Academic literature on the topic 'Cybercrime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybercrime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybercrime"

1

Billah, Muhammad Masum. "Sufficiency of Omani Laws to Suppress Cybercrimes in Light of the un Comprehensive Study on Cybercrimes." Arab Law Quarterly 32, no. 2 (January 25, 2018): 158–84. http://dx.doi.org/10.1163/15730255-12321010.

Full text
Abstract:
Abstract To address the problem of cybercrimes and related issues, Oman has adopted two new pieces of legislation, the Electronic Transactions Law (etl) and the Cybercrime Law. Of the two, the etl, enacted in 2008, is the older one. It addresses only some cybercrimes, in particular, the ‘target cybercrimes’ in its last chapter. In 2011, Oman enacted the Cybercrime Law to specifically address cases of cybercrime. The law covers almost every type of target cybercrime and some tool cybercrimes. This article analyses the concept of cybercrime and whether Omani law addresses all such crimes. In evaluating the Omani cybercrime laws and the challenges cybercrime brings, the article uses the United Nation’s Comprehensive Study on Cybercrime (2013) as the standard of reference for comparison.
APA, Harvard, Vancouver, ISO, and other styles
2

Eboibi, Felix E. "Cybercrime prosecutors and non-retroactivity of the nigerian cybercrimes act 2015." Revista Acadêmica Escola Superior do Ministério Público do Ceará 10, no. 1 (June 29, 2018): 237–51. http://dx.doi.org/10.54275/raesmpce.v10i1.135.

Full text
Abstract:
The role of cybercrime prosecutors in the quest to eradicate the proliferation of cybercrime and enhance the administration of cybercrime justice in Nigeria cannot be overemphasized. However, the recent enactment of the Nigerian Cybercrimes Act 2015 which ordinarily should be a tool in the hands of cybercrime prosecutors, raises pungent questions as to the legality or otherwise of bringing pending cybercrime matters before courts and the prosecution of perpetrators of cybercrime prior to the commencement of the Act under the Nigerian Cybercrimes Act 2015. The dilemma that this portends for the administration of cybercrime justice is that in the absence of proper appreciation of the legal implications, a cybercrime prosecutor would amend ongoing cybercrime charges and arraign perpetrators of cybercrime for offences committed before the commencement of the Nigerian Cybercrimes Act 2015. This paper consequently analyses, from the perspective of legal inclinations, the appropriate role of a cybercrime prosecutor in respect to ongoing cybercrime proceedings prior to the commencement of the Nigerian Cybercrimes Act 2015. It unravels the apposite action for a cybercrime prosecutor when faced with an opportunity to arraign perpetrators of cybercrime prior to the commencement of the Act before the courts to enhance the effective administration of cybercrime justice.
APA, Harvard, Vancouver, ISO, and other styles
3

Ivaniuk, Viktoriia, and Serhiy Banakh. "Cryptocurrency-Related Cybercrimes in Ukraine." osteuropa recht 66, no. 1 (2020): 217–24. http://dx.doi.org/10.5771/0030-6444-2020-1-217.

Full text
Abstract:
Cybercrime, including cryptocurrency-related cybercrime, has become widespread in recent years. Despite a thorough study of cybercrime issues, there is still no legislative position on the legal regulation of cryptocurrencies and the responsibility for cryptocurrency-related cybercrime in Ukraine. The authors classify and characterize all cryptocurrency-related cybercrimes into five groups. In view of the spread of cryptocurrency-related cybercrimes, the EU’s counteraction measures have been analyzed. Ways to prevent and counteract to cryptocurrency-related cybercrimes in Ukraine are suggested.
APA, Harvard, Vancouver, ISO, and other styles
4

Babanina, Viktoria, Iryna Tkachenko, Olena Matiushenko, and Mykola Krutevych. "Cybercrime: History of formation, current state and ways of counteraction." Revista Amazonia Investiga 10, no. 38 (April 12, 2021): 113–22. http://dx.doi.org/10.34069/ai/2021.38.02.10.

Full text
Abstract:
The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet is growing, the number of users is growing, and, accordingly, the number of cybercrimes and the level of their organization is growing. In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes. The problems that law enforcement agencies face in the investigation and fight against cybercrimes were revealed. The factors contributing to the growth of cybercrime were also analyzed. Based on the analysis, the main directions of combating cybercrime and preventing the growth of the number of cybercrimes in society were developed.
APA, Harvard, Vancouver, ISO, and other styles
5

B, Ajoy P. "Effectiveness of Criminal Law in Tackling Cybercrime: A Critical Analysis." Scholars International Journal of Law, Crime and Justice 5, no. 2 (February 21, 2022): 74–79. http://dx.doi.org/10.36348/sijlcj.2022.v05i02.005.

