others by exploiting the vulnerabilities over the system. Cybercrimes are steadily increasing daily. Evaluating cybercr
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Claire Seungeun. "Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks." International Journal of Cybersecurity Intelligence and Cybercrime 3, no. 2 (2020): 1–3. http://dx.doi.org/10.52306/03020120jofx1754.

Full text
Abstract:
Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately
APA, Harvard, Vancouver, ISO, and other styles
15

Abiona, Oluwatosin, and Abdul-Quadri Oje. "A Review of the National Cybercrime Law and its Attendant Impact on National Security in Nigeria." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1750–55. http://dx.doi.org/10.22214/ijraset.2023.55448.

Full text
Abstract:
Abstract: This paper is a study on the issues in cybercrime, offences and penalties, and challenges that provoke cyber policy established in Nigeria. It seeks to define what cybersecurity and cybercrimes are from the perspective of the National cybercrime law. The focus of this study, however, is to highlight crimes or offences considered to have an impact on national security, the related issues, the effects of cybercrimes, challenges, and prospects. The study concludes that the leading causes propelling Nigerians to indulge in cybercrimes are disorientation and the rate of unemployment
APA, Harvard, Vancouver, ISO, and other styles
16

Murthy, A. S. N., Vishnuprasad Nagadevara, and Rahul De'. "Predictive Models in Cybercrime Investigation." International Journal of Information Systems in the Service Sector 2, no. 3 (2010): 1–12. http://dx.doi.org/10.4018/jisss.2010070101.

Full text
Abstract:
With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation in India is in its infancy and there has been limited success in prosecuting the offenders; therefore, a need to understand and strengthen the existing investigation methods and systems for controlling cybercrimes is greatly needed. This study identifies important factors that will enable law enforcement agencies to reach the first step in effective prosecution, namely charge-sheeting of the cybercrime cases. Data on 300 cybercrime cases covering a
APA, Harvard, Vancouver, ISO, and other styles
17

Malik, Muhammad Shoukat, and Urooj Islam. "Cybercrime: an emerging threat to the banking sector of Pakistan." Journal of Financial Crime 26, no. 1 (2019): 50–60. http://dx.doi.org/10.1108/jfc-11-2017-0118.

Full text
Abstract:
Purpose The purpose of this study is to gain more insight into the impact of cybercrime incidents in the banking sector of Pakistan. This study investigates the significant contribution of information security awareness on the relationship of cybercrimes and organizational performance. Design/methodology/approach The impact of cybercrime incidents on organizational performance is investigated by further exploring the moderating effects of information security awareness. A sample of 302 employees in the banking industry of Pakistan was studied by using survey design. Findings Cybercrime inciden
APA, Harvard, Vancouver, ISO, and other styles
18

Pathak, Priyesh. "Fixing Liabilities for Technology in Cyber Crimes – A Critical Analysis." Journal of Legal Studies & Research 09, no. 01 (2023): 51–64. http://dx.doi.org/10.55662/jlsr.2023.9101.

Full text
Abstract:
The meaning of cybercrime, its concept and types are covered in this research. It further deals with the liability in cybercrimes and whether the liability can be fixed to technology. By the late 1970s, the idea of ‘crime by computer’ had become a serious problem that called for new criminal laws, but technology’s constant growth and continuous penetration into the legal system had not yet had the same destructive impact as it does now. The word ‘cyber’ has a technological connotation. Cybercrime is the term used to describe crimes committed in this digital age. They are non-violent, bloodless
APA, Harvard, Vancouver, ISO, and other styles
19

Singh, Dr Jyoti. "Exploring the Evolving Landscape of Cybercrime in India and Strategies for Prevention." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 582–91. http://dx.doi.org/10.22214/ijraset.2023.53624.

Full text
Abstract:
Abstract: Cybercrime refers to criminal activities that either target computers or networks such as hacking, phishing, and spamming, or involve the use of computer to commit offensive and illegal activities, such as hate crimes and child pornography. The research aims to explore the evolving landscape of cybercrime in India along with Indian cybercrime statistics, motives behind cybercrimes like fraud, extortion, sexual exploitation, terrorist activities, Inciting Hate against Country, Sale Purchase illegal drugs, etc. In addition, the paper will delve into specific types of cybercrime, unique
APA, Harvard, Vancouver, ISO, and other styles
20

Яцишин, М. Ю. "Криміналізація кіберзлочинів у міжнародному праві: порівняльний аналіз". Форум права 53, № 5 (2018): 92–99. https://doi.org/10.5281/zenodo.2009191.

