1,337 results on '"Cyber crime"'
Search Results
2. Implementation of Recent Advancements in Cyber Security Practices and Laws in India
- Author
-
Kumar, Bura Vijay, Singh, Manvendra, Arora, Vaishali, Malik, Khushboo, Nomani, M. Z. M., Kapila, Dhiraj, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Kumar, Amit, editor, Gunjan, Vinit Kumar, editor, Senatore, Sabrina, editor, and Hu, Yu-Chen, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Challenges and Threats of Cybercrime in Indonesia: A Review of Legal and Information Technology Aspects Related to Ransomware Attacks on Indonesia's National Data Center.
- Author
-
Sunggara, Muhamad Adystia and Hariansah, Syafri
- Subjects
INFORMATION technology ,DIGITAL forensics ,ARTIFICIAL intelligence ,APPLICABLE laws ,LAW enforcement agencies - Abstract
This article discusses the challenges and threats to cybercrime in Indonesia, focusing on two main aspects--law and information technology. Through an indepth analysis of the applicable laws and regulations and the development of information technology, this study aims to identify the weaknesses and challenges faced in combating cybercrime in Indonesia. Additionally, this article presents several recommendations for improving the effectiveness of cybercrime threats. This research methodology is based on studies and analyses related to the potential threats and challenges of cybercrime from the aspects of legal and information technology, as described in several modern publications. This study used a qualitative approach and secondary data analysis. Recommendations that can be drawn from this study include the need to improve infrastructure and human resources in the security field and increase investment in training and human resources for law enforcement agencies. This can consist of more intensive training programs in information technology crime, data risk recovery management, coordination and cooperation between the public and private sectors, and adaptation and development of real-time threat-monitoring technology using artificial intelligence. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Restoring @bajuyuli Business Image on Instagram Social Media in Facing the Threat of Cyber Crime Phishing.
- Author
-
Zianisya, Salwa Rahma, Rosyidudin, Eki, Khotimah, Ima Khusnul, Nurfalah, Farida, and Wihayati, Welly
- Subjects
- *
PHISHING , *CYBERTERRORISM , *CORPORATE image , *DATA security - Abstract
This research has a background regarding phishing and business image. This study aims to find out the recovery of business image by the @bajuyuli team and to find out the efforts to prevent cyber crime phishing by the @bajuyuli team. This research uses qualitative data analysis methods and techniques. The technique for determining informants in this study uses the purposive sampling technique. The purposive sampling technique is a method of selecting samples based on the desired goal by the researcher. With this technique, the researcher used three informants consisting of, @bajuyuli business owners, Instagram @bajuyuli admins, and customer @bajuyuli. The results of the research emphasized the importance of transparency, data security, and the role of Public Relations in overcoming crises and strengthening business reputations in the digital world. Efforts to combat such attacks require quick and effective recovery measures, as well as increased cybersecurity awareness among business owners and teams. This research provides insight into the importance of protecting business image from cyber attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Digital Evidence and Proving Cybercrime "Between High Technology and Law Constraints".
- Author
-
Yousfi, Rihab and Louarem, Wahiba
- Subjects
- *
DIGITAL technology , *INFORMATION technology , *CRIMINAL evidence , *ELECTRONIC evidence , *LEGAL documents - Abstract
The advent of the Internet and the development of information technology have led to new forms of criminality. Technology is now used both as a means of committing crimes and as an object of crimes. Consequently, law enforcement agencies must adapt to these new forms of criminal evidence. It is essential to develop evidence-gathering methods that align with advancements in cybercrime. This evolution has given rise to a new form of evidence derived from the digital environment. Such evidence presents unique challenges due to its privacy concerns and continuous development. The distinct nature of the digital environment necessitates criminal legal provisions that are compatible with it. Therefore, a reconsideration of the procedural aspects of the adopted criminal policy is required. [ABSTRACT FROM AUTHOR]
- Published
- 2024
6. THE STAND OF ELECTRONIC EVIDENCE IN CYBER CRIME LAW ENFORCEMENT IN INDONESIA.
- Author
-
Ratnaning Dhumillah, Dewic Sri
- Subjects
- *
ELECTRONIC evidence , *ELECTRONIC records , *LEGAL evidence , *LAW enforcement , *ELECTRONIC systems - Abstract
Crime in the cyber world certainly has a significant impact. People think that Indonesia has a Criminal Code that cannot cover crimes in cyberspace, which is a new crime. This is what makes the government have to issue regulations regarding cyber crime or cyber crime. With regard to enforcing cybercrime law, of course, a regulation is needed in positive law. It also regulates the punishment and how the evidence for cyber crimes and the position of electronic evidence are. This research method uses the normative method. The existence of electronic evidence in proving cybercrime has been alluded to in Law Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Information and Electronic Transactions. In Article 5 of Law Number 11 of 2008, it explicitly mandates that "Electronic Information and/or Electronic Documents and/or their printouts are valid legal evidence". This can be interpreted that electronic documents are considered legally valid according to positive law in Indonesia. However, in the amendment to the elucidation of Article 5 paragraph (1) regulated in Law Number 19 of 2016, it is explained that the existence of Electronic Information and/or Electronic Documents is binding and recognized as valid evidence to provide legal certainty for the Implementation of Electronic Systems and Transactions Electronic, especially in proving and matters relating to legal actions carried out through Electronic Systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Digital Reconstruction: A Critical Examination of the History and Adaptation of Ku Klux Klan Websites.