Full text
Abstract:
A significant number of nations around the world have enacted cybercrime laws for the purpose of controlling the occurrence of cybercrimes and mitigating its ill effects. However, in spite of enacting such cybercrime laws, available data show that the incidence of cybercrime is rapidly increasing. There are many factors that contribute to the failure of criminal law to fully control cybercrime. These factors include anonymity related issues, jurisdictional issues, extradition related challenges, problems associated with the law enforcement machinery, non-availability of data relating to cybercrime including non-reporting of cybercrimes, difficulties to identify, locate and arrest the cybercriminal, lack of experts, technology related issues, problems posed by international law etc. Since, at present, criminal law is not able to fully tackle cybercrime, there is a need to focus on cybercrime prevention strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

McKoy, Coleman. "Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally." ABC Journal of Advanced Research 10, no. 2 (December 4, 2021): 159–74. http://dx.doi.org/10.18034/abcjar.v10i2.601.

Full text
Abstract:
Cybercrime has become one of the fastest-growing concerns for law enforcement agencies at the federal, state, and municipal levels. This qualitative case study examined the perceptions of nine law enforcement officers from Texas regarding combating cybercrime at the local level. The study focuses on how do law enforcement officers who respond to traditional crimes describe law enforcement agencies’ preparedness to fight cybercrime locally. Data collection consisted of semistructured interviews, where member-checking helped to enhance trustworthiness. The results from this study helped fill the gap in the literature regarding the unknown perceptions of law enforcement officers responding to cybercrimes at the local level. This study also focused on the behaviors of the participants regarding responding to cybercrimes. Participants indicated that law enforcement agencies take cybercrime seriously; however, cybercrimes are not a high priority for law enforcement at the local level. Participants also provided challenges that local law enforcement agencies face in cybercrime investigations locally.
APA, Harvard, Vancouver, ISO, and other styles
7

Dumchykov, Mykhailo, Maryna Utkina, and Olha Bondarenko. "Cybercrime as a Threat to the National Security of the Baltic States and Ukraine: The Comparative Analysis." International Journal of Safety and Security Engineering 12, no. 4 (August 31, 2022): 481–90. http://dx.doi.org/10.18280/ijsse.120409.

Full text
Abstract:
The article is devoted to comparative legal research of cybercrime as a threat to the national security of the Baltic States and Ukraine. The purpose of the scientific article is to study the systems of criminal legislation in the part of cybercrime in the Baltic States and Ukraine, to determine the public danger of cybercrime, as well as to study ways of countering this criminal category. The object of research is cybercrime as a criminal and legal category. The subject of the study is the peculiarities of combating cybercrimes in the Baltic States and Ukraine, and carrying out a comparative analysis of their criminal legislation. The authors analyze the essence of the concept of cybercrime and identify the main types of cybercrime that are committed most often. Thus, in this article, "cybercrime" means any crime committed with the help of information technologies or in the information space. Special attention is focused on cybercrime in the Baltic States, in particular Latvia, Lithuania, and Estonia. The main types of cybercrimes, the responsibility for the commission of which is provided for by Chapter XVII of the Criminal Code of Ukraine, are described. The Convention on Cybercrime was considered, and it was determined which norms should be implemented in the legislation of the Baltic countries and Ukraine. It was determined that the issue of countering cybercrime in the Baltic States. The main threats, prevention, and countermeasures against cybercrimes in the Baltic States and Ukraine and the main features of international and legal cooperation with cybercrimes within the framework of the European Union are outlined. It was concluded that in order to combat crimes committed with the use of modern information technologies in Ukraine, it is necessary to constantly increase the security of information systems, develop modern information technologies, improve legislation in the field of information crimes, develop competitive means of informatization, expand international cooperation in the field of safe use of information resources.
APA, Harvard, Vancouver, ISO, and other styles
8

Murthy, A. S. N., Vishnuprasad Nagadevara, and Rahul De'. "Predictive Models in Cybercrime Investigation." International Journal of Information Systems in the Service Sector 2, no. 3 (July 2010): 1–12. http://dx.doi.org/10.4018/jisss.2010070101.

Full text
Abstract:
With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation in India is in its infancy and there has been limited success in prosecuting the offenders; therefore, a need to understand and strengthen the existing investigation methods and systems for controlling cybercrimes is greatly needed. This study identifies important factors that will enable law enforcement agencies to reach the first step in effective prosecution, namely charge-sheeting of the cybercrime cases. Data on 300 cybercrime cases covering a number of demographic, technical and other variables related to cybercrime was analyzed using data mining techniques to identify and prioritize various factors leading to filing of the charge-sheet. These factors and the respective priority rankings are used to suggest various policy measures for improving the success rate of prosecution of cybercrimes.
APA, Harvard, Vancouver, ISO, and other styles
9

Ch, Rupa, Thippa Reddy Gadekallu, Mustufa Haider Abidi, and Abdulrahman Al-Ahmari. "Computational System to Classify Cyber Crime Offenses using Machine Learning." Sustainability 12, no. 10 (May 16, 2020): 4087. http://dx.doi.org/10.3390/su12104087.