Full text
Abstract:
Метою є визначення і аналіз окремих видів кібернетичних злочинів, криміналізованих за чинними міжнародними договорами. Аналізуються положення міжнародно-правових угод у сфері протидії кіберзлочинності, що були прийняті в рамках таких організацій, як Рада Європи, Ліга арабських держав, Співдружність незалежних держав, Шанхайська організація співробітництва та Африканський союз. Визначені спільні та відмінні риси положень вказаних договорів, зокрема, кваліфікаційні ознаки кожного з видів кіберзлочинів, що підлягають переслідуванню. Зроблено висновок про відмінність підходів до криміналізації та
APA, Harvard, Vancouver, ISO, and other styles
21

Sanjay, Jain, and Kumar Shrivash Brajesh. "An exploratory cybercrime analysis and its impact on india." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 8. http://dx.doi.org/10.26634/jdf.1.1.19083.

Full text
Abstract:
In the modern era, the rapid use of the internet has led to reports of cybercrimes. The number of cybercrimes is constantly increasing. The purpose of this paper is to identify the root causes of cybercrime and find insights that can be used by the administration to take fruitful decisions to overcome cybercrime offenses. It has collected data related to the registered cybercrime cases in various Indian states on different parameters for the years 2016 to 2019. The preprocessing was applied to individual datasets, and a common data set was prepared. Data analysis using Power BI (business intel
APA, Harvard, Vancouver, ISO, and other styles
22

Amro, Belal. "The reality of Cybercrime Investigations in Palestine from Lawyers and Prosecutor's Assistants Perspective (a Case Study of Hebron Governorate)." Hebron University Research Journal (HURJ): A- (Natural Sciences) 13, no. 1 (2024): 99–126. https://doi.org/10.60138/521320245.

Full text
Abstract:
As a developing country، Palestine faces a great challenge in tackling cybercrimes due to the necessity of advanced hardware، software، and skilled personnel requirements، bearing in mind the sensitivity and importance of the data being collected and processed. This study attempts to determine the reality of cybercrime investigation in Palestine from the perspective of lawyers and prosecutor assistants in charge of following up and monitoring cybercrime investigations. The study sample included 475 participants from Hebron Governorate، and the descriptive method was used. The results show that
APA, Harvard, Vancouver, ISO, and other styles
23

Mohamad Suarno Nur, Fenty Puluhuwa, and Fence M. Wantu. "KEBIJAKAN PENEGAKAN HUKUM DALAM UPAYA MENANGANI CYBER CRIME YANG DILAKUKAN OLEH POLRI VIRTUAL DI INDONESIA." Juris 7, no. 2 (2023): 464–70. http://dx.doi.org/10.56301/juris.v7i2.1122.

Full text
Abstract:
This research aims to understand and analyze the legal regulatory policies regarding information technology crimes in addressing cybercrime committed by virtual police in Indonesia. In the midst of technological advancements and their negative impacts, especially cybercrimes, handling cybercrime becomes a complex challenge. This study involves normative legal analysis focusing on doctrines and legal principles found in legislation and court decisions.The results indicate that the criminal legal regulations related to cybercrime in Indonesia are not yet fully adequate. Although Law Number 19 of
APA, Harvard, Vancouver, ISO, and other styles
24

Saed Alatrash, Aisha. "THE REALITY AND PROSPECTS OF CYBERCRIMES AND THE EXTENT OF AWARENESS OF INTERNET USERS IN LIBYA." مجلة كلية التربية العلمية, no. 16 (December 20, 2024): 195–209. https://doi.org/10.37376/fesj.vi16.7104.