- Author
-
Kingdon, Ashton and Winter, Aaron
- Subjects
- *
DIGITAL technology , *WORLD Wide Web , *CORPORATE culture , *QUALITATIVE research , *DIFFUSION of innovations , *RESEARCH funding , *STATISTICAL sampling , *COMMUNITIES , *WHITE people , *RACISM , *THEMATIC analysis , *COMMUNICATION , *PRACTICAL politics - Abstract
In response to the data revolution, academic research and media attention have increasingly focused on the technological adaptation and innovation displayed by the far right. The greatest attention is paid to social media and how groups and organizations are utilizing technological advancement and growth in virtual networks to increase recruitment and advance radicalization on a global scale. As with most social and political endeavors, certain technologies are in vogue and thus draw the attention of users and regulators and service providers. This creates a technological blind spot within which extremist groups frequently operate older and less well regarded technologies without the oversight that one might expect. This article examines the less well-studied traditional and official websites of the Ku Klux Klan, the most established and iconic of American far-right organizations. By incorporating non-participant observation of online spaces and thematic analysis, this research analyzes the evolution of 26 websites, from their emergence in the early 1990s to the present day. We examine the ways in which traditional printed communications and other ephemera have progressed with advances in technology, focusing on the following central elements of Klan political activism and community formation: Klan identity, organizational history, aims and objectives; technology and outreach, including online merchandise and event organization; and the constructions of whiteness and racism. The results add value and insight to comparable work by offering a unique historical insight into the ways in which the Klan have developed and made use of Web 1.0, Web 2.0, and Web3 technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Brute forcing on secured shell servers emphasising the role of cyber forensics – a quali-quantitative study.
- Author
-
Raj, Atul, Chauhan, Mohit, Chhoker, Virender Kumar, Rani, Mukta, Singh, Bajrang Kumar, D'Souza, Roshan, and Bodwal, Jatin
- Subjects
CRIME prevention ,DATA security ,QUALITATIVE research ,DATA security failures ,FORENSIC sciences ,QUANTITATIVE research ,INTERNET ,CLOUD computing - Abstract
Background: Increasing numbers of cyber attacks threaten us personally and professionally. Cyber crimes include obtaining sensitive information (medical or financial) but may extend to organising heinous crimes including murders and aggravated sexual assaults. A major vector of cyber crimes is brute force attacks on secured shell servers. Aim of study: This research highlights the prevalence of the intensity of brute force attacks on secured shell servers via quali-quantitative analysis of cyber attacks. Methodology: The brute force attacks were recorded over a period of 20 days with the help of logs taken from five dedicated servers installed in a production environment. Results: There were a minimum of 6470 and maximum of 22,715 attacks on a server per day. The total number of attacks on all the servers during the study period was 1,065,920. The brute force attacks were mainly targeted at the service network accounts. Conclusion: Growth of the field of cyber forensics is the optimal solution to prevent the malicious use of internet services and the commissioning of crimes by this means. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Cyber Fraud with Profile Cloning Mode in The Perspectives of Cyberculture and Space Transition Theory.
- Author
-
Yulistiyo, Wily, Fadillah, Firman, and Gibran, Andi
- Subjects
COMPUTER fraud ,SOCIAL media ,CYBERCULTURE ,DIGITAL technology ,SOCIAL accounting - Abstract
This study aims to investigate whether there are still any society who do not understand cyber culture on social media which then has the potential to become victims of cyber fraud crimes. In the digitalization era 4.0, people tend to use technology to do various activities and meet their needs, including online transactions for goods and services using various digital platforms and social media. The high activity on the Internet is also accompanied by opportunities for crimes by utilizing the internet media. One of the cases that is increasingly occurring in the digitalization era is cyber fraud with profile cloning mode. The author is interested in studying cyber fraud in Wajo Police because the mode used was profile cloning, which used the profile of a law enforcer to make fictitious buying and selling. This study used a qualitative approach and a case study method to conduct an in-depth analysis of cyber fraud cases with profile cloning mode. The results of the study show that there are still people who do not understand cyberculture on social media, so they have the potential to be victims of cyber fraud crimes. Moreover, the results of the study also show that perpetrators commit cyber fraud with profile cloning mode due to the pressure in real life and the ease of cloning accounts on social media. Thus, such circumstances provoke perpetrators to shift their evil deeds to cyberspace. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Cyber Crime Communication Patterns Impulsive Purchase Behavior of NCT 127 "The Unity Jakarta" Concert Tickets on X (Twitter).
- Author
-
Julianti, Hayati, Ainaya, Sukma, Azzahra, Tamela, and Andriany, Dian
- Subjects
- *
COMPUTER crimes , *TELEMATICS , *ELECTRONIC ticketing , *SOCIAL media - Abstract
Technological advances have changed the way humans interact and make it easier for humans to make buying and selling transactions, but behind the positive side of technology, of course, there is a negative side that can be detrimental. One of the cases that is rampant on social media (Twitter) is concert ticket fraud. The goal of the study was to identify the communication patterns that scammers engage in when selling concert tickets and understand how a person can become a victim of online fraud through the social media platform Twitter. Seven key informants of this research are victims of fraudulent ticket purchases for NCT 127 concert "The Unity Jakarta" on Twitter. The research method used is qualitative descriptive with data sources through interviews with 7 informants and observation through the Twitter accounts of the informants. This study uses the theory of Computer Mediated Communication (CMC). Based on the results of the research, the communication pattern that occurs is that fraudsters use evidence in the form of e-tickets as collateral and an excuse to sell tickets under the pretext of having excess tickets to attract the attention of victims who are in need of concert tickets. The findings indicate that the victim made a hasty purchase of concert tickets without considering the negative consequences, known as impulse buying. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. CHALLENGES OF INDONESIAN INDUSTRIALIZATION AND TRADE PROBLEMS IN THE INDUSTRIAL ERA 4.0 FOR THE INDONESIAN ECONOMY AND GOVERNMENT POLICY BREAKTHROUGH.
