Cyber Crime and Technological Advancements
14,677 Followers
Recent papers in Cyber Crime and Technological Advancements
D eclaring America's digital infrastructure to be a "strategic national asset" President Barack Obama called cyberspace the "fifth domain", the "new frontier" and as vital and valuable as land, sea, air and space -and as threatened by the... more
Military intelligence, abbreviated as "intel" or MI, refers to the collection, analysis, and distribution of information relevant to military operations. Every nation on Earth utilizes military intelligence to make itself more secure and... more
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
Businesses using cyberspace are expanding every day, with Internet users performing different activities affecting cyber hygiene. The user's actions may be good or badultimately determining the state of cyber hygiene. Good cybersecurity... more
Il ´Cyber Strategy & Policy Brief´ si pone come scopo quello di sensibilizzare ogni mese il vertice politico e i lettori sui temi legati alla cyber-security, analizzando i principali avvenimenti a livello internazionale, al fine di... more
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
With the increase in the number of internet users in the country (India), led to a new form of crimes known as Cyber Crime. No doubt, the internet revolution has been a boon to mankind in many fields. However, the dark side of it also... more
Data Leakage or Loss Prevention (DLP) or information leak prevention (ILP) or information protection and control (IPC) technology has been developed to prevent data from intentionally or accidentally leaking out. Data loss prevention... more
what is Troll Trolling & Law in India
Говорить об ошибке в когнитивной эволюции Homo позволяет наблюдаемая в прогнозе реальность и многовековой опыт жизнедеятельности человечества: ни обширное научное знание, ни фундаментальные духовные учения, ни гуманистическая... more
Biometrics is a statistical analysis of people's unique behavioral characteristics. The technology is used for CYBERSECURITY. The basics of biometric authentication is that to stop security breaches by analyzing a person's unique... more
The present study has shed light upon the cyber risks associated with business management. The study has analyzed that with increasing digitalization and advancements in technology, the risks of cybersecurity are increasing as well. The... more
This paper includes the gender-neutral approach of Section 66E, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of Children from... more
Information security breaches pose a growing threat to organizations and individuals, particularly those that are mainly associated with the e-commerce industry. Data security within an organization is important as Information systems are... more
Social media may be seen as the new oil that makes the world go round providing access to all manner of information about the users. With the challenges to cyber security, social media users now require a level of awareness of the impact... more
Note : √√ indicates aprincipal resposibility; √ indicates a secondary responsibility. Functional-level decisions implement the overall strategy formulated at the corporate and business levels. They involveaction-orientied operational... more
Today cyber space is easily accessible and has presence beyond geo-political boundaries; also rapidly becoming a global battlefield for various states and non-states entities. With the advent of the Internet of Things (IoT), every... more
This thesis discusses the analysis and implementation of an information system for improving the management of internship program in higher institutions of learning a case study of the University of Kisubi. The system is meant to aid in... more
= A NEW DIGITAL VERSION [E-BOOK] OF THIS WORK IS AVAILABLE IN KINDLE STORE | WWW.AMAZON.COM THIS CONTENT IS SUPLYIED AS A COURTESY TO STUDENTS AND RESERCHERS. IF ADDITIONAL MATERIAL IS NEEDED, PLEASE CONTACT THE AUTHOR AT... more
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
ABSTRACT Cybercrime is a kind of crime that happens in cyberspace world, it happens in the world of computer (network or system) and the Internet. It is obvious that, many people have a limited knowledge of cybercrime, and this kind of... more
The term shareware is used in contrast to retail software, which refers to commercial software available only with the purchase of a license which may not be copied for others; public domain software, which refers to software not... more
This paper examined the changes in librarianship brought about by advancement in technology especially as it relates to new work functions expected of librarians. The major objective of the study was to identify the role of curriculum in... more
Health information technology can save lives, cut costs, and expand access to care. But its full promise will only be realized if policymakers broker a "grand bargain" between providers, patients, and administrative agencies. In exchange... more
Despite the fact that the online criminal activities of Nigerian cyberfraudsters popularly known as the Yahoo-boys has attracted tremendous scholarly attention, little empirical information exists on their operational tools, techniques... more
Employees today are different. They are not the ones who do not have go experienced and talented ones. As soon as they feel dissatisfied with the current employer or the job due to lack of advancement opportunities, salary and... more
Con il patrocinio di Agenzia per l'Italia Digitale (AgID), nel 2016 la LUISS School of Government ha organizzato il corso executive Rivoluzione Digitale e Cybersecurity rivolto a un gruppo di alti dirigenti pubblici con responsabilità di... more
Upskirting – covertly photographing a person's genital or anal region, often to distribute the footage online – is frequently neglected as a form of serious online sexual predation against women. This behaviour has occurred for centuries,... more
This paper includes the gender-neutral approach of Section 66E of the IT Act,2000, the application of this section, the explanations, and the kind of situations this section would be applicable in, a similar provision in the Protection of... more
The advancement in technology has gained universal acceptance which has made the use of computer system almost unavoidable in today's world. Most of the facets of all sectors which includes but not limited to commercial, media, education... more
With the increase use of Information and Communication Technology (ICT) in society, there emerge a new form of crime in cyber space which is called Cyber Crime. The cyber crime is different from any other crime happening in the society.... more
The intent of this chapter is to re-imagine and apply the term " civil disobedience " to the cyber domain. The full extent of how it can apply will be analyzed in a framework of the evolutionary rights of protest. Traditional civil... more
In the past, we all witnessed that the production facilities were shifted to the countries with low employment costs due to the increasing labour costs around the world. Today, especially with the revolution of industry 4.0 initiated... more
Purpose-The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move... more
Businesses using cyberspace are expanding every day, with Internet users performing different activities affecting cyber hygiene. The user's actions may be good or badultimately determining the state of cyber hygiene. Good cybersecurity... more