Full text
Abstract:
The use of the internet and information and communication technologies has been increasing significantly in Libya. Additionally, different social and economic activities are conducted online every day. As a result, this has led to critical concerns about the issue of cybercrime. Furthermore, the risks of cybercrimes vary and can cause economic and social harm, which can reach a high level. Therefore, this study aimed to introduce the reality of cybercrime in Libya and its prospects. As well as investigating the knowledge and awareness of internet users in Libya about this type of crime. The me
APA, Harvard, Vancouver, ISO, and other styles
25

Ahmad, M. A., D. D. Wisdom, and S. Isaac. "An Empirical Analysis of Cybercrime Trends and Its Impact on Moral Decadence Among Secondary School Level Students in Nigeria." advances in multidisciplinary & scientific research journal publication 26, no. 1 (2020): 73–84. http://dx.doi.org/10.22624/isteams/v26p10-ieee-ng-ts.

Full text
Abstract:
Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming, Botnets, fake bank alert messages (SMS) /unsolicited SMS requesting you to provide bank details as Bank Verification Number (BVN), fraud, identity theft, piracy, pornography, hacking, fraudulent e-mail related SMS, forgery such as fake documents as Certificate etc. Thus, Cybercrime is gradually becoming a threat to our moral society at large. Hence, the increase n
APA, Harvard, Vancouver, ISO, and other styles
26

Ombu, Atonbara. "Role of Digital Forensics in Combating Financial Crimes in the Computer Era." Journal of Forensic Accounting Profession 3, no. 1 (2023): 57–75. http://dx.doi.org/10.2478/jfap-2023-0003.

Full text
Abstract:
Abstract Information and communication technologies (ICT) have changed every area of our lives. Cyberspace-related areas have reflected these shifts. Cyberspace has an undeniable positive impact on information, trade, industry, and communication. On the other hand, cybercrime is a dark side of the Internet that degrades its peaceful use. Any illegal activity carried out by or via cyberspace and its electronic environment is characterized as cybercrime. Unlike traditional crimes, cybercrimes present a real dilemma because the identities of criminals may be hidden in the virtual domain. Digital
APA, Harvard, Vancouver, ISO, and other styles
27

Bala, Manju. "Study of Cyber Crime Awareness among Female B.Ed. Trainees." Journal of Women Empowerment and Studies, no. 31 (January 3, 2023): 11–17. http://dx.doi.org/10.55529/jwes.31.11.17.

Full text
Abstract:
The purpose of this paper is to explore the cybercrime awareness among female B.Ed trainees with respect to their type of and locality find the cybercrime awareness among female B.Ed. trainees. The increased dependence on internet has led to the rise of cybercrime. Cybercrime is a new wave of crimes using internet facilities. Problems such as lack of proper training and education, the poor awareness of cybercrime among female have also contributed to the growth in cybercrime. In the present study researcher adopted descriptive survey method to collect the data for the cybercrime awareness amon
APA, Harvard, Vancouver, ISO, and other styles
28

LUOMALA, Mikko. "A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland." International Journal of Information Security and Cybercrime 14, no. 1 (2025): 37–62. https://doi.org/10.19107/ijisc.2025.01.03.

Full text
Abstract:
Cybercrime is a discussed issue globally. There is a myth that cybercrimes are all technically advanced. This research developed an extended scale to measure a crime technique of cybercrime and how technology is used to perpetrate a crime against technology or software, or technology and software is used to aid crime. This study used Finnish Court cases to show the need for a revised extension of the taxonomy of the previous cybercrime scale. Finnish Court cases between 2015-2019 were examined with the cybercrime classification scale of a technique of cybercrime and with extended scale. The re
APA, Harvard, Vancouver, ISO, and other styles
29

Asyaeva, E., and Yu Myagkova. "Bercrime and Cyberfraud in the Financial Market." Scientific Research and Development. Economics of the Firm 14, no. 1 (2025): 49–56. https://doi.org/10.12737/2306-627x-2025-14-1-49-56.

Full text
Abstract:
The article examines the current problems of cybercrime and cyberfraud in the modern financial market. The main types and methods of committing cybercrimes in the financial sector are studied. An analysis of the risks of cybercrimes in electronic banking is presented, factors influencing the dynamics of the spread of cybercrime are identified. The reasons for the increase in the number of data leaks and cyberattacks in the Russian financial market are considered, and recommendations are given for ensuring the cybersecurity of financial institutions and agencies.
APA, Harvard, Vancouver, ISO, and other styles
30

IJCIS. "CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL." International Journal on Cryptography and Information Security (IJCIS) 1-20, no. 13 (2025): 2/3. https://doi.org/10.5281/zenodo.15017858.