Full text
Abstract:
Particularly in the last decade, Internet usage has been growing rapidly. However, as the Internet becomes a part of the day to day activities, cybercrime is also on the rise. Cybercrime will cost nearly $6 trillion per annum by 2021 as per the cybersecurity ventures report in 2020. For illegal activities, cybercriminals utilize any network computing devices as a primary means of communication with a victims’ devices, so attackers get profit in terms of finance, publicity and others by exploiting the vulnerabilities over the system. Cybercrimes are steadily increasing daily. Evaluating cybercrime attacks and providing protective measures by manual methods using existing technical approaches and also investigations has often failed to control cybercrime attacks. Existing literature in the area of cybercrime offenses suffers from a lack of a computation methods to predict cybercrime, especially on unstructured data. Therefore, this study proposes a flexible computational tool using machine learning techniques to analyze cybercrimes rate at a state wise in a country that helps to classify cybercrimes. Security analytics with the association of data analytic approaches help us for analyzing and classifying offenses from India-based integrated data that may be either structured or unstructured. The main strength of this work is testing analysis reports, which classify the offenses accurately with 99 percent accuracy.
APA, Harvard, Vancouver, ISO, and other styles
10

Veresha, Roman. "Preventive measures against computer related crimes: approaching an individual." Informatologia 51, no. 3-4 (December 30, 2018): 189–99. http://dx.doi.org/10.32914/i.51.3-4.7.

Full text
Abstract:
Cybercrime is a combination of information, financial and personal security threats. The purpose of this research is to target statistical data to allocate the most effective preventive measures against cybercrime that would contribute to the combat at the level of potential (or real) cyber victims and cyber criminals. Brining the so-called Cyberethics into the life of people will be preventive against cybercrimes, as it will add to their culture of cyberspace through educational and popular science projects (such-like program that was put into action in Nigeria stroke positively). With the rapid spread of cybercrime, preventive measures geared towards individuals such as anti-criminalization, anti-bullying and anti-phishing propaganda, the practice of shaping negative attitude towards crimes, and discovery of responsibility for committing cybercrimes gain in importance. Society improvement as a counter-move to cut out criminal factors provoking a positive or neutral attitude to cybercrimes should be geared towards better living, as the higher is the standard the lower is the level of cybercrime. Taking individualized preventing measures to people prone to commit cybercrimes will prevent against such even before they take place (with cyber extortion and ransomware threats, such actions gain in relevance). For the fight against cybercrime, special programs are to level down victimization in the field of cybersecurity by fostering a shielding attitude in persons who can become victims. The path of designing such programs will lead to a drop cybercrime activity. Specific public authorities and non-governmental organizations should take part in the preventive process. All-encompassing preventive measures against cybercrime approaching individual at the international level will allow designing specific pilot programs for individualized prevention
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybercrime"

1

Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.

Full text
Abstract:
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; warnings for known allergies to medicines such as penicillin are electronically erased from patients' charts; and laboratory records on HIV blood tests results are insidiously switched from negative to positive just before patients are to receive their results. (Marc D Goodman 'Why the police don't care about computer crime' (1997) 10 Harvard Journal of Law and Technology 465 at 466). Although this scenario is possible with current technology, unfortunately Lesotho would be powerless to act for lack of adequate laws to investigate and prosecute this conduct. Lesotho's current criminal laws can hardly be enforced against cybercrime, as they do not clearly prohibit the crime. Therefore, this paper argues that Lesotho must adopt a comprehensive legal structure to deter and prosecute cybercrime. It does this by examining international and national approaches to cybercrime, with a view to providing guidance for an effective framework capable of addressing this 'new' crime. Cybercrime is a major global challenge requiring coordinated international effort. In a networked world no island is an island; cybercrime penetrates all countries because of its ability to cross national boundaries. Further, this paper suggests a model law that is based on the first international treaty which plays a key role in combating cybercrime. Finally, it recognises that legislation alone cannot fight cybercrime; law enforcement must be equipped to implement the law, and private citizens must know about cybercrime and the need to protect themselves and their systems and networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID.
This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
APA, Harvard, Vancouver, ISO, and other styles
3

Lusthaus, Jonathan. "Cybercrime : the industry of anonymity." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:80d9d881-586d-42ef-b56e-7c140d396a73.

