Cyber Security and Cyber Crime: A Comprehensive Report
VerifiedAdded on 2025/07/31
|13
|2557
|187
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Cyber Security and Cyber Crime
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
Cyber security has been proven to be one of the most needed technology of the recent times as
the number and the rate of cybercrimes has been increasing a lot in the past few years. New
threats, malwares, attackers, viruses are introduced every now and then and new methods have to
create in order to keep the systems safe from the attackers and the various threats. The following
report would be discussing about the various threats that are present over the internet along with
the various methods that can be used in order to remove those threats and make the system as
clear as possible.
Literature Review Broad Scan and Reading
The topic that is being discussed in the following report is being discussed because there have
been multiple researches that are made to establish the need of cyber security in today’s world.
The cybercrimes have been increasing with a very high rate and some of the current threats are
still to be resolved by the programmers which may impact the privacy of various organization.
Key Words: Cyber, Security, Crime, Threats, Malware, Phishing, Viruses, Attackers.
Introduction
After going through all the journals that are mentioned above it can be said that the scenario of
cyber security at a global level is not up to the mark and major changes are needed to be made in
order to have a proper security system that not only stops an ongoing threat but also be almost
ready or at least notify if there is a new threat that has never been encountered before. Another
thing that has been analyzed after going through the report is that the threats that are being
introduced in a very frequent rate are also proving to be easily breaching the former security
system without any issue and no notification was given to the user of the system, which leads to
the point that even if the security system is not able to find a resolution for any new threat it must
at least be having the ability to inform the user that a new element has been observed in the
system which is not expected.
New Keywords: Ransom Ware, Malware, Data Breach, Privacy, Cyber security, Cyber Crime,
Hacking, attackers.
S. No. Journal Title Author Publication Title Year
1. Cyber-Dependent
Crime
Victimization:
The Same Risk
for Everyone?
Bergmann MC;
Dreißigacker A;
von Skarczinski B;
Wollinger GR
Cyberpsychology,
Behavior And Social
Networking
2016
2. The impact of
security and
intelligence
policy in the era
of cyber crimes
MSc. Bahri Gashi;
Dr.Sc. Fadil
Zendeli
ILIRIA International
Review
2018
Cyber security has been proven to be one of the most needed technology of the recent times as
the number and the rate of cybercrimes has been increasing a lot in the past few years. New
threats, malwares, attackers, viruses are introduced every now and then and new methods have to
create in order to keep the systems safe from the attackers and the various threats. The following
report would be discussing about the various threats that are present over the internet along with
the various methods that can be used in order to remove those threats and make the system as
clear as possible.
Literature Review Broad Scan and Reading
The topic that is being discussed in the following report is being discussed because there have
been multiple researches that are made to establish the need of cyber security in today’s world.
The cybercrimes have been increasing with a very high rate and some of the current threats are
still to be resolved by the programmers which may impact the privacy of various organization.
Key Words: Cyber, Security, Crime, Threats, Malware, Phishing, Viruses, Attackers.
Introduction
After going through all the journals that are mentioned above it can be said that the scenario of
cyber security at a global level is not up to the mark and major changes are needed to be made in
order to have a proper security system that not only stops an ongoing threat but also be almost
ready or at least notify if there is a new threat that has never been encountered before. Another
thing that has been analyzed after going through the report is that the threats that are being
introduced in a very frequent rate are also proving to be easily breaching the former security
system without any issue and no notification was given to the user of the system, which leads to
the point that even if the security system is not able to find a resolution for any new threat it must
at least be having the ability to inform the user that a new element has been observed in the
system which is not expected.
New Keywords: Ransom Ware, Malware, Data Breach, Privacy, Cyber security, Cyber Crime,
Hacking, attackers.
S. No. Journal Title Author Publication Title Year
1. Cyber-Dependent
Crime
Victimization:
The Same Risk
for Everyone?
Bergmann MC;
Dreißigacker A;
von Skarczinski B;
Wollinger GR
Cyberpsychology,
Behavior And Social
Networking
2016
2. The impact of
security and
intelligence
policy in the era
of cyber crimes
MSc. Bahri Gashi;
Dr.Sc. Fadil
Zendeli
ILIRIA International
Review
2018

3. CYBER
CRIMES-A
CONSTANT
THREAT FOR
THE BUSINESS
SECTORS AND
ITS GROWTH
(A STUDY OF
THE ONLINE
BANKING
SECTORS IN
GCC).
