logo

Trends in Cybercrime

   

Added on  2023-04-20

10 Pages2680 Words446 Views
TRENDS IN CYBERCRIME
1
Trends in Cybercrime

TRENDS IN CYBERCRIME
2
Stage 1- research question
How to detect spam web pages?
How to effectively mitigate email spam?
Stage 2- an Annotated bibliography
Dashora, K., (2011) Cybercrime in the society: Problems and preventions. Journal
of Alternative Perspectives in the Social Sciences, 3(1), pp.240-259.
The title of this journal article is Cyber Crime in the Society: Problems and Preventions
which was written Kamini dashora in the year 2011. The main aim of this research
paper is to analysis the issue of cybercrime in the society and key factors that increase
the problem of cybercrime. According to author use of the internet is growing rapidly
and many consumers are using this approach for communication purpose that also
increases the problem of cyber-crime. In this paper, the author involves various reports
from news media and news portal and relevant information are gathered from the
previous research, online websites and books. Term cyber-crime is defined as the
security threat that occurs due to lack of security and the author described how hackers
attack the consumer personal networks and devices.
Ramdinmawii, E., Ghisingh, S. and Sharma, U.M., (2014) A Study on the Cyber-
Crime and Cyber Criminals: A Global Problem. International Journal of Web
Technology, 3(2), pp.172-179.
The title of this journal paper is A Study on the Cyber-Crime and Cyber Criminals: A
Global Problem which was written by Esther Ramdinmawii, Seema Ghisingh, and Usha
Mary Sharma. This paper is completely based on the cybercrimes and aim of this
investigation is to evaluate the common areas where cybercrime occurs and various
kinds of cyber-crimes that are faced by the consumers. According to the author, most
hackers transfer spam and fraud mails to consumers and users click on that mails due to
which hackers can easily enter into their networks. In this paper, the researcher uses
both qualitative and quantitative data approach to collect the data or information about

TRENDS IN CYBERCRIME
3
cyber-crime. A survey is conducted by the investigator to gather the data or statics
about the research topic and they also collected the views of other experts.
Saini, H., Rao, Y.S. and Panda, T.C., (2012) Cyber-crimes and their impacts: A
review. International Journal of Engineering Research and Applications, 2(2),
pp.202-209.
This paper was written by hemraj saini in the year 2012 and the purpose of this journal
article is to review the cyber-crimes and their impacts on the consumer personal
networks or information. In which the author also identifies the key factors that
increase the problem of cyber-crime and process to improve the security of the
consumer data. The researcher used secondary research method to improve the
effectiveness of the investigation and observed that many consumers use unauthentic
networks or servers that are produced by hackers to collect their private details.
Stage 2 Research paper
Introduction
In the field of computer science, spam is defined as a threat which is used for the
unsolicited and bulk electronic message. Mainly, hackers use this term in cyber-crimes
and they transfer spam mails or messages to their personal account due to which they
can easily enter into their computer system (Dunn Cavelty, 2013). A recent study
observed that the rate of cybercrime has increase by 48% and many companies,
business industries, and government authorities are facing the issue of cyber-attack or
hacking. The aim of this research paper is to analysis the problem of cyber-crimes and
discusses how hackers encrypt consumer personal data and technique to solve such
kind of problem. In this research paper, the researcher will use both quantitative and
qualitative methods to collect and gather the relevant data from different sources.
Literature review
Cyber-crime is one of the biggest problems faced by many organizations and
communities and it occurs due to lack of security. A recent study identified that most
hackers use malware software to design a large amount of traffic and they send the
spam mails to consumers. With the help of spam, hackers can easily enter into their

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105

Research Methods
|10
|2447
|328

Crypto-currencies and Cybercrime
|11
|3351
|115

Adapting Social Spam Infrastructure for Political Censorship
|2
|1384
|372

Hackers Without Borders: A Legal Response
|11
|2715
|251

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329