Full text
Abstract:
The central theme of this thesis is that cybercrime has matured into a large profitdriven industry. Hobby hackers still exist and hacktivists have attracted some attention in recent years, but a very significant component of contemporary cybercrime is now financially motivated. While its goods and services are usually illicit, the cybercrime industry operates according to the same broad principles of industrial organisation observed across numerous other contexts. But the development of this industry is somewhat puzzling. Ostensibly much cybercriminal cooperation takes place online. As a result, cybercriminals are often partnering with online criminals whose true identities are unknown to them. They also have no means of physical enforcement should deals go awry. Partnering with conventional criminals, who operate outside the protection of the state, already appears to present significant challenges for cooperation. The challenge of anonymity makes cooperation even more difficult and suggests that cybercriminals would often act alone, or in small groups. Instead a large successful industry has formed. This thesis first addresses the industrialisation of cybercrime. It then addresses this puzzle of how cybercriminals have overcome the challenges to cooperation to build an industry on such a scale.
APA, Harvard, Vancouver, ISO, and other styles
4

Mwiburi, Abel Juma [Verfasser]. "Preventing and Combating Cybercrime in East Africa. : Lessons from Europe's Cybercrime Frameworks. / Abel Juma Mwiburi." Berlin : Duncker & Humblot, 2018. http://d-nb.info/123848543X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Nemrat, Ameer. "Investigating cybercrime profiling and trends analysis." Thesis, University of East London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.532998.

Full text
Abstract:
The Internet can be considered a double-edged sword because while offering a range of benefits, it provides criminals with the opportunity to extend their work to areas and places previously unimaginable. Therefore, all countries face the same challenges on how to fight cybercrime and how to effectively promote security to their citizens and organisations. In Jordan, cybercafes have become "culturally acceptable alternatives" and a haven for individuals wanting to engage in some form of deviant behaviour away from the prying eyes of society. The aim of this research is to examine the online behaviours of individuals living in two different cyberspaces (English and Non-English). The literature currently available has no such conducted research. Therefore, this research has attempted to address this significant gap in the research by examining the relationship between online behaviour and computer victimisation in two countries; the UK as an example of an English cyberspace in a developed country, and Jordan as a Non-English cyberspace in a developing country. This thesis, in addition, draws attention to the growIng numbers of cybercrime victims, and the techniques used by cyber criminals to victimise them. Understanding the trends of cybercrime and the strategies employed by cyber criminals in order to commit cybercrime will help us to identify the steps that needs be taken to prevent such criminal activities. This study investigates individuals who do or do not take precautions to guard themselves against cybercrime, and examines how their perception of law influences their actions towards incidents of cybercrime. In this study, 'guardianship' refers to actions or procedures that individuals take to ensure that any given computer is secure before they go online, and is linked to the awareness of risks associated with the use of the Internet that an individual may have. Environmental crime theories are popular because of their success in solving traditional crime; Life-style Routine Activity Theory (LRA T) is a good example of these traditional crime theories. The particular interest of this thesis is how to benefit from these crime theories in the fight against cybercrime victimisation. This study has assessed a new theoretical model derived from LRA T. This new conceptual model expands upon digital capable guardianship elements by adding the element of "Awareness", using statistical evidence to demonstrate its key significance in bringing about online harmony alongside the three pre-existing elements (Formal Social Control, Informal Social Control, and Target Hardening). The conceptual model and theoretical basis of this research suggests that it is not only computer-related Formal Social Control (FSC) aspects which can have an impact upon an individual's perception of online activities, but also posits that an individual's awareness can influence their online behaviours. The results of this research allows us to determine the effectiveness of both FSC and "Awareness" on the behaviours of individuals within the overall efforts of a society to fight cybercrime victimisation. This is an extension to the existing literature which typically focuses on technical perspectives to ensure computer security.
APA, Harvard, Vancouver, ISO, and other styles
6

Edwards, Graeme. "Investigating cybercrime in a cloud-computing environment." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/97885/13/Graeme%20Edwards%20Thesis.pdf.

Full text
Abstract:
This thesis presents the legal and technical challenges law enforcement investigators face when seeking digital evidence from a cloud-computing environment. It presents a series of solutions including an investigative methodology that obtains and presents such evidence in a legal and technically transparent manner. By gathering the opinions of international and domestic law enforcement investigators as well as major cloud service providers, the thesis critically examines the ability of law enforcement to hold the criminal community accountabe for criminal offences commoted across a multi-jurisdictional environment where the evidence is located within cloud computing storage.
APA, Harvard, Vancouver, ISO, and other styles
7

O'Flynn, Micheál Aaron. "Harmonisation and cybercrime jurisdiction : uneasy bedfellows? : an analysis of the jurisdictional trajectories of the Council of Europe's Cybercrime Convention." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9548.