- Author
-
Kusumawati, Yuli Noor and Indarto, Seto
- Subjects
- *
INTERNET fraud , *INDUSTRIAL policy , *INVESTMENT fraud , *ARTIFICIAL intelligence , *GOVERNMENT policy , *COMPUTER crimes - Abstract
Industry 4.0 was born in 2011, for Indonesia it has brought benefits to industrialization and trade starting from 24-hour production automation, time efficiency because the process is fast and connected to the internet for unlimited distances with the help of internet signals, saving minds because AI-based technology is able to think to answer our questions and the ability to store and provide big data, production and trading costs are clearly more efficient because paperless, sending data without couriers, calculating the use of production inputs is more accurate so it is more economical. However, besides the advantages, there are also many challenging problems in Indonesia, starting from misuse of online media platforms, cyber crime (illegal taking of company data/hacking, misuse of other people's personal data for online fraud and illegal investment) which causes state losses of more than Rp. 232, 646 trillion until 2023. Therefore, the government has issued a policy breakthrough in the form of policies that have a broad impact and legal regulations that provide strict limits and sanctions [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. الوعي بالجريمة السيبرانية القائمة على منصات التواصل الاجتماعي: دراسة استكشافية على المجتمع العماني
- Author
-
شيرين عبد الجواد أحمد, محمد بن خميس عبد الله الحربي, and محمود علي موسى
- Abstract
Copyright of International Journal of Research in Educational Sciences (IJRES) is the property of International Journal of Research in Educational Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
13. Promoting Cyber Ethics Compliance among Teachers in Tanzania: What should be done?
- Author
-
Hamisi Mfaume and Margareth Bilinga
- Subjects
cyber ethics ,cyber crime ,compliance ,teacher ethics ,Theory and practice of education ,LB5-3640 - Abstract
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders’ perspectives on ways to promote teachers’ compliance with cyber ethics in Tanzania. It employed a qualitative case study design involving three secondary schools and 27 participants selected purposively in Kinondoni Municipality in the Dar es Salaam region. Data were sought through semi-structured interviews and document reviews and subjected to thematic data analysis. The findings indicated that teachers’ compliance with cyber ethics requires training of teachers on the pedagogical uses of technology, the inception of a specific national policy for the responsible use of technology in schools, integration of the cyber ethics aspects of the Teachers’ Code of Conduct, improvement of teachers’ living and working conditions, and promotion of teachers’ awareness of the Cyber Crimes Act of 2015, among others. The study recommends that policymakers and education authorities implement the suggested initiatives to promote cyber ethics compliance among teachers for education excellence in Tanzania, and, possibly, elsewhere.
- Published
- 2024
- Full Text
- View/download PDF
14. Feasibility Study of Using Blockchain Technology for Criminal Records in Central Java
- Author
-
Puspa Ira Dewi Candra Wulan, Rofiq Fauzi, Danis Putra Perdana, Muhamad Eko Alfianto, Clarissa Monique Maharani, and Yudha Satria Abdi Susila
- Subjects
blockchain ,criminal record ,cyber crime ,smart contracts ,data security ,Cybernetics ,Q300-390 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A criminal record is an official document filed with the police that contains a person's criminal history. In practice, managing criminal record data is not easy, the complex challenge is the risk of data manipulation. Data manipulation is carried out for various purposes, one of which is deleting or changing data for certain purposes. The increase in cyber crime in Indonesia does not rule out the possibility that criminal record data will be hacked. Blockchain technology, through smart contracts, is an innovative solution to overcome the problem of data manipulation. Blockchain as an immutable distributed digital ledger, provides guarantees of data security and integrity. By adopting smart contracts in data collection, it can increase the speed of information access, reduce the risk of manipulation and provide a high level of transparency. A feasibility study regarding the importance of implementing Blockchain technology for storing criminal records needs to be carried out before deciding to realize this technology. The aim of this research is to analyze how important it is that criminal record data must be secured using Blockchain technology in Central Java. Qualitative methods were used in this research, data collection was carried out using interview techniques with predetermined sources
- Published
- 2024
- Full Text
- View/download PDF
15. A Quantile Regression for Computer Crimes Act in Thailand
- Author
-
Chansong, Suphanit, Phadkantha, Rungrapee, Wiranya, Puntoon, Kacprzyk, Janusz, Series Editor, Novikov, Dmitry A., Editorial Board Member, Shi, Peng, Editorial Board Member, Cao, Jinde, Editorial Board Member, Polycarpou, Marios, Editorial Board Member, Pedrycz, Witold, Editorial Board Member, Kreinovich, Vladik, editor, Yamaka, Woraphon, editor, and Leurcharusmee, Supanika, editor
- Published
- 2024
- Full Text
- View/download PDF
16. New frontiers: i) Cryptocurrency, ii) Decentralised Finance (DeFi), & iii) Non-Fungible Tokens (NFT)
- Author
-
Smith, Duncan and Smith, Duncan
- Published
- 2024
- Full Text
- View/download PDF
17. The Importance of the Computer Undercover Agent as an Investigative Measure Against Cybercrime: A Special Reference to Child Pornography Crimes
- Author
-
Valiño Ces, Almudena, Casanovas, Pompeu, Series Editor, Sartor, Giovanni, Series Editor, Carneiro Pacheco de Andrade, Francisco António, editor, Fernandes Freitas, Pedro Miguel, editor, and de Sousa Covelo de Abreu, Joana Rita, editor
