Cyber Crime

Authors

  • Ankita Lokhande F.Y. Diploma Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Aishwarya Sathe F.Y. Diploma Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Bharti Jadhav F.Y. Diploma Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Saniya Mulani F.Y. Diploma Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Sakshi Tingare F.Y. Diploma Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Ms. Sawant V. N. Lecturer, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author

DOI:

https://doi.org/10.29070/8txfjw09

Keywords:

Cybercrime, E-Crime, Cyber Security, Computers, Internet, Social Media, Cyber Laws

Abstract

The world has progressed in terms of communication, particularly since the introduction of thenet. The increase of cybercrime, often referred to as e-crimes (electronic crimes), could be a majorchallenge confronting today's society. Thus, e-crimes pose threats to nations, organizations andindividuals across the world. It’s expanded to several parts of the world, and legion individuals becamevictims of cybercrime. Given the intense nature of e-crimes, its global nature and implications, it's clearthat there's an important need for a standard understanding of such criminal activity internationally tohouse it effectively. The definitions, types, and incursions of e-crime are all covered during this study.It’s also focused on the legislation in situ to combat e-crime in various countries. Cyber security andsearching methods to induce secured are a part of the study.

Downloads

Download data is not yet available.

References

Abdulaziz Alarifi, Holly Tootell, and Peter Hyland. (2012). A study of information security awareness and practices in Saudi Arabia. International Conference on Dispatches and Information Technology (ICCIT) (pp. 6-12).

Alex Antoniou and Gauri Sinha. (2012). Laundering sexual deviance: Targeting online pornography through anti-money laundering. European Intelligence and Security Informatics Conference (pp. 91- 98). Odense: IEEE.

Alex Roney Mathew , Aayad Al Hajj , and Khalil Al Ruqeishi. (2010). Cybercrimes: Threats and protection. International Conference on Networking and Information Technology (pp. 16-18). Manila: IEEE.

Alexios Mylonas, Anastasia Kastania, Dimitris Gritzalis. (2012). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, pp. 47-66.

Aloul, F. A. (2010). Information Security Awareness in UAE: A Survey Paper. Internet Technology and Secured Transactions (ICITST), 2010 International Conference (pp. 1-6). London: IEEE.

Downloads

Published

2022-03-01