Full text
Abstract:
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALAdeniyi Phillips, Ibraheem Ojelade, Esther Taiwo, Callistus Obunadikeand Kunle OloyedeDepartment of Computer Science and Quantitative Methods, Austin Peay StateUniversity, Tennessee. ABSTRACTThis article underscores the urgent need for a global response to cyber threats, discusses the risksassociated with increasing reliance on technology, and sets the stage for a review focused onunderstanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact onnational development and the growing problem
APA, Harvard, Vancouver, ISO, and other styles
31

Rani, Kavita. "Cybercrime and Legal Responses in the Indian Jurisdiction." Indian Journal of Law 1, no. 1 (2023): 35–41. http://dx.doi.org/10.36676/ijl.2023-v1i1-05.

Full text
Abstract:
This paper investigates the landscape of cybercrime within the Indian jurisdiction, exploring the nature and scope of cybercrimes prevalent in the country. The study examines the legal framework established by the Indian government to combat these cyber threats, including the Information Technology Act, 2000, and relevant amendments. The paper also highlights the challenges and shortcomings faced in prosecuting cybercrimes and presents recent high-profile cases as illustrative examples. Additionally, it provides recommendations for future directions to enhance India's response to cybercrime, i
APA, Harvard, Vancouver, ISO, and other styles
32

Khadas, Hasina Masud. "The Causes of Cyber Crime." Volume 5 - 2020, Issue 8 - August 5, no. 8 (2020): 476–78. http://dx.doi.org/10.38124/ijisrt20aug432.

Full text
Abstract:
Cybercrime involves a computer and a network and a computer is an object used for crime. The computer also can be used as a tool to commit an offense. The computer can also be the target of the crime. The internet is a wonderful place to engage us with a lot more of activities……but for whom? There is a possibility that many of us can become victims of the criminals hacking the internet. This paper highlights the overview of cybercrime, the main causes of cybercrimes, the different types of cybercrimes, and their prevention methods.
APA, Harvard, Vancouver, ISO, and other styles
33

Malikzada, Toghrul, and Shohlat Karimov. "Definition and general characteristics of cybercrime." Juridical Sciences and Education 79, no. 79 (2025): 76–84. https://doi.org/10.25108/2304-1730-1749.iolr.2025.79.76-84.

Full text
Abstract:
The article is devoted to the concept of cybercrime and the general characteristics of cybercrimes. The article notes that in modern times, as a result of the development of digital technologies and the widespread distribution of electronic information, cybercrimes continue to increase rapidly. The article mentions that as a result of artificial intelligence, as digital technology develops, its positive results and negative sides also appear. The article also examines and analyzes the concepts of “computer crime” and “cybercrime” in the national legislation of our republic and a number of fore
APA, Harvard, Vancouver, ISO, and other styles
34

Mohamad Al Mahdi, Maryam, and Stacey Baror. "Proof of Concept of a Digital Forensic Readiness Cybercrime Language as a Service." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 191–99. http://dx.doi.org/10.34190/iccws.19.1.2059.

Full text
Abstract:
Welcome to the 21st century, where more devices are connected to the Internet than people on this earth. Each device will be or has been a target of cybercrime. The popularity of text-based cybercrimes has become prevalent with the advancement of the Internet. The number of cybercrimes increases yearly, unlike the reports of such crimes. The major problem is the lack of awareness and protection from cybercrimes. These issues cascade into greater consequences, such as a shortfall of reports, deficiency of cybercrime data, etc. The DFClaaS system is proposed as a solution; it allows users to rep
APA, Harvard, Vancouver, ISO, and other styles
35

Waruwu, Jurisman, Wira Hadinata, Siska Febriyani, and Rini Wijayanti. "Data Mining Technique in Detecting and Predicting Cyber In Marketplace Sector." Jurnal Informatika 1, no. 1 (2022): 8–11. http://dx.doi.org/10.57094/ji.v1i1.350.

