Cyber E-Crimes ،Cyber Laws،Definitional Challenges and their Impacts: A Review

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,489

فایل این مقاله در 13 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECDC08_062

تاریخ نمایه سازی: 6 آذر 1393

چکیده مقاله:

In the current era of online processing, maximum of the information is online and prone to cyber threats.Cyber crime is a kind of crime that happens in cyberspace, that is,happens in the world of computer and the Internet. Cyber crime has become a global phenomenon; this kind of crime has the serious potential for severe impact on our lives, society, and economy because our society is becoming an information society where communication takes place in cyberspace. While there are several textbooks talking about cyber crime, but only few literatures focus on the relevant laws to combat these seemingly uncontrollable phenomenon.. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have somemotivation behind it or may be processed unknowingly. Restriction of cyber crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society in the form of economical disrupt, psychological disorder, threat to National defense. Therefore, the current manuscript provides the understanding of cyber crimes ،cyber law and their impacts over society with the future trends of cyber crimes. The discourse will start from origins,types, classifications, s and propose recommendations to possibly reduce the growing problems in our society.

نویسندگان

Mehdi Ebrahiminejad

Ph.D Student in Crisis Management from ShakhesPajoh research Institut in Isfahan

Mohadeseh Hamedi

Faculty member of ShahidBahonar University of Kerman

Samira Hasanzadeh

Ph.D Student in Crisis Management from ShakhesPajoh research Institut in Isfahan

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Bowen, Mace (2009), Computer Crime, Available at: http ://www. guru.net/, ...
  • Berinato, S. (2002), Enron IT: A take of Excess and ...
  • http :/capec .mitre _ org/data/de finitions/ 1 17.ht ml, Visited: ...
  • Computer Hope (2012), Data Theft, Available ...
  • http ://www. computerhope .com/j argon/d/ datathef.htm, Visited: 28/01/2012 ...
  • cybercrime .htm, Visited: 28/01/2012 ...
  • By Jessica Stanicon (2009), Available at: http ://www. dynami cbusines ...
  • cybercrime3 907.html, Visited: 28/01/2012. network ...
  • Wow Essay (2009), Top Lycos Networks, at: http : //www. ...
  • dbase/ab2/ ny90.shtml, Visited: 28/01/2012. Virus ...
  • C entre/html/cyb er_crime_glo Ssary. shtml, Visited: 28/01/2012 ...
  • Kelly, _ 1999, Preserve, Protect, and Defend, Journal of Business ...
  • Lyman, J.(2002) In Search of the World:s http://www. ...
  • Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba ...
  • http ://docs .oracle. com/cd/B 13789_01/ ...
  • network.101/ b 1 0 777/overview .htm, Visited: 28/01/2012. ...
  • Power, R.(2001) CSI/FBI Computer Crime and Security Survey, Computer Security ...
  • Sprecher, R., and M. Pertl(1988) Intra- Industry Effects of the ...
  • نمایش کامل مراجع