Ali, Liaqat Journal of
Developing Areas
2019
4. A Review of the
Advances in
Cyber Security
Benchmark
Datasets for
Evaluating Data-
Driven Based
Intrusion
Detection
Systems
Abubakar, Adamu
I.; Chiroma,
Haruna; Muaz,
Sanah Abdullahi;
Ila, Libabatu
Baballe
Proceedings of the
2015 International
Conference on Soft
Computing and
Software Engineering
(SCSE'15)
2015
5. Cyber espionage
- burglary of the
21st century
Mohanty,
Swatasoma
Intellectual Property
Forum: journal of the
Intellectual and
Industrial Property
Society of Australia
and New Zealand
2017
6. Cyber Media and
Vulnerability: A
discourse on
cyber laws and a
probe on
victimization of
cybercrimes in
Pakistan.
Munir, Asad;
Gondal, Maryam
Tahira
Global Media
Journal: Pakistan
Edition
2015
7. Cyber Espionage
and the S.P.I.E.S.
Taxonomy.
Fitzpatrick,
William M.;
Dilullo, Samuel A.
Competition Forum
2015
2015
8. Cyber Criminals
Increase
Damaging
Attacks Against
Healthcare
Organizations.
Same-Day Surgery Same-Day Surgery 2017
9. Traffic-Aware Cheng, Shin-Ming; IEEE 2017
CRIMES-A
CONSTANT
THREAT FOR
THE BUSINESS
SECTORS AND
ITS GROWTH
(A STUDY OF
THE ONLINE
BANKING
SECTORS IN
GCC).
Ali, Liaqat Journal of
Developing Areas
2019
4. A Review of the
Advances in
Cyber Security
Benchmark
Datasets for
Evaluating Data-
Driven Based
Intrusion
Detection
Systems
Abubakar, Adamu
I.; Chiroma,
Haruna; Muaz,
Sanah Abdullahi;
Ila, Libabatu
Baballe
Proceedings of the
2015 International
Conference on Soft
Computing and
Software Engineering
(SCSE'15)
2015
5. Cyber espionage
- burglary of the
21st century
Mohanty,
Swatasoma
Intellectual Property
Forum: journal of the
Intellectual and
Industrial Property
Society of Australia
and New Zealand
2017
6. Cyber Media and
Vulnerability: A
discourse on
cyber laws and a
probe on
victimization of
cybercrimes in
Pakistan.
Munir, Asad;
Gondal, Maryam
Tahira
Global Media
Journal: Pakistan
Edition
2015
7. Cyber Espionage
and the S.P.I.E.S.
Taxonomy.
Fitzpatrick,
William M.;
Dilullo, Samuel A.
Competition Forum
2015
2015
8. Cyber Criminals
Increase
Damaging
Attacks Against
Healthcare
Organizations.
Same-Day Surgery Same-Day Surgery 2017
9. Traffic-Aware Cheng, Shin-Ming; IEEE 2017
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Patching for
Cyber Security in
Mobile IoT.
Chen, Pin-Yu; Lin,
Ching-Chao; Hsiao,
Hsu-Chun
Communications
Magazine
10. Violation of Free
Flow of
Information in
the Process of the
Situational
Prevention of
Cyber Crimes
Zahra Arhadi
Alashti; Abdoreza
Javan Jafari
Bojnordi
Allameh Tabataba'i
University Press
2017
11. Cyber-
victimization
preventive
behavior: A
health belief
model approach.
Dodel,
Matias; Mesch,
Gustavo
Computers in Human
Behavior
2017
12. THE
PHENOMENON
OF CYBER
CRIMES
WHICH
IMPACT
CHILDREN AS
VICTIMS IN
INDONESIA
Hardianto,
Djanggih
Airlangga University
Press
2018
13. Cybersecurity
risks: Are they
inflated?