Full text
Abstract:
Marketplace is one business solution that can be profitable, because it is not bound by time and place. However, marketplace can be misused by irresponsible parties, and can harm others. Then a pattern is needed to predict cybercrime in order to prevent it. To get a pattern, we can use data mining. This paper presents a general idea about the model of Data Mining techniques and diverse cybercrimes in market place applications. This paper implements data mining techniques like K-Means, Influenced Association Classifier and J48 Prediction tree for investigating the cybercrime data sets. K-means
APA, Harvard, Vancouver, ISO, and other styles
36

Bosede, Olanike Awoyemi, Adekiitan Omotayo Olufunmilola, and John Mpapalika Jane. "GLOBALIZATION AND CYBER CRIMES: A REVIEW OF FORMS AND EFFECTS OF CYBER CRIME IN NIGERIA." International Journal of Multidisciplinary Research and Modern Education (IJMRME) 7, no. 1 (2021): 18–25. https://doi.org/10.5281/zenodo.4994317.

Full text
Abstract:
Globalization involves interaction, collaboration and integration among individuals, organizations, societies, and governments of different nations. Globalization has enhanced progress in various parts of the world in different ways. Over the years, it has promoted access to education, transportation, communication, health facilities, importation and exportation, employment opportunities, revenue for the government and good standard of living for the people. Other aspects of the society that have been greatly influenced by globalization include trade and technology. Advancement in information
APA, Harvard, Vancouver, ISO, and other styles
37

Garba, J. "An approach to cybercrime issues in Dandume Local Government Area of Katsina State, Nigeria." Nigerian Journal of Technology 42, no. 2 (2023): 249–56. http://dx.doi.org/10.4314/njt.v42i2.13.

Full text
Abstract:
This study investigated cybercrime issues in Dandume Local Government Area of Katsina State. The study aimed to understand the various types of cybercrimes that the community faces and the resulting impacts, particularly educational and psychological effects on the victims. Additionally, the study discussed the main causes of these crimes, particularly among young people. To achieve these aims, the study collected data from 115 residents of Dandume using a structured questionnaire. The collected data was analyzed using statistical tables. The results showed that cybercrime is prevalent in the
APA, Harvard, Vancouver, ISO, and other styles
38

Gong, Jung Sik. "Korean-Mongolian Cyber Crime and Comparative Study." Forum of Public Safety and Culture 31 (June 30, 2024): 149–64. http://dx.doi.org/10.52902/kjsc.2024.31.149.

Full text
Abstract:
Cybercrime is a serious social issue that requires a collective response from the global community, including Korea. Particularly, the advent of the virtual world, made possible by advancements in fourth industrial revolution technology, has reshaped how relationships are formed. Today’s youth often find it more natural and preferable to establish relationships in the digital realm rather than in person. Recently, Mongolia, which has close ties with Korea, has experienced a rapid increase in cybercrime, highlighting the need for international cooperation. Focusing on the fact that Mongolia has
APA, Harvard, Vancouver, ISO, and other styles
39

Nikulchenkova, E. V. "Transformation of Cybercrime: Modern Threats and Their Warning." Herald of Omsk University. Series: Law, no. 3 (2023): 96–105. http://dx.doi.org/10.24147/1990-5173.2023.20(3).96-105.

Full text
Abstract:
The relevance of the study is due to the fact that the transformation of crime into cyberspace, characterized by high latency, problems of detection and investigation, is a serious threat to modern society. The existing system of preventive measures and measures of criminal legal impact in Russia is not able to fully counteract cybercrime, which justifies the relevance and necessity of conducting scientific research in this area for the purpose of criminological and criminal law prevention of cybercrime. Purpose. The purpose of the article is to study the state of cybercrime in Russia, identif
APA, Harvard, Vancouver, ISO, and other styles
40

Nalzaro, Jonalyn G., and Joan Marie Oville. "Analysis of non-detectable cases of Cyber Crime Law." University of the Visayas - Journal of Research 8, no. 1 (2014): 219–28. https://doi.org/10.5281/zenodo.1968507.

Full text
Abstract:
Cybercrime is emerging and it covers the limelight of today’s generation. The extreme growth of new technologies have always brought solutions that aid human innovations in all aspect. But enabled criminals with complex and sophisticated knowledge to use computers in illegal ways that may result to crimes and human rights violations. The Cybercrime Prevention Act of 2012 is the first law in the Philippines that define and penalized cybercrimes. There are several types of cybercrimes under cybercrime law: (1) illegal access; (2) illegal interception; (3) data interference; (4) system inte
APA, Harvard, Vancouver, ISO, and other styles
41

Oladehin, Roland Olanrewaju. "Cybercrime among Undergraduate Students: Problems and Solutions. A Case Study of Nigeria." International Journal of Research and Innovation in Social Science IX, no. II (2025): 4569–89. https://doi.org/10.47772/ijriss.2025.9020360.

