16,192 research outputs found

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Get PDF
    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war

    CYBER CRIME

    Get PDF
    Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internetcyber crime, criminal activities, cyberspace, illegal action, IT systems

    Cyber Crime

    Get PDF
    Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years

    Cyber Crime and Security

    Get PDF
    Cyber crime is the activities made by the people for destroying organization’s network, stealing other’s valuable data, documents hacking bank account and transferring money to their own and so on. This paper describes the detailed information regarding cyber crime, it’s types, modes os cyber crime and security measures including prevention to deal effectively with cyber crime

    Analisa Pengelompokan Cyber Crime Pada Penerapan Electronic Commerce

    Get PDF
    The rapid development of Information Technology (IT) greatly influences human needs and activities. One influence occurs in buying and selling transactions carried out by two parties, namely consumers and producers or more online. The transaction process is E-commerce (Electronic Commerce). Internet use certainly has risks, one of which is Cyber Crime. Cyber Crime is a crime committed in the internet world involving individuals or groups. Types of Cyber Crime consist of hacking, craking, sniffing and so forth. Cyber Crime cases are grouped into 4 groups namely Interruption, Interception, Modification, and Fabrication. This study uses a literature study method that analyzes 21 journals that discuss Cyber Crime in E-Commerce. The purpose of this study is to determine the Cyber Crime that often occurs in E-Commerce. The results of this study provide recommendations that can be used for developers related to the Cyber Crime group that need to be watched out and prevented.Keywords- E-Commerce, Cyber Crim

    Assessment of Cybercrime Governance in Ethiopia Since 2004

    Get PDF
    Communication technology is a recent phenomenon that links countries of the world together. Like other countries of the world Ethiopia also interconnected to global net work via internet technology and committed to expansion of the technology at home to substantiate its economic, social and political advancement goal. However, as a result of digitalization effort at home, the country becomes both source and target of cyber crime. Hence, in order to curb cyber crime, the government of the country engaged in to various activities and this work assess the initiatives under taken by Ethiopian government in the area of cybercrime governance. To do so, the research employs qualitative research methods and secondary source of data.To discharge its global responsibility and prevent itself from cyber crime, Ethiopian government works hard and undertakes various measures. Hence, the government begins its work of fighting cyber crime for the first time by initiating criminal code in 2004 that penalize limited cyber crime in the country. As such, the first initiatives followed by scattered legislations which cover limited area of cyber crime like Telecom fraud offense legislation, National payment system proclamation and recently computer crime proclamation. Similarly, the government also initiates policy measures like ICT policy and strategy, National information security policy and Criminal justice policy. To implement these policies and legislations the government also establishes various institutions.However, these all legislations and policy initiatives are inadequate in cyber crime governance in Ethiopia, due to failure of government to couple its unilateral effort and commitment of fighting cyber crime with transnational cooperation and capacity building. Hence, there is no meaning full and continues capacity building undertaken by Ethiopian government. As a result, there is gap of knowledge and human resource in the country related to cyberspace which in turn creates fertile ground for cyber crime. Ethiopian government also does not engaged into comprehensive and functional transnational cooperation and dormant to be party to any regional and international cyber crime convention. Thus, its domestic effort to fight cyber crime become less significant since cyber crime is borderless. Therefore, in order to successfully defense cyber crime, Ethiopian government should complement its domestic initiative by continues capacity building and transnational cooperation.On the other hand, legislated cyber crime in Ethiopia also infringes freedom of expression and privacy right of peoples. Thus, government should work hard to ensure compatibility within international human right law and cyber crime law as much as possible. DOI: 10.7176/NMMC/96-01 Publication date:May 31st 202

    Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity

    Get PDF
    A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants were asked to self-report their cyber crime engagement, and pre-employment integrity. Results indicated that the anonymity manipulation had a main effect on self-reported cyber crime engagement. The results also showed that there is a statistically significant negative relationship between self-reported cyber crime engagement and pre-employment integrity. Suggestions for future research are also discussed

    Analisa Pengelompokan Cyber Crime Pada Penerapan Electronic Commerce

    Get PDF
    The rapid development of Information Technology (IT) greatly influences human needs and activities. One influence occurs in buying and selling transactions carried out by two parties, namely consumers and producers or more online. The transaction process is E-commerce (Electronic Commerce). Internet use certainly has risks, one of which is Cyber Crime. Cyber Crime is a crime committed in the internet world involving individuals or groups. Types of Cyber Crime consist of hacking, craking, sniffing and so forth. Cyber Crime cases are grouped into 4 groups namely Interruption, Interception, Modification, and Fabrication. This study uses a literature study method that analyzes 21 journals that discuss Cyber Crime in E-Commerce. The purpose of this study is to determine the Cyber Crime that often occurs in E-Commerce. The results of this study provide recommendations that can be used for developers related to the Cyber Crime group that need to be watched out and prevented.Keywords- E-Commerce, Cyber Crim

    PENEGAKAN HUKUM OLEH APARAT PENYIDIK CYBER CRIME DALAM KEJAHATAN DUNIA MAYA (CYBER CRIME) DI WILAYAH HUKUM POLDA DIY

    Get PDF
    Kejahatan cyber crime saat ini sering terjadi dan korbannya tidak hanya orang, tetapi lembaga/instansi, bahkan Negara, hal ini dikarenakan perkembangan teknologi informasi dan internet yang cepat dan keterikatan manusia akan teknologi informasi, dari hal tersebut menimbulkan kejahatan teknologi dengan berbagai kepentingan. Pada tindak pidana cyber crime khususnya dalam penegakan hukumnya masih terdapat kendala-kendala yang mana dari faktor internal dan faktor eksternal penyidik cyber crime. Penulis melakukan penelitian hukum normatif dan penelitian dengan metode pengumpulan data study pustaka dan wawancara dengan Penyidik cyber crime. Hasil dari penelitian ini, yaitu dalam hal kendala penegakan hukum ditingkat penyelidikan dan penyidikan tindak pidana cyber crime yaitu dapat dibagi menjadi dua faktor yakni faktor internal dan eksternal penyidik cyber crime yang terdiri dari beberapa aspek yakni aspek penyidik, alat bukti, fasilitas pendukung dan yurisdiksi, dalam hal proses penyelidikan dan penyidikan yaitu dalam hal hukum materil pada tindak pidana cyber crime diatur secara khusus yakni undang- undang Nomor 19 tahun 2016 tentang perubahan atas undang- undang Nomor 11 tahun 2008 tentang ITE
    corecore