Chrapavy, Petr Salus Journal 2016
14. CRITICAL
REVIEW OF
THE INTERNET
CRIMES LAW
IN TURKEY:
SOCIAL
STRUCTURE,
SOCIAL MEDIA
AND
LEGISLATIVE
REGULATIONS.
Akter, Tutku Current Politics &
Economics of Europe
2016
15. Always
connected, but
are smart mobile
users getting
more security
savvy? A survey
of smart mobile
Imgraben,
James; Engelbrecht,
Alewyn; Choo,
Kim-Kwang
Raymond
Behaviour &
Information
Technology
2014
Cyber Security in
Mobile IoT.
Chen, Pin-Yu; Lin,
Ching-Chao; Hsiao,
Hsu-Chun
Communications
Magazine
10. Violation of Free
Flow of
Information in
the Process of the
Situational
Prevention of
Cyber Crimes
Zahra Arhadi
Alashti; Abdoreza
Javan Jafari
Bojnordi
Allameh Tabataba'i
University Press
2017
11. Cyber-
victimization
preventive
behavior: A
health belief
model approach.
Dodel,
Matias; Mesch,
Gustavo
Computers in Human
Behavior
2017
12. THE
PHENOMENON
OF CYBER
CRIMES
WHICH
IMPACT
CHILDREN AS
VICTIMS IN
INDONESIA
Hardianto,
Djanggih
Airlangga University
Press
2018
13. Cybersecurity
risks: Are they
inflated?
Chrapavy, Petr Salus Journal 2016
14. CRITICAL
REVIEW OF
THE INTERNET
CRIMES LAW
IN TURKEY:
SOCIAL
STRUCTURE,
SOCIAL MEDIA
AND
LEGISLATIVE
REGULATIONS.
Akter, Tutku Current Politics &
Economics of Europe
2016
15. Always
connected, but
are smart mobile
users getting
more security
savvy? A survey
of smart mobile
Imgraben,
James; Engelbrecht,
Alewyn; Choo,
Kim-Kwang
Raymond
Behaviour &
Information
Technology
2014
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

device users.
16. Exploring and
analyzing Internet
crimes and their
behaviors
Arora, Bhavna Recent Trends in
Engineering and
Material
Sciences, Perspective
s in Science
2016
17. Protecting
Consumers from
Cybercrime in the
Banking and
Financial Sector:
An Analysis of
the Legal
Response in
Nigeria
Orji, U., J., Tilburg Law Review
105
2019
18.
The EU's
Cybercrime and
Cyber-Security
Rulemaking:
Mapping the
Internal and
External
Dimensions of
EU Security
Elaine Fahey European Journal of
Risk Regulation
2014
19.
Security-
Informed Safety:
Supporting
Stakeholders with
Codes of Practice
Bloomfield, R.
Bishop, P.
Butler, E.
Stroud, R.
IEEE Xplore Digital
Library
2018
20.
Cybersecurity:
The Security and
Protection
Challenges of
Our Digital
World
Prince, Daniel IEEE Xplore Digital
Library
2018
16. Exploring and
analyzing Internet
crimes and their
behaviors
Arora, Bhavna Recent Trends in
Engineering and
Material
Sciences, Perspective
s in Science
2016
17. Protecting
Consumers from
Cybercrime in the
Banking and
Financial Sector:
An Analysis of
the Legal
Response in
Nigeria
Orji, U., J., Tilburg Law Review
105
2019
18.
The EU's
Cybercrime and
Cyber-Security
Rulemaking:
Mapping the
Internal and
External
Dimensions of
EU Security
Elaine Fahey European Journal of
Risk Regulation
2014
19.
Security-
Informed Safety:
Supporting
Stakeholders with
Codes of Practice
Bloomfield, R.
Bishop, P.
Butler, E.
Stroud, R.
IEEE Xplore Digital
Library
2018
20.
Cybersecurity:
The Security and
Protection
Challenges of
Our Digital
World
Prince, Daniel IEEE Xplore Digital
Library
2018

Literature Review- Focused Reading
While doing a proper analysis of all the journals it was found out that 2 of the journals were the
once who can be mentioned as the primary journals around which all the other journals were
revolving around. Following is an explanation of both of the journals, the first one discusses
cyber security in the banking and financial sector.