- Published
- 2024
- Full Text
- View/download PDF
18. PERETASAN SITUS MILIK DEWAN KEHORMATAN PENYELENGGARA PEMILU OLEH H DITINJAU DARI UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK
- Author
-
Felicia Shadily, Go Lisanawati, and Peter Jeremiah Setiawan
- Subjects
criminal aggravation ,cyber crime ,hacking ,Law - Abstract
Tindakan peretasan terhadap situs milik Dewan Kehormatan Penyelenggara Pemilu (DKPP) dan analisis hukumnya berdasarkan Undang-Undang Informasi dan Transaksi Elektronik (UU ITE). H, pelaku peretasan, dijerat dengan Pasal 32 ayat (1) jo. Pasal 48 ayat (1) UU ITE. H memenuhi unsur sebagai warga negara Indonesia yang sengaja, tanpa hak, mengubah informasi elektronik DKPP. Situs pemerintah tersebut diretas dan diubah tampilannya menjadi melanggar norma. Putusan pengadilan menyatakan H bersalah, namun terdapat kekhilafan dalam penerapan pasal yang tidak mempertimbangkan situs milik pemerintah. Analisis hukum menyoroti pemberatan pidana berdasarkan Pasal 52 ayat (3) UU ITE, mempertimbangkan dampak cybercrime pada sistem pemerintah dan layanan publik. Penelitian juga mengeksplorasi konsep informasi elektronik dan urgensi UU ITE dalam memberikan perlindungan hukum. Terbukti bahwa perbuatan H melawan hukum, tidak ada alasan pembenar yang menghapuskan sifat melawan hukum, sehingga H dapat dipertanggungjawabkan pidana sesuai UU ITE.
- Published
- 2024
- Full Text
- View/download PDF
19. Tindak Pidana Kesusilaan Di Media Sosial
- Author
-
Agustina Agustina and Sagita Purnomo
- Subjects
cyber crime ,decency ,criminal code ,social media ,law enforcement. ,Law - Abstract
This study aims to examine the elements of criminal acts of decency on social media, as well as comprehensively discuss policies and law enforcement against perpetrators of criminal acts of decency. This type of research is normative juridical with a descriptive-analytical approach discussing existing legal symptoms and problems, and testing them aware of laws and legal norms. The results of this study show that the elements of criminal acts of decency on social media as regulated by Article 281 of the Criminal Code are: whoever, intentionally, in public, distributes, distributes or transmits content that violates decency refers to the object of action in the Pornography Law. Policies and law enforcement against perpetrators of criminal acts of decency include penal policies regulated in Law Number 19 of 2016 concerning Electronic Information and Transactions, Law Number: 44 of 2008 concerning Pornography, and criminal acts of decency regulated by the Criminal Code. Non-penalty policy: supervision of sites or content on social media that contain moral content, understanding religious values from an early age, increasing healthy internet understanding, and parental supervision of minors in using social media/internet
- Published
- 2024
- Full Text
- View/download PDF
20. 网络犯罪抽样取证的实践困境与完善.
- Author
-
刘宇浩
- Abstract
Copyright of Cyber Security & Data Governance is the property of Editorial Office of Information Technology & Network Security and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
21. Kybernetická zbraň a právo: kybernetické útoky proti nemocnicím.
- Author
-
Vostoupal, Jakub and Kudláčková, Ivana
- Abstract
Copyright of Pravnik is the property of Czech Academy of Sciences, Institute of State & Law and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
22. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.
- Author
-
Alhakami, Wajdi
- Abstract
The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatorymechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of themost significant attacks that have taken place in the region. The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online. Different competency models have been devised to address the necessary cybercrime competencies in this context. The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security. To address this research query, the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory (Fuzzy-DMTAEL), Fuzzy Analytic Hierarchy Process (F.AHP), and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cybersecurity policy. The similarities and differences between the three methods are also discussed. This cyber security analysis determined that the National Cyber Security Centre got the highest priority. The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer a more empowered ITES-driven economy for Saudi Arabia. Moreover, cybersecurity specialists and policy makers need to collate their efforts to protect the country's digital assets in the era of overt and covert cyber warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Securitatea cibernetică din perspectiva respectării drepturilor și libertăților individuale.
- Author
-
Ponea, Ștefan Constantin
- Subjects
INFORMATION & communication technologies for development ,INFORMATION society ,GOVERNMENT policy ,CIVIL rights ,NATIONAL security ,NATIONAL interest ,CUSTOMER loyalty - Abstract
Th e rapid development of modern information and communication technologies has led to the building of the information society and has had a strong impact on society as a whole with major economic, social, cultural, political consequences, but especially on the everyday life of everyone citizen. Th erefore, the state, through the public policies it proposes, must aim to achieve a fair balance between the development of a dynamic information environment, based on interoperability and services specifi c to the information society, on the one hand, and ensuring respect for the fundamental rights and freedoms of citizens and of the national security interest, on the other hand. [ABSTRACT FROM AUTHOR]
- Published
- 2024
24. Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors.
- Author
-
Al-Zubaidie, Mishall and Muhajjar, Raad A.