Full text
Abstract:
This thesis examines the Council of Europe's Cybercrime Convention and suggests there is a structural imbalance: while improving the procedures for investigating cybercrimes, it has failed to address the prosecutorial complexities and disputes resulting from multijurisdictional cybercrimes, by following the usual trend of 'suppression' conventions. This trend is to expand the procedural mechanisms through which States can acquire evidence in relation to the 'suppressed' offences, while suggesting that State Parties adopt broad rules in relation to criminal jurisdiction. These procedural powers have provided powerful tools for policing cybercrime, and the Convention has been innovative by developing mechanisms for facilitating networking interactions between law enforcement, and on most interpretations, even providing for directly contacting foreign service providers for data. The traditional limitations of enforcement jurisdiction are gradually being transformed, but the resulting difficulties for jurisdictional concurrency are not appreciated. Given the malleability of the concept of 'territoriality', and the flexibility afforded in international law in its interpretation, seizures of jurisdiction over many cybercrimes have sometimes been on the most tenuous of grounds. This results in a problem of concurrent jurisdiction on a scale previously unseen in the context of other transnational offences. It is often assumed that once substantive criminal harmonisation occurs, jurisdictional conflict between States dissipates, but I highlight three areas where concurrency is beginning to generate difficulties: investigatory and prosecutorial negotiations, cybercrime extraditions, and the law relating to ne bis in idem. I argue that these problems are only going to be exacerbated given the inroads that are being made in investigative powers and enforcement jurisdiction, coupled with the global reach of cybercrime which brings more and more States into play. I provide both the theoretical and practical case for more refined approaches towards the concept of territoriality, and consider some of the potential mechanisms for dealing with these uneasy bedfellows in the Cybercrime Convention.
APA, Harvard, Vancouver, ISO, and other styles
8

Roberts, C. M., and n/a. "Modelling cybercrime and risk for New Zealand organisations." University of Otago. Department of Information Science, 2009. http://adt.otago.ac.nz./public/adt-NZDU20091009.162528.

Full text
Abstract:
The Internet is now fundamental to the global economy. Growing from an experimental and research network in the late 1960's, it is now the foundation of a wide range of economic, infrastructure support, communication and information sharing activities. In doing so it has also provided a vehicle for cybercrime. Organised cybercrime and state-sponsored malicious cyber activity are predicted to become the predominant cyber threats over the next five to ten years. Corporate governance is playing an increasingly important role in ensuring compliance with the growing body of legislation and regulation, protecting the interests of stakeholders. At the same time there is a divergence in organisational awareness, understanding, strategy and application between business objectives, risk management and good security practices. Organisations are finding increasing difficulty in managing the scope and extent of the cyber-threat environment, exacerbated by confusion over risk tools, approaches and requirements. This study provides a pragmatic and practical framework for organisational risk assessment, already proved over several years of use. This is supported by three national surveys which provide important data for sound risk identification and assessments. This survey data is organised through a Data Schema which is simple, rational and flexible enough to accommodate new technologies and types of cyber-attacks, as well as allowing for the decommissioning of technologies and the abandonment of attack methods. For many organisations this risk framework will be sufficient to meet their corporate governance and risk management requirements. For organisations wishing to refine their approach, a Bayesian model has also been developed, building on previous work, incorporating data from the surveys and, through the Data Schema, allowing the incorporation of probabilities and other evidence to enhance the risk assessment framework. Again this model is flexible, accommodating changes, growth and new technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Maahs, Doreen Lynn. "Managerial Strategies Small Businesses Use to Prevent Cybercrime." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5749.

Full text
Abstract:
Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework was systems thinking and action theory. Participants included 4 small manufacturing business owners in the midwestern region of the United States. Data were collected via face-to-face interviews with owners, company documentation, and observations. Member checking was used to help ensure data reliability and validity. Four themes emerged from the data analysis: organizational policies, IT structure, managerial strategies, and assessment and action. Through effective IT security and protocols, proactive managerial strategies, and continuous evaluation of the organization's system, the small business owner can sustain the business and protect it against potential cyberattacks on the organization's network. The findings of the study have implications for positive social change by informing managers regarding (a) the elimination or reduction of cybercrimes, (b) the protection of customers' information, and (c) the prevention of future breaches by implementing effective managerial strategies to protect individuals in society.
APA, Harvard, Vancouver, ISO, and other styles
10

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybercrime"