Full text
Abstract:
Cybercrime encompasses criminal activities carried out by means of computers or the internet, and indeed there’s an upsurge of cybercrime in Nigeria, as the internet has created several platforms such as social media, e-commerce, and dating sites via which individuals target victims, and engage in cybercrimes. Research indicates that undergraduate students in Nigeria engage in, and are affected by cybercrime. This study was carried out to investigate cybercrime among undergraduate students in Nigeria, specifically, the types of cybercrimes affecting students, the contributing factors, and the
APA, Harvard, Vancouver, ISO, and other styles
42

Hafiz Ammar Mazhar, Umair Altaf, Syed Muhammad Anwar, and Muhammad Shoaib Bhutta. "Auto-Classification of FIA-Cybercrime Wing Complaints Using Bidirectional Encoder Representations from Transformers Model." UCP Journal of Engineering & Information Technology 2, no. 2 (2025): 01–11. https://doi.org/10.24312/ucp-jeit.02.02.393.

Full text
Abstract:
The Cybercrime Wing (CCW) of the Federal Investigation Agency, which was formerlyknown as the National Response Center for Cybercrime (NR3C), is governed by rules that were created in2016 as part of the Prevention of Electronic Crimes Act (PECA) to combat cybercrime. Criminal activitiesexecuted using computers and the internet are referred to as cybercrimes. In order to carry out illegalactivities, cybercriminals make use of any information system as their primary means of communicationwith the devices that belong to their victims. This research mainly focusses on the cybercrime complaintswith
APA, Harvard, Vancouver, ISO, and other styles
43

Ivanova, L. "Criminal Liability for Cybercrimes in the BRICS Countries." BRICS Law Journal 10, no. 1 (2023): 59–87. http://dx.doi.org/10.21684/2412-2343-2023-10-1-59-87.

Full text
Abstract:
One of the areas of cooperation among the BRICS countries is tackling the misuse of information and communication technologies for criminal activities. Each year, the number of cybercrimes continues to grow. Furthermore, the criminal regulation of cybercrimes in each country differs. This article aims to identify the features of criminal liability for cybercrimes in the BRICS countries and offer potential solutions for developing joint legislation initiatives. The primary focus of this discussion is on cybercrime provisions that can be found in the legal acts of the Federative Republic of Braz
APA, Harvard, Vancouver, ISO, and other styles
44

De Kimpe, Lies, Michel Walrave, Thom Snaphaan, Lieven Pauwels, Wim Hardyns, and Koen Ponnet. "Research Note: An Investigation of Cybercrime Victims’ Reporting Behavior." European Journal of Crime, Criminal Law and Criminal Justice 29, no. 1 (2021): 66–78. http://dx.doi.org/10.1163/15718174-bja10019.

Full text
Abstract:
Abstract Even though the dark number is especially high for cybercrimes, it is unclear by whom and to whom cybercrime is reported. Therefore, this study will answer the following questions: (1) who reports cybercrime incidents, and (2) to whom do victims report cybercrime? Analyses based on survey data including 334 recent cybercrime victims, indicate that 73.4% of victims do not report the incident. Cybercrime victims who do report are significantly older. In addition, 40.4% of the reporting victims notified the police, while others contacted a wide diversity of organizations. Based on these
APA, Harvard, Vancouver, ISO, and other styles
45

Zia UL Islam, Muhammad Aqeel Khan, and Muhammad Zubair. "Cybercrime and Pakistan." Global Political Review IV, no. II (2019): 12–19. http://dx.doi.org/10.31703/gpr.2019(iv-ii).02.

Full text
Abstract:
Cybercrime or electronic crime is a very diverse and expanding phenomenon. It has no boundaries. For people from different walks of life, its really hard to understand it. No exact definition of cybercrime can be given. Cybercrime in Pakistan has immensely increased in the past two decades. We had no digital forensic and information data experts. No latest system was available. Previously we had no legislation on cybercrimes until when Prevention of Electronic Crimes Act (PECA) 2016, was passed by the government. This research paper analyzes cybercrime, its meaning and origination, different d
APA, Harvard, Vancouver, ISO, and other styles
46

Shak, Roman. "Concepts and Types of Cyber Offenses in Criminal Law." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 11, no. 44 (2024): 325–35. https://doi.org/10.23939/law2024.44.325.