Article 1st
Article Title: Protecting Consumers from Cybercrime in the Banking and Financial Sector:
An Analysis of the Legal Response in Nigeria
Key Contribution: The author of this research paper Orji, 2019 has basically stated the scenario
of the cybercrime in the banking and financial sector of Nigeria and the various methods are also
discussed by the help of which the people who are associated with that band are being affected
by the threats that have been introduced in those sectors.
Existing Problems: The country of Nigeria is factually having some of the highest population of
the internet users and has it has become a proper target for the attackers. Due to the increasing
cybercrimes in Nigeria in the year 2018, the patronage of the services that are provided by the
banks as well as financial sectors of government of Nigeria, was really low. As per the
information provided in the paper, only 52% of the total population of the adult people in Nigeria
who are eligible for being a beneficiary of the banking services, are not having any bank account
or are not at all utilizing the banking or the financial services. 37% of the total population of
Nigeria are not even having their account opened in the bank. This massive decrease in the
number of patronage has resulted in concerns over the bad quality of the services of the bank.
Innovation: In the year of 2006, the government of Nigeria applied the law that was known as
the Advance Fee Fraud Act. This act was implemented in order to deal with the various fee fraud
activities that were going on in the country at that time. The act basically criminalizes any act
that has been done in order to promote fee fraud. Also in the year of 2009 Nigeria passed the bill
that was known as the Nigerian Cybersecurity and Data Protection Bill which basically was
implemented in order to criminalize any kind of cybercrime.
Requirements and Significant Improvements: One thing that can be observed from the article
is that the Nigerian government has been very alert against the cybercrime which being a country
with one of the most internet users in the world is a must but the problem that has been occurring
in this is case is that even after so many steps the people of the country are not ready to trust the
banking services, the reason why this is happening is because of the lack of education and
awareness among the customers or the adults of Nigeria and in order to increase the number of
people who are being beneficiary to the services that are being provided to the bank, the people
of Nigeria must be made aware about the security steps that are being taken by the government
in order to keep their data secure.
Article 2nd
Article Title:
While doing a proper analysis of all the journals it was found out that 2 of the journals were the
once who can be mentioned as the primary journals around which all the other journals were
revolving around. Following is an explanation of both of the journals, the first one discusses
cyber security in the banking and financial sector.
Article 1st
Article Title: Protecting Consumers from Cybercrime in the Banking and Financial Sector:
An Analysis of the Legal Response in Nigeria
Key Contribution: The author of this research paper Orji, 2019 has basically stated the scenario
of the cybercrime in the banking and financial sector of Nigeria and the various methods are also
discussed by the help of which the people who are associated with that band are being affected
by the threats that have been introduced in those sectors.
Existing Problems: The country of Nigeria is factually having some of the highest population of
the internet users and has it has become a proper target for the attackers. Due to the increasing
cybercrimes in Nigeria in the year 2018, the patronage of the services that are provided by the
banks as well as financial sectors of government of Nigeria, was really low. As per the
information provided in the paper, only 52% of the total population of the adult people in Nigeria
who are eligible for being a beneficiary of the banking services, are not having any bank account
or are not at all utilizing the banking or the financial services. 37% of the total population of
Nigeria are not even having their account opened in the bank. This massive decrease in the
number of patronage has resulted in concerns over the bad quality of the services of the bank.
Innovation: In the year of 2006, the government of Nigeria applied the law that was known as
the Advance Fee Fraud Act. This act was implemented in order to deal with the various fee fraud
activities that were going on in the country at that time. The act basically criminalizes any act
that has been done in order to promote fee fraud. Also in the year of 2009 Nigeria passed the bill
that was known as the Nigerian Cybersecurity and Data Protection Bill which basically was
implemented in order to criminalize any kind of cybercrime.
Requirements and Significant Improvements: One thing that can be observed from the article
is that the Nigerian government has been very alert against the cybercrime which being a country
with one of the most internet users in the world is a must but the problem that has been occurring
in this is case is that even after so many steps the people of the country are not ready to trust the
banking services, the reason why this is happening is because of the lack of education and
awareness among the customers or the adults of Nigeria and in order to increase the number of
people who are being beneficiary to the services that are being provided to the bank, the people
of Nigeria must be made aware about the security steps that are being taken by the government
in order to keep their data secure.