1

Huber, Edith. Cybercrime. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-26150-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cybercrime. New York: Marshall Cavendish Benchmark, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sylvia, Engdahl, ed. Cybercrime. Detroit: Greenhaven Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hile, Kevin. Cybercrime. Detroit, MI: Lucent Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Owen, Tim, and Jessica Marshall, eds. Rethinking Cybercrime. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55841-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bandler, John, and Antonia Merzon. Cybercrime Investigations. First edition. | Boca Raton, FL : CRC Press/ Taylor & Francis Group, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003033523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brewer, Russell, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, and David Maimon. Cybercrime Prevention. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31069-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferraro, Monique Mattei. Cybercrime: A casebook. Burlington, MA: Academic Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weulen Kranenbarg, Marleen, and Rutger Leukfeldt, eds. Cybercrime in Context. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60527-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Koops, Bert-Jaap, and Susan W. Brenner, eds. Cybercrime and Jurisdiction. The Hague: T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-467-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybercrime"

1

Marcum, Catherine D., and George E. Higgins. "Cybercrime." In Handbooks of Sociology and Social Research, 459–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20779-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holt, Thomas J. "Cybercrime." In The Handbook of Measurement Issues in Criminology and Criminal Justice, 29–48. Hoboken, NJ: John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781118868799.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Newman, Graeme R. "Cybercrime." In Handbooks of Sociology and Social Research, 551–84. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Almanna, Ali. "Cybercrime." In Legal Translation between English and Arabic, 197–212. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-14838-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bernik, Igor. "Cybercrime." In Cybercrime and Cyberwarfare, 1–56. Hoboken, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118898604.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Protrka, Nikola. "Cybercrime." In Modern Police Leadership, 143–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63930-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Huber, Edith. "Cybercrime." In Cybercrime, 21–29. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-26150-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Clough, Jonathan. "Cybercrime." In Elgar Encyclopedia of Crime and Criminal Justice. Edward Elgar Publishing, 2024. http://dx.doi.org/10.4337/9781789902990.cybercrime.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Murthy, A. S. N., Vishnuprasad Nagadevara, and Rahul De’. "Predictive Models in Cybercrime Investigation." In Advancing the Service Sector with Evolving Technologies, 166–77. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0044-7.ch011.

Full text
Abstract:
With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation in India is in its infancy and there has been limited success in prosecuting the offenders; therefore, a need to understand and strengthen the existing investigation methods and systems for controlling cybercrimes is greatly needed. This study identifies important factors that will enable law enforcement agencies to reach the first step in effective prosecution, namely charge-sheeting of the cybercrime cases. Data on 300 cybercrime cases covering a number of demographic, technical and other variables related to cybercrime was analyzed using data mining techniques to identify and prioritize various factors leading to filing of the charge-sheet. These factors and the respective priority rankings are used to suggest various policy measures for improving the success rate of prosecution of cybercrimes.
APA, Harvard, Vancouver, ISO, and other styles
10

Frunza, Marius-Christian. "Cybercrime." In Introduction to the Theories and Varieties of Modern Crime in Financial Markets, 207–20. Elsevier, 2016. http://dx.doi.org/10.1016/b978-0-12-801221-5.00015-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybercrime"

1

Alade, O. M., E. A. Amusan, O. T. Adedeji, and S. B. Adebayo. "Cybercrime and Underground Attack Technologies: Perspectives from the Nigerian Banking Sector." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p6.

Full text
Abstract:
Banks all over the world are taking advantage and opportunities brought about by e-banking which happened as a result of Internet. As the security level in this sector becomes stronger, the strength and tactics of these fraudsters also increases. Various lucrative attacks have been launched and unfortunately, many have succeeded. This paper addressed different types of cybercrimes in banking sector, factors contributing to cybercrime, tools used by cybercriminals, effects of cybercrime on Nigeria banking, cyber security technology for preventing cybercrimes and duties of individual and organizations on protecting our banks from cybercrime. Keywords: Cybercrime, Banking Sector, Internet, Cyber security.
APA, Harvard, Vancouver, ISO, and other styles
2

Ghelerter, David, John Wilson, Noah Welch, and John-David Rusk. "Cybercrime in the Developing World." In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.10.

Full text
Abstract:
This paper attempts to discover the reasons behind the increase in cybercrime in developing nations over the past two decades. It discusses many examples and cases of projects to increase internet access in developing countries and how they enabled cybercrime. This paper examines how nations where many cybercrimes occurred, did not have the necessary resources or neglected to react appropriately. The other primary focus is how cybercrimes are not viewed the same as other crimes in many of these countries and how this perception allows cybercriminals to do as they please with no stigma from their neighbors. It concludes that laws and law enforcement, fund distribution, and ethics of these developing countries need to change to reduce the amount of cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
3

Rajan, Amala V., Rejitha Ravikumar, and Mariam Al Shaer. "UAE cybercrime law and cybercrimes — An analysis." In 2017 International Conference on Cyber-Security and Protection of Digital Services (Cyber Security). IEEE, 2017. http://dx.doi.org/10.1109/cybersecpods.2017.8074858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yunitasari, Yessi, Latjuba S. T. T. Sofyana, and Maria Ulfah Siregar. "Cyber Crime Identifying Using Machine Learning Techniques - Based Sentiment Analysis." In The 6th International Conference on Science and Engineering. Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-j46rcy.

