IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • The Phenomenon of Cyber Crime


    Author(s): PANDELICĂ, Ioana-Lucia

    Quick view | Full article | Citations | Views: 463


    Author(s) keywords: , ,


    Reference keywords: ,


    Abstract:

    With the rapid growth of computer and network systems in recent years, there has also been a corresponding increase in cyber-crime. Cyber crime takes many forms and has garnered much attention in the media, making information security a more urgent and important priority. With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures.



    References:

    [1]. Hemraj Saini, Yerra Shankar Rao, T.C.Panda, Cyber-Crimes and their Impacts: A Review, International Journalof Engineering Research and Applications, Vol. 2, Issue 2, Mar-Apr 2012, pp. 202-209.
    [2]. Ajeet Singh Poonia, Awadesh Bhardwaj, G.S. Dangayach, Cyber Crime: Practices and Policies for Its Prevention, Special No. of the International Journal of the Computer, the Internet and Management, vol. 19, 2011.
    [3]. S. Gordon, On the definition and classification of cybercrime, Journal in Computer Virology, vol. 2.
    [4]. S. Dilek, H. Çakır, M. Aydın, Applications of Artificial Intelligence Techniques to Comating Cyber Crimes: A review, International Journal of Artificial Intelligence & Applications, vol. 6, 2015.
    [5]. Dictionary.com, https://www.dictionary.com/browse/cybercrime, [Online]. [Accessed 07 12 2019].
    [6]. B. S. Fisher, Encyclopedia of Victimology and Crime Prevention, 2010.
    [7]. S. W. Brenner, Cybercrime: Criminal Threats from Cyberspace, 2010.
    [8]. M. Bowen, http://www.guru.net/, [Online]. [Accessed 07 12 2019].
    [9]. Security Overviews, Oracle, [Online]. Available: http://docs.oracle.com/cd/B13789_01/ network.101/b10777/overview.htm.
    [10]. SANS Technology Institute, Security Predictions 2012 & 2013 -The Emerging Security Threa, [Online]. Available: https://www.sans.edu/cyber-research.
    [11]. L.A. Gordon, M.P. Loeb, T. Sohail, A Framework for Using Insurance for Cyber-Risk Management, 2003.
    [12]. Sumanjit Das, Tapaswini Nayak, Impact of Cyber Crimes: Issues and Challenges, International Journal of Engineering Sciences & Emerging Technologies, vol. 6, no. 2, 2013.
    [13]. I.C. Mihai, C. Ciuchi, G. Petrică, Current challanges in the field of cybersecurity - the impact and Romania's contribution to the field, Sitech, 2018, ISBN 978-606-11-6575-9.



    Additional Information

    Article Title: The Phenomenon of Cyber Crime
    Author(s): PANDELICĂ, Ioana-Lucia
    Date of Publication: 2020-06-22
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2020.01.04
    Issue: Volume 9, Issue 1, Year 2020
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 29-36 (8 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.