Cyber E-Crimes ،Cyber Laws،Definitional Challenges and their Impacts: A Review

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,477

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ECDC08_062

تاریخ نمایه سازی: 6 آذر 1393

Abstract:

In the current era of online processing, maximum of the information is online and prone to cyber threats.Cyber crime is a kind of crime that happens in cyberspace, that is,happens in the world of computer and the Internet. Cyber crime has become a global phenomenon; this kind of crime has the serious potential for severe impact on our lives, society, and economy because our society is becoming an information society where communication takes place in cyberspace. While there are several textbooks talking about cyber crime, but only few literatures focus on the relevant laws to combat these seemingly uncontrollable phenomenon.. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have somemotivation behind it or may be processed unknowingly. Restriction of cyber crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society in the form of economical disrupt, psychological disorder, threat to National defense. Therefore, the current manuscript provides the understanding of cyber crimes ،cyber law and their impacts over society with the future trends of cyber crimes. The discourse will start from origins,types, classifications, s and propose recommendations to possibly reduce the growing problems in our society.

Authors

Mehdi Ebrahiminejad

Ph.D Student in Crisis Management from ShakhesPajoh research Institut in Isfahan

Mohadeseh Hamedi

Faculty member of ShahidBahonar University of Kerman

Samira Hasanzadeh

Ph.D Student in Crisis Management from ShakhesPajoh research Institut in Isfahan

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Bowen, Mace (2009), Computer Crime, Available at: http ://www. guru.net/, ...
  • Berinato, S. (2002), Enron IT: A take of Excess and ...
  • http :/capec .mitre _ org/data/de finitions/ 1 17.ht ml, Visited: ...
  • Computer Hope (2012), Data Theft, Available ...
  • http ://www. computerhope .com/j argon/d/ datathef.htm, Visited: 28/01/2012 ...
  • cybercrime .htm, Visited: 28/01/2012 ...
  • By Jessica Stanicon (2009), Available at: http ://www. dynami cbusines ...
  • cybercrime3 907.html, Visited: 28/01/2012. network ...
  • Wow Essay (2009), Top Lycos Networks, at: http : //www. ...
  • dbase/ab2/ ny90.shtml, Visited: 28/01/2012. Virus ...
  • C entre/html/cyb er_crime_glo Ssary. shtml, Visited: 28/01/2012 ...
  • Kelly, _ 1999, Preserve, Protect, and Defend, Journal of Business ...
  • Lyman, J.(2002) In Search of the World:s http://www. ...
  • Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba ...
  • http ://docs .oracle. com/cd/B 13789_01/ ...
  • network.101/ b 1 0 777/overview .htm, Visited: 28/01/2012. ...
  • Power, R.(2001) CSI/FBI Computer Crime and Security Survey, Computer Security ...
  • Sprecher, R., and M. Pertl(1988) Intra- Industry Effects of the ...
  • نمایش کامل مراجع