Article 2nd
Article Title:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Key Contribution: The key contributions that this article would be having in the research would
be the points associated with the cybercrime and cyber security such as the report talks about the
various impacts that the security measures that are being taken for cyber security, have over the
lives of the people when there is so much cybercrimes activities going on around the world.
Existing Problems: There are various problems that are been discussed in the report that has
been taken, such as the information terrorism. Information terrorism is one of the demerits that
have been introduced with the Information Technologies. It is the phenomenon that has being
seen to be expanding at a very high rate and one of its major symptoms is the verbal war in
communication over the internet.
Innovations: There were many steps that have been taken in this report in order to minimize of
remove the problems that were discussed in the previous part of the report. As per the
information that has been provided in the research it is found out that there are various
international organizations who are working to prevent cybercrimes and terrorism activities from
happening globally by creating specific structures made up of information such as the European
Union and the Office for “Research and Coordination of Critical Information Structure.”
Requirements and Significant Improvements: The suggestions and resolutions that are
provided in the research are already very good but the additional comments that can be
implemented in the case is the proper monitoring of the information that is being shared over the
cyber network.
Proposed Research
For the proper analysis of the various kind of cybercrimes that are present in the present scenario
as well as the steps that are taken in the cyber security in order to resolve those cybercrimes,
there are various different kind of methodologies used in this report such as Prototype,
Ontology , Positivism etc. In the field of cyber security there are various fields that can be
affected at a very high level such as banking sectors, financial sectors, private organizations,
governmental bodies, hospitals etc. The biggest threat to the cyber security in the current
scenario are the attackers who are behind the data of any organization and are trying to breach
their data.
be the points associated with the cybercrime and cyber security such as the report talks about the
various impacts that the security measures that are being taken for cyber security, have over the
lives of the people when there is so much cybercrimes activities going on around the world.
Existing Problems: There are various problems that are been discussed in the report that has
been taken, such as the information terrorism. Information terrorism is one of the demerits that
have been introduced with the Information Technologies. It is the phenomenon that has being
seen to be expanding at a very high rate and one of its major symptoms is the verbal war in
communication over the internet.
Innovations: There were many steps that have been taken in this report in order to minimize of
remove the problems that were discussed in the previous part of the report. As per the
information that has been provided in the research it is found out that there are various
international organizations who are working to prevent cybercrimes and terrorism activities from
happening globally by creating specific structures made up of information such as the European
Union and the Office for “Research and Coordination of Critical Information Structure.”
Requirements and Significant Improvements: The suggestions and resolutions that are
provided in the research are already very good but the additional comments that can be
implemented in the case is the proper monitoring of the information that is being shared over the
cyber network.
Proposed Research
For the proper analysis of the various kind of cybercrimes that are present in the present scenario
as well as the steps that are taken in the cyber security in order to resolve those cybercrimes,
there are various different kind of methodologies used in this report such as Prototype,
Ontology , Positivism etc. In the field of cyber security there are various fields that can be
affected at a very high level such as banking sectors, financial sectors, private organizations,
governmental bodies, hospitals etc. The biggest threat to the cyber security in the current
scenario are the attackers who are behind the data of any organization and are trying to breach
their data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Conclusion
The following report talks about the researches that are done by various researches in the past on
various topics that associated directly or indirectly with the cybercrime or cyber security. The
whole document contains the details of various researches and journals that are written in the
past and also explains 2 of them in brief in order to create a proper direction in order to start the
research of their own.
The following report talks about the researches that are done by various researches in the past on
various topics that associated directly or indirectly with the cybercrime or cyber security. The
whole document contains the details of various researches and journals that are written in the
past and also explains 2 of them in brief in order to create a proper direction in order to start the
research of their own.

References
Akter, T., 2016, Critical review of the internet crimes law in turkey: social structure, social
media and legislative regulations. Current Politics & Economics of Europe. 27(3). Pp. 395-416
Chang, S., M., Chen, P., Y., Ching, C. and Hsiao, H., C., 2017, Traffic-aware patching for cyber
security in mobile iot. IEEE Communications Magazine. 55(7). Pp. 29-35.
