CFP last date
20 January 2025
Reseach Article

A Survey: Web based Cyber Crimes and Prevention Techniques

by Jheel Somaiya, Dhaval Sanghavi, Chetashri Bhadane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 17
Year of Publication: 2014
Authors: Jheel Somaiya, Dhaval Sanghavi, Chetashri Bhadane
10.5120/18467-9827

Jheel Somaiya, Dhaval Sanghavi, Chetashri Bhadane . A Survey: Web based Cyber Crimes and Prevention Techniques. International Journal of Computer Applications. 105, 17 ( November 2014), 6-9. DOI=10.5120/18467-9827

@article{ 10.5120/18467-9827,
author = { Jheel Somaiya, Dhaval Sanghavi, Chetashri Bhadane },
title = { A Survey: Web based Cyber Crimes and Prevention Techniques },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 17 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number17/18467-9827/ },
doi = { 10.5120/18467-9827 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:56.621022+05:30
%A Jheel Somaiya
%A Dhaval Sanghavi
%A Chetashri Bhadane
%T A Survey: Web based Cyber Crimes and Prevention Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 17
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Offences those are committed against an individual or a groupwith a criminal motive to intentionally harm the reputation or cause physical or mental harm to the victim using modern telecommunication networks such as the Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS) are termed as cyber-crimes. Cyber-crime is any illegal activity that uses a computer as its primary means. There are two main categories that define the make-up of cyber-crimes. Firstly viruses, malware, or denial of service attacks that target computer networks or devices. The second category relate to crimes that are facilitated by computer networks or devices like cyber-stalking, fraud, identity-theft, extortion, phishing (spam) and theft of classified information. It is widely known that victims of Internet crimes are often reluctant to report an offence to authorities or in some cases the individual may not even be aware a crime has been committed. Even though facilities for reporting incidents of cyber-crime have improved in recent years many victims remain reluctant to do so due to embarrassment. International cooperation is essential if a good response is to be found against global cyber-crime. No nation can effectively combat the issue alone in an easy way. Many computer based crimes are initiated 'off-shore' and this presents enormous challenges to any nations agencies of law enforcement. It is crucial that agencies from around the world formulate actionable plans to detect, follow, arrest and prosecute criminals of cyber-crime. Computers and the Internet have been a boon to our society; unfortunately criminals now make use of these technologies to detriment our society.

References
  1. Cordy E, "The legal regulation of e-commerce transact- tions", Journal of American Academy of Business, vol. 2, no. 2, pp. 400-407, 2009.
  2. Cyber Crime Today & Tomorrow, Thiru Dayanithi Maran.
  3. Geer D, "Security technologies go phishing", Computer, vol. 38, no. 6, pp. 18-21, 2010.
  4. MacInnes I, Musgrave D, and Laska J, "Electronic commerce fraud: towards an understanding of the phenomenon", Proceedings of the 38th Annual Hawaii International Conference, 2011.
  5. McCrohan K, "Facing the threats to e-commerce", The Journal of Business & Industrial Marketing, vol. 18, no. 2/3, pp. 133-145, 2011.
  6. McCusker R, "E-Commerce, Business and Crime: Inextricably Linked, Diametrically Opposed", The Company Lawyer, vol. 23, no. 1, pp. 3-8, 2012.
  7. Sukha N, "Hacking and cybercrime", Proceedings of the 1st Annual Conference on Information Security Curriculum Development-ACM, pp. 128-132, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Stalking Hacking Phishing Cross Site Scripting Vulnerability