Full text
Abstract:
Social media analytics is a form of information analytics that is quite important in today's cyber situation. Cybercrime is criminal behaviour based on computers and internet networks. Cybercriminals usually hack systems to obtain the personal information of victims. There are many types of cybercrimes. There are four types of cybercrimes: Phishing scams, Hacking, Cyber Stalking and Cyber Bullying. This research aims to help the process analysis by the Police or investigative institutions of the private sector in knowing the results of public sentiment on social media related to current cyber crimes. Ciber Crime identifying using machine learning techniques, based sentiment analysis. Method used for sentiment analysis related to cybercrime is Random Forest, Naïve Bayes, and KNN. The highest accuracy value of the three methods tried is the Naive Bayes algorithm of 99.45%. The highest precision value uses the Naive Bayes algorithm of 99.80%, and the highest recall value uses the random forest algorithm of 100%.
APA, Harvard, Vancouver, ISO, and other styles
5

Neufeld, Derrick J. "Understanding Cybercrime." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sukhai, Nataliya B. "Hacking and cybercrime." In the 1st annual conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chechulin, Andrey, and Maxim Gorda. "Cybercrime Investigation Model." In 2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2024. http://dx.doi.org/10.1109/comsnets59351.2024.10427215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fatkieva, Roza R., Anton S. Sudakov, and Danil O. Dedov. "Network Cybercrime Analysis." In 2024 XXVII International Conference on Soft Computing and Measurements (SCM). IEEE, 2024. http://dx.doi.org/10.1109/scm62608.2024.10554078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Korczynski, Maciej, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, and Cristian Hesselman. "Cybercrime After the Sunrise." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196494.3196548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jirovský, Václav, Andrej Pastorek, Max Mühlhäuser, and Andrea Tundis. "Cybercrime and Organized Crime." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233288.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybercrime"

1

Thomas, Douglas. Cybercrime losses:. Gaithersburg, MD: National Institute of Standards and Technology, April 2020. http://dx.doi.org/10.6028/nist.ams.100-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chargualaf, Jr, and Joseph. Terrorism and Cybercrime. Fort Belvoir, VA: Defense Technical Information Center, May 2008. http://dx.doi.org/10.21236/ada488040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Antonova, Gergana, Niya Prisadashka, Radoslav Dimitrov, Ioan Yonkov, Daniel Radev, Hristo Pavlov, Mario Mladenov, and Ilian Grigorov. Cybercrime Strategy (modeling example). Procon, 2023. http://dx.doi.org/10.11610/it4sec.0149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

García Zaballos, Antonio, and Félix González Herranz. From Cybersecurity to Cybercrime: A Framework for Analysis and Implementation. Inter-American Development Bank, September 2013. http://dx.doi.org/10.18235/0009138.

Full text
Abstract:
This technical note outlines a framework for the analysis of cybersecurity, presenting considerations that are crucial to the success of a holistic and transversal cybersecurity strategy. It describes two essential pieces of the analysis: the broadband ecosystem and the basic terminology and concepts of cybersecurity systems. These two pieces serve as a basis for the introduction and description of five Priority Action Pillars (PAPs), which represent five clear lines of action that any government should embrace and implement in developing an effective cybersecurity strategy. The five PAPs are complemented by four horizontal recommendations that encompass a comprehensive cybersecurity analysis framework.
APA, Harvard, Vancouver, ISO, and other styles
5

Saalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Crossover and Its Escalatory Risks for Europe. Stockholm International Peace Research Institute, September 2023. http://dx.doi.org/10.55163/siep1930.

Full text
Abstract:
The crossover between cybercrime and cyberwarfare has intensified in recent years, particularly against the backdrop of the ongoing conflict in Ukraine and mounting tensions of China and Russia with the United States. This paper delves into specific cyber incidents that employ cybercrime tactics with cyberwarfare objectives, allegedly involving Chinese, Russian or US actors. It examines responses within and among the private sector, the public sector and international forums. Although not directly involved in all of the cases, the European Union (EU) was impacted in a variety of ways, both as a result of spillover effects and intentional targeting. Drawing upon an examination of cyber incidents, this paper highlights how emerging trends in actors, means and responses present escalatory risks for the EU while emphasizing the pressing need to bolster cybersecurity measures.
APA, Harvard, Vancouver, ISO, and other styles
6

Keefer, Philip, Dino Caprirolo, Heather Sutton, José Antonio Mejía-Guerra, Ted Leggett, Iván Torre, James Andrew Lewis, Laura Jaitman, and Rogelio Granguillhome Ochoa. The Costs of Crime and Violence: New Evidence and Insights in Latin America and the Caribbean (Executive Summary). Inter-American Development Bank, February 2017. http://dx.doi.org/10.18235/0006383.