Fitzpatrick, William M., Dilullo, Samuel A., 2015, Cyber Espionage and the S.P.I.E.S.
Taxonomy. Competition Forum 2015. 13(2). Pp. 1-307
Orji, U., J., 2019, Protecting Consumers from Cybercrime in the Banking and Financial Sector:
An Analysis of the Legal Response in Nigeria. Tilburg Law Review 105. 24(2019). Pp.
Solak, Duyugu, Toploglu and Murat, 2014, The perception analysis of cyber crimes in view of
computer science students. 4th World conference on educational technology researches
(WCETR-2014). 2015(182). Pp. 590- 595
Zendeli, F. and Ghasi, B., 2016, The impact of security and intelligence policy in the era of
cybercrimes. ILIRIA International Review. 6(1). Pp. 157-164
Akter, T., 2016, Critical review of the internet crimes law in turkey: social structure, social
media and legislative regulations. Current Politics & Economics of Europe. 27(3). Pp. 395-416
Chang, S., M., Chen, P., Y., Ching, C. and Hsiao, H., C., 2017, Traffic-aware patching for cyber
security in mobile iot. IEEE Communications Magazine. 55(7). Pp. 29-35.
Fitzpatrick, William M., Dilullo, Samuel A., 2015, Cyber Espionage and the S.P.I.E.S.
Taxonomy. Competition Forum 2015. 13(2). Pp. 1-307
Orji, U., J., 2019, Protecting Consumers from Cybercrime in the Banking and Financial Sector:
An Analysis of the Legal Response in Nigeria. Tilburg Law Review 105. 24(2019). Pp.
Solak, Duyugu, Toploglu and Murat, 2014, The perception analysis of cyber crimes in view of
computer science students. 4th World conference on educational technology researches
(WCETR-2014). 2015(182). Pp. 590- 595
Zendeli, F. and Ghasi, B., 2016, The impact of security and intelligence policy in the era of
cybercrimes. ILIRIA International Review. 6(1). Pp. 157-164
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Appendix
S.
No.
Journal Title Author Publication Title Year Abstract
1. Cyber-Dependent
Crime
Victimization:
The Same Risk
for Everyone?
Bergmann MC;
Dreißigacker A;
von Skarczinski B;
Wollinger GR
Cyberpsychology,
Behavior And Social
Networking
2016 Impact that
cybercrimes
have over the
lives of the
victims
2. The impact of
security and
intelligence
policy in the era
of cyber crimes
MSc. Bahri Gashi;
Dr.Sc. Fadil
Zendeli
ILIRIA International
Review
2018 Changes
happen due to
cyber security
issues
3. CYBER
CRIMES-A
CONSTANT
THREAT FOR
THE BUSINESS
SECTORS AND
ITS GROWTH
(A STUDY OF
THE ONLINE
BANKING
SECTORS IN
GCC).
Ali, Liaqat Journal of
Developing Areas
2019 Impact of
cybercrimes
on business
and
organizations
4. A Review of the
Advances in
Cyber Security
Benchmark
Datasets for
Evaluating Data-
Driven Based
Intrusion
Detection
Systems
Abubakar, Adamu
I.; Chiroma,
Haruna; Muaz,
Sanah Abdullahi;
Ila, Libabatu
Baballe
Proceedings of the
2015 International
Conference on Soft
Computing and
Software Engineering
(SCSE'15)
2015 Analysing of
the Advances
in Cyber
Security
Benchmark
Datasets for
Evaluating
Data-Driven
Based
Intrusion
Detection
Systems
5. Cyber espionage
- burglary of the
21st century
Mohanty,
Swatasoma
Intellectual Property
Forum: journal of the
Intellectual and
Industrial Property
Society of Australia
and New Zealand
2017 Data of
cybercrims
after 2000
S.
No.
Journal Title Author Publication Title Year Abstract
1. Cyber-Dependent
Crime
Victimization:
The Same Risk
for Everyone?
Bergmann MC;
Dreißigacker A;
von Skarczinski B;
Wollinger GR
Cyberpsychology,
Behavior And Social
Networking
2016 Impact that
cybercrimes
have over the
lives of the
victims
2. The impact of
security and
intelligence
policy in the era
of cyber crimes
MSc. Bahri Gashi;
Dr.Sc. Fadil
Zendeli
ILIRIA International
Review
2018 Changes
happen due to
cyber security
issues
3. CYBER
CRIMES-A
CONSTANT
THREAT FOR
THE BUSINESS
SECTORS AND
ITS GROWTH
(A STUDY OF
THE ONLINE
BANKING
SECTORS IN
GCC).
Ali, Liaqat Journal of
Developing Areas
2019 Impact of
cybercrimes
on business
and
organizations
4. A Review of the
Advances in
Cyber Security
Benchmark
Datasets for
Evaluating Data-
Driven Based
Intrusion
Detection
Systems
Abubakar, Adamu
I.; Chiroma,
Haruna; Muaz,
Sanah Abdullahi;
Ila, Libabatu
Baballe
Proceedings of the
2015 International
Conference on Soft
Computing and
Software Engineering
(SCSE'15)
2015 Analysing of
the Advances
in Cyber
Security
Benchmark
Datasets for
Evaluating
Data-Driven
Based
Intrusion
Detection
Systems
5. Cyber espionage
- burglary of the
21st century
Mohanty,
Swatasoma
Intellectual Property
Forum: journal of the
Intellectual and
Industrial Property
Society of Australia
and New Zealand
2017 Data of
cybercrims
after 2000
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

6. Cyber Media and
Vulnerability: A
discourse on
cyber laws and a
probe on
victimization of
cybercrimes in
Pakistan.
Munir, Asad;
Gondal, Maryam
Tahira
Global Media
Journal: Pakistan
Edition
2015 Various
vulnerabilities
over the
internet
7. Cyber Espionage
and the S.P.I.E.S.
Taxonomy.
Fitzpatrick,
William M.;
Dilullo, Samuel A.
Competition Forum
2015
2015 Reviewing
the taxonomy
of the
organization
S.P.I.E.S is
terms of the
cyber
espionage
8. Cyber Criminals
Increase
Damaging
Attacks Against
Healthcare
Organizations.
Same-Day Surgery Same-Day Surgery 2017 Impact of
cybercrimes
on hospitals
9. Traffic-Aware
Patching for
Cyber Security in
Mobile IoT.
Cheng, Shin-Ming;
Chen, Pin-Yu; Lin,
Ching-Chao; Hsiao,
Hsu-Chun
IEEE
Communications
Magazine
2017 Cyber
security
measure
taken for
securing the
mobile phone
that use IoT
10. Violation of Free
Flow of
Information in
the Process of the
Situational
Prevention of
Cyber Crimes
Zahra Arhadi
Alashti; Abdoreza
Javan Jafari
Bojnordi
Allameh Tabataba'i
University Press
2017 Legal actions
taken against
the cyber
crimes
11. Cyber-
victimization
preventive
behavior: A
health belief
model approach.
Dodel,
Matias; Mesch,
Gustavo
Computers in Human
Behavior
2017 Impact that
cybercrimes
have over the
lives of the
victims
12. THE
PHENOMENON
OF CYBER
CRIMES
Hardianto,
Djanggih
Airlangga University
Press
2018 The impact of
cybercrimes
over the
children of
Vulnerability: A
discourse on
cyber laws and a
probe on
victimization of
cybercrimes in
Pakistan.
Munir, Asad;
Gondal, Maryam
Tahira
Global Media
Journal: Pakistan
Edition
2015 Various
vulnerabilities
over the
internet
7. Cyber Espionage
and the S.P.I.E.S.
Taxonomy.
Fitzpatrick,
William M.;
Dilullo, Samuel A.
Competition Forum
2015
2015 Reviewing
the taxonomy
of the
organization
S.P.I.E.S is
terms of the
cyber
espionage
8. Cyber Criminals
Increase
Damaging
Attacks Against
Healthcare
Organizations.
Same-Day Surgery Same-Day Surgery 2017 Impact of
cybercrimes
on hospitals
9. Traffic-Aware
Patching for
Cyber Security in
Mobile IoT.