Full text
Abstract:
Abstract. The article is devoted to the study of the concept and classification of cyber offenses in criminal law. The author analyzes different approaches to defining the terms "computer crimes", "cyber crimes", "Internet crime" and others, emphasizing the difference in their application in legal science. Special attention is paid to the positions of scientists regarding the interpretation of cybercrime and its place in the field of criminal law. The author states that two approaches to understanding cybercrimes have been formed today, narrow and broad. The narrow approach focuses on the prot
APA, Harvard, Vancouver, ISO, and other styles
47

Massawe, Edgar Rogart, and Juma Ally Mshana. "Preventing and Combating Cybercrimes: Case of Cybercrimes Investigation Unit of Tanzania Police." European Journal of Theoretical and Applied Sciences 1, no. 5 (2023): 1179–90. http://dx.doi.org/10.59324/ejtas.2023.1(5).102.

Full text
Abstract:
The study was conducted at the cybercrimes investigation unit of Tanzania Police Force. The study investigates the current situation of Tanzania Police Force on combating and preventing cybercrimes in Tanzania and examine the effect of the current legal framework governing them on preventing and combating cybercrime. The study used a sample size of 86 respondents from cybercrimes investigation unit at Tanzania Police Force. Data collection was done by using interview guide and questionnaire. The data was analysed by using multiple regression model and thematic analysis for quantitative and qua
APA, Harvard, Vancouver, ISO, and other styles
48

Edgar, Rogart Massawe, and Ally Mshana Juma. "Preventing and Combating Cybercrimes: Case of Cybercrimes Investigation Unit of Tanzania Police." European Journal of Theoretical and Applied Sciences 1, no. 5 (2023): 1179–90. https://doi.org/10.59324/ejtas.2023.1(5).102.

Full text
Abstract:
The study was conducted at the cybercrimes investigation unit of Tanzania Police Force. The study investigates the current situation of Tanzania Police Force on combating and preventing cybercrimes in Tanzania and examine the effect of the current legal framework governing them on preventing and combating cybercrime. The study used a sample size of 86 respondents from cybercrimes investigation unit at Tanzania Police Force. Data collection was done by using interview guide and questionnaire. The data was analysed by using multiple regression model and thematic analysis for quantitative and qua
APA, Harvard, Vancouver, ISO, and other styles
49

Havlovskyi, Vladyslav, Alla Kovalchuk, and Bogdana Cherniavska. "Regarding the state of cybercrime prevention in Ukraine: problems of formation of official statistics." ScienceRise: Juridical Science, no. 2(24) (June 30, 2023): 48–54. http://dx.doi.org/10.15587/2523-4153.2023.283561.

Full text
Abstract:
The article analyzes the types, forms, and content of statistical reporting reflecting the state and structure of cybercrime in Ukraine. It is noted that there is currently no clear definition of the concept of cybercrime in domestic legislation. Among scientists and practitioners, there is also no single approach to delineating the grounds for classifying illegal acts as such crimes. At the same time, such uncertainty has a negative impact on the effectiveness of countering cybercrime in Ukraine. The purpose of the article is a systematic analysis of available state statistical data related t
APA, Harvard, Vancouver, ISO, and other styles
50

Srihari Rao, N., K. Chandra Sekharaiah, and A. Ananda Rao. "Jananee janmabhoomischa: ICT solutions for pronational digital society." International Journal of Engineering & Technology 7, no. 3.29 (2018): 225. http://dx.doi.org/10.14419/ijet.v7i3.29.18800.

Full text
Abstract:
Personality Development’, ‘Social Development’, ‘National Development’, ‘National Spirit’, ‘National Amity’, ‘Nation Building Character’, ‘National Consciousness’, ‘National Solidarity’, ‘National Awareness’, ‘National Integration’, ‘National Sovereignty’, ‘National Integrity’, and ‘National Unity’ are the diminishing ideas among the citizens of a country now-a-days. Opportunities for cybercrimes worsen this situation further by luring the people with bad motivations, some who justify the cybercrimes somehow and some to perpetrate the cybercrimes. As the public authorities are not capable enou
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!