Full text
Abstract:
This publication is the first to provide a comprehensive, systematic and rigorous analysis of the costs of crime in Latin America and the Caribbean. The main challenges in the region are addressed: the social cost of homicides, private and public spending on security, the penitentiary crisis, violence against women, organized crime and cybercrime. The volume estimates that the direct cost of crime for 17 LAC countries in 2010-2014 is, on average, 3.5 percent of the region's GDP--twice as much as in the developed world. This volume also provides a detailed analysis of the costs of crime in Brazil by state, as well as an examination of the geographical distribution and drivers of crime in the most dangerous subregions: the Northern Triangle in Central America and the Caribbean. The situation in terms of violence against women and cybercrime is assessed: the region is lagging behind to confront these new and old crimes. The complete version of this publication is available at https://publications.iadb.org/handle/11319/8133.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmed, Zahid Shahab, Ihsan Yilmaz, Shahram Akbarzadeh, and Galib Bashirov. Digital Authoritarianism and Activism for Digital Rights in Pakistan. European Center for Populism Studies (ECPS), July 2023. http://dx.doi.org/10.55271/rp0042.

Full text
Abstract:
In recent years, Pakistan has witnessed the emergence of digital authoritarianism as a governing strategy. This involves using digital technologies and surveillance mechanisms to control and monitor online activities. The government has implemented legislation like the Prevention of Electronic Crimes Act (PECA) to regulate cyberspace. However, the vague definitions of cybercrime within PECA and the broad surveillance powers granted to agencies such as the FIA and ISI raise apprehensions about potential abuses of power.
APA, Harvard, Vancouver, ISO, and other styles
8

Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, January 2024. http://dx.doi.org/10.26735/orro4624.

Full text
Abstract:
Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1. The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a deep web search, collecting, analyzing, and classifying data on ransomware gangs targeting Arab countries and organizations from 2020 to 2022. We have collected the information of ransomware victims through the darknet and dark web, focusing on leaked information. This report focuses on the Arab countries, organizations, and sectors victimized by ransomware gangs and whose information has been leaked on the darknet. Moreover, it investigated ransomware gangs that carried out cyberattacks against Arab countries, and the tactics, techniques, and procedures (TTPs) they were using. The number of organizations that are attacked by ransomware gangs is increasing significantly. Some organizations pay ransom to ransomware gangs in order not to publish their information on the darknet. As a result of not paying the ransom demanded by the ransomware gangs, certain organizations and countries had their private and sensitive data leaked to the dark web. The purpose of this report is to help law enforcement agencies combat ransomware cyberattacks by providing them with insights into the evolving tactics of ransomware gangs. By understanding how these gangs operate, law enforcement agencies can better prepare to combat and respond to ransomware attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Cong, Lin William, Campbell Harvey, Daniel Rabetti, and Zong-Yu Wu. An Anatomy of Crypto-Enabled Cybercrimes. Cambridge, MA: National Bureau of Economic Research, January 2023. http://dx.doi.org/10.3386/w30834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hakmeh, Joyce, Emily Taylor, Allison Peters, and Sophia Ignatidou. The COVID-19 pandemic and trends in technology. Royal Institute of International Affairs, February 2021. http://dx.doi.org/10.55317/9781784134365.

Full text
Abstract:
Focusing on the dynamics between governments and big tech, on cybercrime, and on disinformation and fake news, this paper examines some of the risks that have been highlighted and aggravated as societies have transitioned at speed to a more virtual way of living. The COVID-19 pandemic has been called the ‘great accelerator’ of digital transformation, with technology at the forefront of countries’ response to the crisis. The experience of the past year has underscored that tech governance must be based on human-centric values that protect the rights of individuals but also work towards a public good. In the case of the development of track-and-trace apps, for instance, a successful solution should simultaneously be both respectful of individual privacy and robust from a cybersecurity perspective, while also effectively serving essential epidemiological goals. Ensuring a sound approach to tech policy has been made all the more complex by the context of the pandemic, as decision-makers have found themselves having to respond swiftly and decisively in a public health emergency. While there is considerable uncertainty as to the long-term consequences of their responses, the paper’s authors emphasize that a whole-of-society approach is needed that will restore and build greater public trust in the ability of governments and public-serving bodies to protect them, respect their rights and ensure the information they receive is solid and reliable.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography