Cyber Crime and Security

Authors(2) :-Nisarg C Joshi, Jaydipsinh B Thakor

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in India and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting cybercrime. Cybercrime falls into three categories: (1) a computer is the target of criminal activity; (2) the computer is the tool used or is integral to the commission of the crime; and (3) the computer is only an incidental aspect of the crime. Cybercrime is a relatively new phenomenon. Services such as telecommunications, banking and finance, transportation, electrical energy, water supply, emergency services, and government operations rely completely on computers for control, management, and interaction among themselves. Cybercrime would be impossible without the Internet. Most American businesses maintain WWW sites and over half of them conduct electronic commerce on the Internet. The rise in popularity of the Internet for both private persons and businesses has resulted in a corresponding rise in the number of Internet-related crimes.

Authors and Affiliations

Nisarg C Joshi
Assistant Professor, Physics(EC) Department, Ratnamani Science College, Becharaji, Mehshana, Gujarat, India
Jaydipsinh B Thakor
Computer Lab Assistant, Computer Department, Ratnamani Science College, Becharaji, Mehshana, Gujarat, India

Cyber Crime, Cyber Security

  1. Prof. Briere, E. (1966). Quantity before quality in second language composition. Language Learning 16, 141-151.
  2. Bums, H. & Culp, G. (1980, August). Stimulating invention in English composition through computer Assisted instruction. Educational Technology, 5-10.
  3. Daedalus Integrated writing environment [Computer software). (1994). Austin, TX: The Daedalus Group, Inc.
  4. Keirn, W. (1989). The writing-grammar battle: Adventures of a teacher/administrator. Engllsh Journal, 78, 66-70.
  5. Brewin, B., UPS to spend $127M on tri-mode wireless driver terminals. http://www.computerworld.com
  6. Haskin, D., Motient Files for Chapter 11. http://www.internetnews.com
  7. The switch from CDPD to GPRS. http://www.airlink.com/
  8. ARDIS, DataTac 4000, Software Developers Reference Guide, Revision 2.0
  9. Goldsmith, C., Wireless Local Area Networking for Device Monitoring. University Of Rochester, Rochester NY.
  10. IEEE Std 802-2002, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, page 1, section 1.2: "Key Concepts", "basic technologies"
  11. Karunakar Pothuganti and Anusha Chitneni “A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, Wi-Fi", Advance in Electronic and Electric Engineering, ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 655-662

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2018
Date of Publication : 2018-12-03
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 143-146
Manuscript Number : CSEIT183834
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Nisarg C Joshi, Jaydipsinh B Thakor, "Cyber Crime and Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.143-146, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183834
Journal URL : https://res.ijsrcseit.com/CSEIT183834 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview