755 resources related to Cybercrime
- Topics related to Cybercrime
- IEEE Organizations related to Cybercrime
- Conferences related to Cybercrime
- Periodicals related to Cybercrime
- Most published Xplore authors for Cybercrime
Promote the exchange of ideas between academia and industry in the field of computer and networks dependability
The conference solicits experimental and theoretical works on social network analysis and mining along with their application to real life situations.
ICCIS will provide a forum for researchers, scientists and engineers to exchange and share their experiences, and research results about all aspects of computer and information science.
ICUMT is a premier annual international congress providing an open forum for researchers, engineers, network planners and service providers in telecommunications, control systems and robotics targeted on newly emerging systems, standards, services, and applications.The ICUMT congress will consist of open call sessions, workshops, industrial panels and exhibitions.
Presenting the very best research results, problem solutions and insights on new challenges in the field of dependable computing and security
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...
Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.
IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017
Nowadays, many technology-based applications and systems embedded with cybercrimes threats and risks. Our communities lack the basic skills to secure against a smart cybercrime threats. This study conducted to test and evaluate the current cybercrime risks and awareness in Alnamas area, a district in the Southern part of Saudi Arabia. The study targeted a set of users who are highly ...
2015 First International Conference on Anti-Cybercrime (ICACC), 2015
In today's fast changing world, cybercrimes are growing at perturbing pace. At the very definition of it, cybercrimes get engendered by capitalizing on threats and exploitation of vulnerabilities. However, recent history reveals that such crimes often come with surprises and seldom follow the trends. This puts the defense systems behind in the race, because of their inability to identify new ...
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), 2016
After a physical crime occurs an important action typically takes place: the reporting of the crime to the police. However, this action becomes more complex for a victim to properly execute when a cybercrime is experienced, which can be partly explained for instance by a lack of knowledge about cybercrimes and computer security. Cybercrime reporting is crucial because it can ...
2016 9th Biomedical Engineering International Conference (BMEiCON), 2016
This paper presents a cybercrime in medical devices such as all of devices feed in RJ-45. The reason of the physician can monitoring the patient's data from medical devices in hospital and how to protect them using technique of anti-crime, we study behavior of hacker to fine history of his/her crime and understanding cybercrime method. Finally we use as forensic ...
2015 First International Conference on Anti-Cybercrime (ICACC), 2015
This article highlights the challenges for the global community when harmonizing substantive cybercrime legislation. At the example of EU-Directive 2013/40/EU and the Council of Europe's Convention on Cybercrime the benefits of a model law over a binding international treaty are pointed out. Protecting critical infrastructures is recognized as most crucial and their vulnerability of digital attacks with trans-boundary effects is ...
Panel Q&A - ETAP Forum Namibia, Africa 2017
IROS TV 2019- Cutting Edge Forum:Autonomous Driving,Contributions from Intelligent Robotics,AI & ITS
Cyber Security: Why It’s Everyone’s Business - Panel at IEEE WIE Forum USA East 2017
Parry Aftab of Cybersafety India at Internet Inclusion: Advancing Solutions, Delhi, 2016
ETAP Forum Wrap-Up: Maike Luiken - ETAP Forum Namibia, Africa 2017
Internet Governance and Cybersecurity in Namibia: Elizabeth Kamutuezu - ETAP Forum Namibia, Africa 2017
Welcome Address: Nhlanhla Lupahla - ETAP Forum Namibia, Africa 2017
Working Group Topic Selection - ETAP Forum Namibia, Africa 2017
Implementation of a Framework to Support Cybersecurity and Internet Governance in Cameroon: Njei Check - ETAP Forum Namibia, Africa 2017
Cyber Security Awareness (CSA) in Africa: Basie von Solms - ETAP Forum Namibia, Africa 2017
Cybersecurity and Multi-Stakeholder Internet Governance - The AU Convention on Cybersecurity: Towela Nyirenda-Jere - ETAP Forum Namibia, Africa 2017
The Moral Importance of Cybersecurity | IEEE TechEthics Virtual Panel
Nowadays, many technology-based applications and systems embedded with cybercrimes threats and risks. Our communities lack the basic skills to secure against a smart cybercrime threats. This study conducted to test and evaluate the current cybercrime risks and awareness in Alnamas area, a district in the Southern part of Saudi Arabia. The study targeted a set of users who are highly familiar in using modern technology applications and services. All subjects are students from Bisha University, College of Science and Arts, Al- Namas. The study used 16 different parameters; each parameter covers a different cybercrime issue. The outputs showed that the reasons behind a cybercrime can be list in order as: sexual, financial, political, cultural, and fame. However, a social communication network is the most widely gateway for a cybercrime to occur (rate 69.6%). Generally, an anti-virus program is the only tool used as an anti-cybercrime technique. The results showed that, among the most common cybercrime occurred, is a sexual crime (registered the highest risk rate 57%). The study noticed that there is a lack of awareness in a cybercrime knowledge, and a strong interest for receiving an anti-cybercrime training modules (rate 80.7%).