- Subjects
DATA security ,TRUST ,WIRELESS sensor networks ,PUBLIC key cryptography ,INFORMATION technology security ,MEDICAL care ,ACCESS control - Abstract
An important reason to protect provider and medical care patient information and data is digital terrorism. Patient health records and healthcare provider information are sensitive issues that can affect patients' health or even national security. Many frequent attacks have carried out breaches on health databases/data sets continuously and on remote servers and local servers with wireless sensor networks (WSNs) in different places. Various modern approaches addressed this issue and were designed to prevent these attacks with the aim of providing the security of patient information and data transmitted and collected by WSNs. However, there are still several signs of weakness in these approaches, which are described in the literature review. This research proposes a new trustworthy approach that supports the provision of data security and information collected by WSN and stored on basestation databases. This approach takes advantage of the integration of several security mechanisms including symmetric cryptography for encryption, asymmetric cryptography for signature and access control, as well as the implementation of the Lesamnta-LW function in the signature mechanism. Solid methodology and careful use of these mechanisms protect and hide users' information from being exposed to attackers. Security analyses, investigative comparisons and rigorous findings indicate that the proposed approach is superior to previous approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. CARDING CRIME IN MAKASSAR CITY: JURIDICAL REVIEW AS AN ISSUES OF CYBERCRIME.
- Author
-
Nursalam, Muh. Fandi, Sinilele, Ashar, and Istiqamah
- Subjects
CRIME ,LEGAL norms ,LEGAL education ,CRIMINAL law ,CRIMINAL codes ,COMPUTER crimes - Abstract
Copyright of Alauddin Law Development Journal is the property of Alauddin Law Development Journal (ALDEV) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. TINDAK PIDANA PENYALAHGUNAAN DATA PRIBADI DALAM HUKUM SIBER INDONESIA.
- Author
-
Trisandi, Desmon and Sofian, Ahmad
- Abstract
Cases of private data leaks that are private in nature have been rife in Indonesia in recent years. The regulations that govern it are felt to overlap and there is no harmony and synchronization between one regulation and another. This study aims to examine and analyze the regulation of criminal acts of misuse of personal data in cyber law in Indonesia and to find out what should be about the legal protection of personal data from cyber crimes. This research is a normative research with analytical descriptive nature. The research was conducted using library research by means of document studies on primary legal materials and secondary and tertiary legal materials. The research data obtained from library and field research were then analyzed qualitatively and compiled descriptively. The first research finding is that the regulation of criminal acts of misuse of personal data in cyber law in Indonesia still stands separately in different laws and regulations, so there is no regulation that focuses specifically on protecting personal data. The legal rules in Indonesia regarding the leakage of personal data only oblige the electronic system operator to notify the data owner in accordance with Article 14 Paragraph (5) of Government Regulation Number 71 of 2019 concerning Electronic System and Transaction Operators. What should be more important than just a notification, that it must be continued into a new regulation containing the contents of guarding the process of leaking personal data that has failed to be protected by the electronic system operator, as a continuation of action in procedural law; with the inclusion of a proof system where the personal data is leaked because it was stolen, accidentally leaked, or deliberately stolen. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Risk Avoidance Behavior on Darknet Marketplaces.
- Author
-
Howell, Christian Jordan, Maimon, David, Perkins, Robert C., Burruss, George W., Ouellet, Marie, and Wu, Yubao
- Subjects
- *
RISK aversion , *AT-risk behavior , *GOSSIP , *CRIME prevention , *MARKETPLACES , *CONSUMERS - Abstract
The current study employs a quasi-experimental design to test the efficacy of situational crime prevention (SCP) in understanding risk avoidance behavior in a darknet environment. Specifically, we deployed a web scraper to extract data from a popular darknet market. We then used these data to assess change in vendors and customers' behavior following the deliverance of a warning message from the market administrator regarding the former market administrator's intention to scam market participants. In the one-month following the message, vendors posted fewer advertisements and customers spent less and made fewer transactions on the marketplace. These findings expand the scope of SCP and provide evidence for Hutchings and Holt's notion that darknet markets can be disrupted by means of gossip. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Academic misconduct, fake authorship letters, cyber fraud: Evidence from the International Political Science Review.
- Author
-
Stockemer, Daniel and Reidy, Theresa
- Subjects
- *
COMPUTER fraud , *POLITICAL science , *FRAUD , *ACADEMIC fraud , *AUTHORSHIP - Abstract
Key points: This article highlights two types of publishing fraud: fake acceptance letter and financial fraud.Prepared by a third party, fake acceptance letters affirm that a paper, which we had never received before, has been accepted by IPSR.In the financial fraud case, a third party pretends to be an editor of IPSR, sends out authentic looking fake acceptance letters and then solicits authors to pay an article processing fee (APC). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Digital Forensics in Cyber Security and Its Impact on Developing Countries.