Cheng, Shin-Ming;
Chen, Pin-Yu; Lin,
Ching-Chao; Hsiao,
Hsu-Chun
IEEE
Communications
Magazine
2017 Cyber
security
measure
taken for
securing the
mobile phone
that use IoT
10. Violation of Free
Flow of
Information in
the Process of the
Situational
Prevention of
Cyber Crimes
Zahra Arhadi
Alashti; Abdoreza
Javan Jafari
Bojnordi
Allameh Tabataba'i
University Press
2017 Legal actions
taken against
the cyber
crimes
11. Cyber-
victimization
preventive
behavior: A
health belief
model approach.
Dodel,
Matias; Mesch,
Gustavo
Computers in Human
Behavior
2017 Impact that
cybercrimes
have over the
lives of the
victims
12. THE
PHENOMENON
OF CYBER
CRIMES
Hardianto,
Djanggih
Airlangga University
Press
2018 The impact of
cybercrimes
over the
children of

WHICH
IMPACT
CHILDREN AS
VICTIMS IN
INDONESIA
the country
Indonesia
13. Cybersecurity
risks: Are they
inflated?
Chrapavy, Petr Salus Journal 2016 Risks
involved in
cyber security
14. CRITICAL
REVIEW OF
THE INTERNET
CRIMES LAW
IN TURKEY:
SOCIAL
STRUCTURE,
SOCIAL MEDIA
AND
LEGISLATIVE
REGULATIONS.
Akter, Tutku Current Politics &
Economics of Europe
2016 Types of
cybercrimes
that are
present and
active in the
current
scenario
15. Always
connected, but
are smart mobile
users getting
more security
savvy? A survey
of smart mobile
device users.
Imgraben,
James; Engelbrecht,
Alewyn; Choo,
Kim-Kwang
Raymond
Behaviour &
Information
Technology
2014 Cyber
security
measures
taken for
securing the
mobile
phones.
16. Exploring and
analyzing Internet
crimes and their
behaviors
Arora, Bhavna Recent Trends in
Engineering and
Material
Sciences, Perspective
s in Science
2016 Types of
cybercrimes
that are
present and
active in the
current
scenario
17. Protecting
Consumers from
Cybercrime in the
Banking and
Financial Sector:
An Analysis of
the Legal
Response in
Nigeria
Orji, U., J., Tilburg Law Review
105
2019 Security
measures that
are taken in
order to
secure the
banks of
Nigeria from
cyber crime
18. The EU's
Cybercrime and
Cyber-Security
Elaine Fahey European Journal of
Risk Regulation
2014 Legal actions
taken against
the
IMPACT
CHILDREN AS
VICTIMS IN
INDONESIA
the country
Indonesia
13. Cybersecurity
risks: Are they
inflated?
Chrapavy, Petr Salus Journal 2016 Risks
involved in
cyber security
14. CRITICAL
REVIEW OF
THE INTERNET
CRIMES LAW
IN TURKEY:
SOCIAL
STRUCTURE,
SOCIAL MEDIA
AND
LEGISLATIVE
REGULATIONS.
Akter, Tutku Current Politics &
Economics of Europe
2016 Types of
cybercrimes
that are
present and
active in the
current
scenario
15. Always
connected, but
are smart mobile
users getting
more security
savvy? A survey
of smart mobile
device users.
Imgraben,
James; Engelbrecht,
Alewyn; Choo,
Kim-Kwang
Raymond
Behaviour &
Information
Technology
2014 Cyber
security
measures
taken for
securing the
mobile
phones.
16. Exploring and
analyzing Internet
crimes and their
behaviors
Arora, Bhavna Recent Trends in
Engineering and
Material
Sciences, Perspective
s in Science
2016 Types of
cybercrimes
that are
present and
active in the
current
scenario
17. Protecting
Consumers from
Cybercrime in the
Banking and
Financial Sector:
An Analysis of
the Legal
Response in
Nigeria
Orji, U., J., Tilburg Law Review
105
2019 Security
measures that
are taken in
order to
secure the
banks of
Nigeria from
cyber crime
18. The EU's
Cybercrime and
Cyber-Security
Elaine Fahey European Journal of
Risk Regulation
2014 Legal actions
taken against
the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.