CFP last date
20 December 2024
Reseach Article

Combating Cybercrime using a Prototype PC Surveillance and Monitoring Software System

by Worlanyo Adom, Ping Zhang, Frederick A. Adrah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 9
Year of Publication: 2023
Authors: Worlanyo Adom, Ping Zhang, Frederick A. Adrah
10.5120/ijca2023922756

Worlanyo Adom, Ping Zhang, Frederick A. Adrah . Combating Cybercrime using a Prototype PC Surveillance and Monitoring Software System. International Journal of Computer Applications. 185, 9 ( May 2023), 34-39. DOI=10.5120/ijca2023922756

@article{ 10.5120/ijca2023922756,
author = { Worlanyo Adom, Ping Zhang, Frederick A. Adrah },
title = { Combating Cybercrime using a Prototype PC Surveillance and Monitoring Software System },
journal = { International Journal of Computer Applications },
issue_date = { May 2023 },
volume = { 185 },
number = { 9 },
month = { May },
year = { 2023 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number9/32732-2023922756/ },
doi = { 10.5120/ijca2023922756 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:25:41.938986+05:30
%A Worlanyo Adom
%A Ping Zhang
%A Frederick A. Adrah
%T Combating Cybercrime using a Prototype PC Surveillance and Monitoring Software System
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 9
%P 34-39
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recent innovations in the world of cybersecurity have heightened the scope of knowledge of computer forensic specialists, internet solution providers and system administrators. Most of these key players have observed that PC surveillance and Monitoring software systems can be beneficial in troubleshooting and cyber-crime investigation by using screen capture and a key-logging utilities. A proposed software system uses the basic and extended features of a spyware for software administrative control, computer surveillance and monitoring for illegal or inappropriate usage, fraud prevention and detection. The proposed system can be configured to be invisible for unwanted users in order to record the logging and operating information such as keystrokes, screen activity, voice conversations and to track the trail of usage of system applications.

References
  1. R. Oppliger, “Security and privacy in an online world,” Computer, vol. 44, no. 9, pp. 21–22, 2011.
  2. M. Humayun, M. Niazi, N. Jhanjhi, M. Alshayeb, and S. Mahmood, “Cyber security threats and vulnerabilities: a systematic mapping study,” Arabian Journal for Science and Engineering, vol. 45, pp. 3171–3189, 2020.
  3. R. R. Moeller, Sarbanes-Oxley internal controls: effective auditing with AS5, CobiT, and ITIL. John Wiley & Sons, 2008.
  4. D. Richards, P. H. Caldwell, and H. Go, “Impact of social media on the health of children and young people,” Journal of paediatrics and child health, vol. 51, no. 12, pp. 1152–1157, 2015.
  5. D. Mico, “Protecting the Digital Playground: Narrowly Tailoring the Meaning of Social Media to Prohibit Sexual Predators from Using Social Media,” U. Pac. L. Rev., vol. 51, p. 123, 2019.
  6. K. Subaramaniam, R. Kolandaisamy, A. B. Jalil, and I. Kolandaisamy, “Cyberbullying challenges on society: a review,” Journal of positive school psychology, vol. 6, no. 2, pp. 2174–2184, 2022.
  7. N. Imran, I. Aamer, M. I. Sharif, Z. H. Bodla, and S. Naveed, “Psychological burden of quarantine in children and adolescents: A rapid systematic review and proposed solutions,” Pakistan journal of medical sciences, vol. 36, no. 5, p. 1106, 2020.
  8. . Ilieva, P. Ivanov, and E. Stefanova, “Analyses of an agile methodology implementation,” presented at the Proceedings. 30th Euromicro Conference, 2004, IEEE, 2004, pp. 326–333.
  9. G. Ruhe and C. Wohlin, Software project management in a changing world, vol. 21. Springer, 2014.
  10. G. Kumar and P. K. Bhatia, “Impact of agile methodology on software development process,” International Journal of Computer Technology and Electronics Engineering (IJCTEE), vol. 2, no. 4, pp. 46–50, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity PC Surveillance and Monitoring Spyware