- Author
-
Khalid, Bassam, Khalid, Assma'a, Ali, Jamal, Hussein, Mohammed, Shoaai, Mohammed, Faisal, Mohammed, and Qaid, Mohammed
- Subjects
- *
DIGITAL forensics , *INTERNET security , *COMPUTER security , *DIGITAL technology , *CYBERTERRORISM , *CYBERBULLYING ,DEVELOPING countries - Abstract
The proliferation of cloud computing and the introduction of Web technologies and the significant development in the digital technologies led to the connectivity of states and nations (developed and developing countries) worldwide in which global network provide platform for the connection. Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which are perfectly enough for the court of law to use and make a judgment based on the authenticity and objectivity of the information obtained. This work aims to study the importance of digital forensics in cyber security and its impact on developing countries and shows the tremendous growth of cyber threats and attacks in them. A systematic survey method was used for research papers in this field. As a consequence, researchers have called for the need to develop digital forensics skills in South Africa through university programs, have associated training courses, and evaluate the extent to which the current cyber security awareness initiatives address cyber security threats and risks. In most parts of the world today, especially in developing countries where computers and other digital devices are used daily on the Internet for excessive fraudulent activities, this will help eliminate and minimize computer-related crimes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
30. Evolution of Global Digital Forensics Laws and Emergent Challenges
- Author
-
Ganesan, Kaushik Thinnaneri, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Peterson, Gilbert, editor, and Shenoi, Sujeet, editor
- Published
- 2023
- Full Text
- View/download PDF
31. Confiscation of Electronic Evidence Cyber Crime in Business and Law Collaboration After Pandemic Achieving Sustainable Legal Development
- Author
-
Nusa, Idham Qrida, Sugiri, Bambang, Yuliati, Yuliati, Sulistio, Faizin, Appolloni, Andrea, Series Editor, Caracciolo, Francesco, Series Editor, Ding, Zhuoqi, Series Editor, Gogas, Periklis, Series Editor, Huang, Gordon, Series Editor, Nartea, Gilbert, Series Editor, Ngo, Thanh, Series Editor, Striełkowski, Wadim, Series Editor, Kusumaningrum, Adi, editor, and Liemanto, Airin, editor
- Published
- 2023
- Full Text
- View/download PDF
32. Fake Profile Detection Using Image Processing and Machine Learning
- Author
-
Sen, Shuva, Islam, Mohammad Intisarul, Azim, Samiha Sofrana, Hossain, Muhammad Iqbal, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Satu, Md. Shahriare, editor, Moni, Mohammad Ali, editor, Kaiser, M. Shamim, editor, and Arefin, Mohammad Shamsul, editor
- Published
- 2023
- Full Text
- View/download PDF
33. The Effects of Cyber Crime on E-Banking
- Author
-
Rafea, Mohamed Fareed Ghazi, Hamdan, Allam, Binsaddig, Ruaa, Qasem, Esmail, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Alareeni, Bahaaeddin, editor, Hamdan, Allam, editor, Khamis, Reem, editor, and Khoury, Rim El, editor
- Published
- 2023
- Full Text
- View/download PDF
34. Email Spam Detection Using Naive Bayes and Random Forest Classifiers
- Author
-
Arya, Varsha, Almomani, Ammar Ali Deeb, Mishra, Anupama, Peraković, Dragan, Rafsanjani, Marjan Kuchaki, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nedjah, Nadia, editor, Martínez Pérez, Gregorio, editor, and Gupta, B. B., editor
- Published
- 2023
- Full Text
- View/download PDF
35. Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom
- Author
-
Montasari, Reza, Jajodia, Sushil, Series Editor, Samarati, Pierangela, Series Editor, Lopez, Javier, Series Editor, Vaidya, Jaideep, Series Editor, and Montasari, Reza
- Published
- 2023
- Full Text
- View/download PDF
36. Human Security Identification in Maqoshid Sharia Concept as Implementation in Debt Trap of Digital Finance
- Author
-
Dwi Ardiyanti, Surwandono Surwandono, Puspa Devi Maharani, and Novi Rizka Amalia
- Subjects
cyber crime ,digital finance ,hifdz al maal ,human security ,maqoshid syariah. ,Islam ,BP1-253 - Abstract
The research aims to identify the relationship between the phenomenon of digital finance on the debt trap with the study of human security in the Islamic concept. Cybercrime harms many people by misusing personal data that can be accessed online illegally, such as loan applications, digital shopping, or digital wallet. The debt trap resulted in the application then best analyzed through human security of international relations. The study focused on human security, such as personal and economic security. The study concluded that the awareness of digital financial literacy would greatly help from debt traps by means of the loan application. Accordingly, Islamic studies became very relevant to the phenomenon in the Maqasid Sharia law, such as Hifdz al Maal, which also discussed economic security from an Islamic view. The correlation between the phenomenon would be best analyzed with both concepts to reduce harm to economic security, structurally and religiously. On the other hand, the lack of socialization in digital economy transactions threatens the security of people nowadays. The research used mix method approach with secondary and primary data. The primary data were obtained from the questionnaire from 61 samples from 17 years old Indonesian, then delivered in descriptive statistics to see the fact for real, while the secondary data was obtained from journals, books, and articles. The analysis determined the correlation between digital financial phenomena in the Maqosid Sharia Concept and human security.
- Published
- 2023
- Full Text
- View/download PDF
37. Personal Data Protection Vulnerabilities In Cybercrime Sniffing Bank Account Break-Ins
- Author
-
Diana Setiawati, Tyas Permata Dewi, and Zulfiana Ayu Astutik
- Subjects
Sniffing ,Cyber Crime ,Personal Data Protection ,digital economy ,Banking ,Law - Abstract
Cybercrime, particularly Sniffing, poses a hazard in the digital age since attackers illegally breach customers' data, resulting in losses and widespread concern. This study aimed to clarify the legal protections available to victims of sniffing cybercrimes and the banks' obligations to their clientele. This study includes primary, secondary, and tertiary legal materials with a normative legal approach. The analytical method produced information through descriptive analysis using qualitative methodologies. The research findings demonstrated that, despite the lack of a required special institution and ambiguity surrounding accountability in resolving disputes deemed harmful to customers, Law No. 27 of 2022 and Bank Indonesia Regulation No. 3 of 2023 indicated that there was legal protection for customers' data. As a result, customers must take greater precautions to protect their data.
