Cybercriminal Activity Hemavathy Alaganandam – The Evolution of Cybercrime

نویسنده

  • Pravin Mittal
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Network Identification Model on Open Social Network

Today the number of cybercrimes increases very rapidly, this cause large financial loss to many organizations. Existing cybersecurity technologies are not effective enough to protect organizations from this cyber attack; this is because existing cyber security solutions are weak in cybercrime forensic and predictions. This paper present development of a novel weakly supervised cybercriminal net...

متن کامل

How to Become a Cybercriminal? An Explanation of Cybercrime Diffusion

The main purpose of this chapter is to illustrate a landscape of current literature in cybercrime taking into consideration diffusion of innovation theories and economic theory of competition. In this chapter, a narrative review of the literature was carried out, facilitators leading to cybercrime were explored and explained the diffusion of Cybercriminals’ best practices. Cybercrime is compati...

متن کامل

Cybercrime and Punishment: An Analysis of the Deontological and Utilitarian Functions of Punishment in the Information Age

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

متن کامل

Data mining technology for countering cybercrime A computational intelligence perspective

Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...

متن کامل

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005