In today's fast changing world, cybercrimes are growing at perturbing pace. At the very definition of it, cybercrimes get engendered by capitalizing on threats and exploitation of vulnerabilities. However, recent history reveals that such crimes often come with surprises and seldom follow the trends. This puts the defense systems behind in the race, because of their inability to identify new patters of cybercrime and to ameliorate to the required levels of security. This paper visualizes the empowerment of security systems through real-time data mining by the virtue of which these systems will be able to dynamically identify patterns of cybercrimes. This will help those security systems stepping up their defense capabilities, while adapting to the required levels posed by newly germinating patterns. In order to confine within scope of this paper, the application of this approach is being discussed in the context of selected scenarios ofcybercrime.
After a physical crime occurs an important action typically takes place: the reporting of the crime to the police. However, this action becomes more complex for a victim to properly execute when a cybercrime is experienced, which can be partly explained for instance by a lack of knowledge about cybercrimes and computer security. Cybercrime reporting is crucial because it can provide a multitude of data such as the prevalence of cybercrimes, the types and nature of the cybercrimes present, and the various resulting types of loss or harm (e.g., financial, psychological, emotional). Moreover, cybercrime reporting data is also actionable for two reasons: (1) prevention tips can be produced to educate users of how they can mitigate commonly occurring cybercrimes they may be faced with, and (2) the information provided can be useful for the appropriate law enforcement agencies to potentially reach a proper resolution for the cybercrime victim (i.e., the cybercriminal being caught, the recovery of stolen property). However, comparatively few academic works have focused on better understanding computer users' cybercrime reporting behaviors. In this paper, we first review the relevant literature, which predominantly focuses on the reasons that contribute to the underreporting of cybercrimes. Next, we highlight four particular challenges of cybercrime reporting. These challenges include the issue of computer users potentially having difficulty in properly identifying cybercrimes they may experience, fostering knowledge of how to report cybercrimes to the appropriate channels, providing incentives for cybercrime reporting, and the extent of feedback victims receive after filing a cybercrime report. Grounded in the surveyed literature and our previous work, we also provide a set of recommendations on how to approach these challenges in order to improve currently existing cybercrime reporting processes.
This paper presents a cybercrime in medical devices such as all of devices feed in RJ-45. The reason of the physician can monitoring the patient's data from medical devices in hospital and how to protect them using technique of anti-crime, we study behavior of hacker to fine history of his/her crime and understanding cybercrime method. Finally we use as forensic evidence by analyzing signal data from a database of DSI database crime comparison with cybercrime investigation. The result was that there was no security in medical devices procedure bad effects.
This article highlights the challenges for the global community when harmonizing substantive cybercrime legislation. At the example of EU-Directive 2013/40/EU and the Council of Europe's Convention on Cybercrime the benefits of a model law over a binding international treaty are pointed out. Protecting critical infrastructures is recognized as most crucial and their vulnerability of digital attacks with trans-boundary effects is identified. Eventually the EU-Directive is proposed as a potential model law for international harmonization regarding core cybercrimes.
The mass-production of online websites is one of the most confrontations of detecting cybercriminal activities. Monitoring the construction or visitation of such websites is somewhat unsophisticated process if it relies on filtering the URL addresses alone, like Proxy. However, user online interactions can be concealed if passed through security protocols or anonymity networks, like Tor. Nowadays, Tor has been widely used to conceal website addresses, web page contents, user actions, and user anonymity. On the other hand, website traffic analysis and fingerprinting techniques endeavor to break such privacy by revealing user actions and anonymity. Basically, this is considered as a negative behavior. However, in this paper, we study how fingerprinting techniques can positively be adapted by Internet Service Providers to be used against Cybercrime activities. In other words, fingerprinting techniques can play a vital role for investigating and mitigating cybercrimes. We present several fingerprinting techniques and countermeasures from a cybercrime point of view. Then, we (1) illustrate how fingerprinting techniques can be applied as cybercrime investigation models, and (2) discuss the expected challenges of such application.
The proliferation of cybercrime necessitates all internet-connected states to be involved in cybercrime regulation. Although it has been stated that the internet per se and cyberspace in general are by its very nature ungovernable, many states have taken territorial control of the internet although the effectiveness of such control in cross-border crime commission may be questioned. The internet may very well become ungovernable if a nation-state takes a unilateral decision on which conduct constitutes permissible online conduct or endeavours to superimpose laws on other nation-states. It is therefore suggested that under the auspices of the United Nations and within an international law context the following issues should be addressed: conceptualizing the term “cybercrime” in establishing for example whether it includes a cyber-attack, determining which online conduct is permissible to ensure peace and security and initiating negotiations towards a Cybercrime Treaty.
A comprehensive model and taxonomy of Cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 1 of this two- part series, which appeared in the January/February 2015 issue of IEEE Security & Privacy, explored Cyberattackers and their motives in detail. Part 2 focuses on the other key stakeholders: defenders and victims of cybercrime.
With the increased use of ICT in different areas of contemporary life, the widespread access to the Internet, and the use of social media, individuals and organisations face constant threats and challenges resulting from the bad consequences of cybercrimes. Research shows that the incidence of cybercrime is increasing. In response to these threats and challenges, government and law enforcement agencies in different countries around the world have enacted anti-cybercrime laws. The aim of this paper is to compare the existing anti- cybercrime laws in the Gulf Cooperation Council (GCC) countries. It adopts a comparative research approach. According to the findings, although these countries share common traditions and Islamic, legal, cultural and social values, there are some similarities and differences in their anti-cybercrime laws. Furthermore, there is variation in the scope of addressing cybercrimes. The paper highlights some issues related to these laws and provides suggestions for improvement and future research.
Spam emails are rapidly increasing on a daily base. An attacker could attract the email users to open spam and click on the embedded links that could takes him to malicious Web pages. We tried to inspect the awareness and the attitude of college students in three main Universities in Jordan. As total, 600 students from educational, science and IT colleges were surveyed. Although most of the students who participated in the study were offensive towards the spam email and cybercrimes, few participants do nothing against it. The students' major plays important role in increasing the awareness against the spam emails and cybercrimes. Moreover, we investigated three main factors as we thought it could attract the students to open and read the spam emails that could lead them to be a victim of cybercrimes. These factors are technological, social, economical and religious. The participation in this study was voluntary, only the students who have the willingness to participate in our study fill the survey. The result shows that some of the educational major participants are seldom use their email accounts, while others have some knowledge on spam emails and cybercrimes, yet they may get stimulated to follow certain emails. Those participants are more vulnerable to cybercrimes. Towards the end, we condensed a research direction and recommendations to rise up user's awareness and arm them well to the battle with spam emails and cybercrimes.
No standards are currently tagged "Cybercrime"