- Published
- 2024
38. Potential Cybercrime and Prevention in the Overseas Official Travel Approval Letter
- Author
-
Aas Rohmat, Hanuring Ayu Ardhani Putri, Muhammad Muhtarom, Ismiyanto Ismiyanto, and Anies Fortina Febriani
- Subjects
Potency ,Cyber Crime ,Prevention ,Approval letter ,Overseas Service Travel ,Islamic law ,KBP1-4860 - Abstract
The aim of this research is to the potential for cybercrime and its prevention in foreign official travel approval letters. The research method used is normative juridical. The data collection technique is library research. The data analysis technique is descriptive qualitative which is used in the form of an interactive analysis model. The research results show that the potential for cybercrime in foreign official travel approval letters includes hacking, identity theft, data breaches, phishing, spamming, cyber vandalism, virus writers, XML injection, security configuration errors. To prevent cybercrime, the simple web application or https://simpel.setneg.go.id has data security, namely security testing by the state cyber and password agency, a captcha feature on the simple web, one time password feature on simple phones, application of certified digital signatures. The conclusion of this research is that the potential for cybercrime in overseas official travel approval letters is increasing. Prevention solutions can include educating users, using a hacker perspective, patch systems, policies, Intrusion Detection Systems bundled with Intrusion Prevention Systems, antivirus firewalls. Legal regulatory steps to support the implementation of cybercrime prevention solutions, namely Law No. 11 of 2008 concerning ITE and PP No. 82 of 2012 concerning the implementation of Electronic Systems and Transactions.
- Published
- 2024
- Full Text
- View/download PDF
39. The Importance of Digital Technology in Extracting Electronic Evidence: How Can Digital Technology be used at Crime Scenes?
- Author
-
Khashashneh, Tawfiq, Al-Billeh, Tareq, Al-Hammouri, Ali, and Belghit, Roua
- Subjects
ELECTRONIC evidence ,CRIME scenes ,DIGITAL technology ,DIGITAL forensics ,LAW enforcement ,COMPUTER crimes - Abstract
In the current investigative process, digital technology has become an essential tool that helps forensic specialists and law enforcement organizations retrieve electronic evidence that is vital to solving crimes. Obtaining electronic evidence from crime scenes is seen as a challenging investigative task, particularly in light of the rise in cybercrime techniques. In order to find some hints or evidence or assess their significance using scientific and technical data that neither the judge nor the investigator have access to, it takes professional investigators and technical experts. This study examines the value of digital technology in the recovery of electronic evidence and its practical use at crime scenes. Through an analysis of many methodologies, instruments, and obstacles, this research illuminates the dynamic field of digital forensics and its function within the criminal justice structure. [ABSTRACT FROM AUTHOR]
- Published
- 2023
40. CANCEL CULTURE: CYBERBULLYING ON TWITTER SEEN FROM THE SPACE TRANSITION THEORY.
- Author
-
Julianti, Shinta
- Subjects
CYBERBULLYING ,COMPUTER crimes ,COMMUNICATION ,ACQUISITION of data - Abstract
Copyright of Jurnal Sosial Humaniora is the property of Universitas Djuanda and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
41. Need of media information literacy in cyber crime
- Author
-
Bajwa, Sewa Singh
- Published
- 2023
- Full Text
- View/download PDF
42. Paradigms on Technology Development for Security Practitioners
- Author
-
Gkotsis, Ilias, Kavallieros, Dimitrios, Stoianov, Nikolai, Vrochidis, Stefanos, Diagourtas, Dimitrios, and Akhgar, Babak
- Subjects
Cyber Crime ,Cyber Terrorism ,Cyber Security ,Border and External Security ,Serious and Organized Crime ,Critical Infrastructures Protection ,thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials::TNKS Security and fire alarm systems ,thema EDItEUR::U Computing and Information Technology::UR Computer security ,thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence - Abstract
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain. The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies. The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain. The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book.
- Published
- 2025
- Full Text
- View/download PDF
43. Current problems of international information security
- Author
-
Serhii Lubenets, Igor Harchenko, and Yevhen Pavlenko
- Subjects
information security ,cyber security ,cyber protection ,cyber crime ,ransomware ,International relations ,JZ2-6530 - Abstract
The problems and areas of ensuring effective international information security are considered, which are based on the analysis of the current state of global cybercrime, the existing main directions of global cyberattacks and the development of possible methods and means of countering them, with the use of current research and reporting materials of specialized international companies specializing in the problems of international information security security and the development of appropriate comprehensive tools for its provision. The subject of research in the article is the issue of ensuring international information security, cyber protection and combating cybercrime. The goal is to analyze the current state and current problems of international information security to ensure its effective management at the state and corporate levels in various countries and regions of the world. Tasks: processing and analysis of the latest reports and conclusions concerning the current state of international information security in various countries and regions of the world; research of the main information threats, their types, current directions and sources; analysis of existing and promising directions and means of countering information threats to ensure effective international information security. The general scientific method of system analysis is used - to identify existing information and cyber threats and analyze their features, as well as to research existing and promising ways of combating them. The following results were obtained: based on the results of processing reports and the conclusions of the Microsoft Digital Defense Report concerning the current state of international information security in various countries and regions of the world, the main information threats, their types, current directions, goals and sources were investigated. Current issues of international cybercrime based on the use of ransomware, as well as the main target areas of relevant cyberattacks, have been determined. Existing and promising directions and means of countering information threats to ensure effective international information security are analyzed. The main trends in increasing the level of cyber protection and information security in the world have been determined. Conclusions: It is shown that as the number, sophistication and impact of online threats increase, to counter them, international organizations, companies and individuals must take measures to strengthen the so-called first line of defense, in particular, use strong multi-factor authentication. It was determined that at the moment there are three main trends in increasing the level of cyber protection and information security in the world: the implementation of unprecedented steps by the leading countries of the world to solve the problem of cyber security using already existing laws and powers; the adoption and introduction by governments around the world of new laws that require organizations to report on the detection of cyber attacks; voluntary notification by governments and international companies to the public when they become victims of attacks. The trend is also a further increase in the number and scope of cyber-attacks for any political purpose, be it espionage, subversion or destruction. At the same time, it is expected that more countries will join the list of those participating in offensive cyber operations, and that these operations will become more daring, persistent and disruptive, with more serious consequences. At the same time, in order to counter this, governments and international companies are making more and more efforts to counter these informational dangers.
- Published
- 2023
- Full Text
- View/download PDF
44. The Role of Legal Digitization on Cybercrime Control in Indonesia Jenda Ingan Mahuli Faculty of Law, Universitas Pembinaan Masyarakat Indonesia, Medan, Indonesia
- Author
-
Jenda Ingan Mahuli
- Subjects
digitalization ,law ,development ,control ,cyber crime ,Social Sciences - Abstract
The purpose of this research is to find out and analyze the extent of the efforts made by the Government and the DPR in overcoming the problems of articles that are multi-interpreted in several existing laws in Indonesia regarding the use of digital applications so that there is legal certainty, and bring up fair and transparent law enforcement. This research discusses the efforts made by the Government and the DPR in an effort to minimize the existing turmoil by doing various ways in order to overcome the problems associated with articles that are multi-interpreted in several existing laws in Indonesia regarding the use of digital applications, besides that in other studies only on the description of multi-interpreted articles and the explanation of the case, while in this research there is an addition on how to overcome problems to prevent turmoil in the community related to multi-interpreted articles that affect legal certainty and law enforcement. The research method used is descriptive qualitative analysis with a literature research approach. From the results of existing research, the conclusion of this study is that there are several articles of multiple interpretations that exist in the laws and regulations in force in Indonesia, where the article is article 27 paragraph 2 and article 28 paragraph 2 of Law No. 11 of 2008 concerning ITE and Article 1 Paragraph 4 of Law No. 27 of 2022 concerning the protection of personal data that is detrimental to society, as has happened in several cases in Indonesia. In addition, from the results of the research, it can be seen that there are several ways to prevent this multi-interpretation article, namely by conducting restorative justice for handling cases related to digital use activities, the efforts of the community to conduct judicial reviews of articles that are multi-interpreted when using digital applications, and the Government's desire to revise several articles in the law relating to the use of digital applications. If the implementation of articles that are contrary to the conscience of the people, which are multi-interpretive and also not in accordance with what the community expects is continued, it will make the State lose its authority, and the law will not be dealt with properly, to the detriment of the community, where this article will erode public confidence in law enforcement in Indonesia which is currently being tested because of the incompetence of law enforcers in handling cases.
- Published
- 2023
45. Blockchain Forensics: A Modern Approach to Investigating Cybercrime in the Age of Decentralisation.
- Author
-
Salisu, Saminu, Filipov, Velitchko, and Pene, Barry
- Abstract
Blockchain forensics (the use of scientific methods to manipulate data to create useful and informative descriptions of the manipulated data) takes data from the blockchain to interpret the flow of digital assets. Investigators use sophisticated data manipulation and visualization tools to identify the travel history of stolen assets. With these capabilities, chain hopping, round-tripping, and all attempts to blur transfer trails by cyber criminals become smoke screens with no effect. This paper establishes a framework for investigating financial crimes on the blockchain, starting with a brief explanation of blockchain forensics, types of financial crimes committed by criminals using the blockchain, and how they can be mitigated using OSINT’s (OSINT, 2022) investigation process of data collection, data preservation, data processing, and data presentation. This paper also presents a community-based approach to financial crime investigations on the blockchain that involves the public and victims themselves contributing valuable intelligence that can be used to trace and track criminals by authorities and security agencies in the global fight against cybercrime. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. A Comprehensive Study on Cyber Legislation in G20 Countries
- Author
-
Mehta, Nisarg, Sanghavi, Priyansh, Paliwal, Manish, Shukla, Madhu, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Rajagopal, Sridaran, editor, Faruki, Parvez, editor, and Popat, Kalpesh, editor
- Published
- 2022
- Full Text
- View/download PDF
47. The Current Situation of Internet Underground Industry Chain and Its Governance Model
- Author
-
Tang, Dade, Chen, Guangxuan, Liu, Qiang, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Holl, Augustin, editor, Chen, Jun, editor, and Guan, Guiyun, editor
- Published
- 2022
- Full Text
- View/download PDF
48. Profiling Cyber Crimes from News Portals Using Web Scraping
- Author
-
Christian, Joel, Valiveti, Sharada, Jain, Swati, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Singh, Pradeep Kumar, editor, Wierzchoń, Sławomir T., editor, Chhabra, Jitender Kumar, editor, and Tanwar, Sudeep, editor
- Published
- 2022
- Full Text
- View/download PDF
49. Examining Systemic Risk in the Cyber Landscape
- Author
-
Masys, Anthony, Farhadi, Adib, editor, Sanders, Ronald P., editor, and Masys, Anthony, editor
- Published
- 2022
- Full Text
- View/download PDF
50. Cyber Crime Prediction Using Machine Learning
- Author
-
Verma, Ruchi, Jayant, Shreya, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Singh, Mayank, editor, Tyagi, Vipin, editor, Gupta, P. K., editor, Flusser, Jan, editor, and Ören, Tuncer, editor
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.