Cyber crime has increased significantly as the Internet became ubiquitous. This increased research in the field of sociology and criminology to understand this new field of crime, which is very different compared to traditional crimes. However, sociologists and criminologists try to apply traditional sociological theories to explain cyber crime. This literature review examines the reliability of Routine Activity Theory (RAT) to explain victimization of cyber crime in relation to activities online
Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. The Department of Justice divides cybercrime into three categories: crimes in which the computing device is the target, for example, to gain network access; crimes in which the computer is used as a weapon, for example, to launch a denial of service (DoS) attack; and crimes in which the computer is used as an accessory to a crime, for example, using a computer
arrested due to fraud (Hamsi, 2015). As the cyber crime incident increasing from time to time and it is affecting both Government and Corporate sector and well as individual. So, the main aims of this research will be to find out the truth which on cybercrime that is hidden and which has not been discovered as yet as it relate to the rate of increasing of sophistication hacking and ultimately find the way to deter it or at least to reduce the cyber crime activities to the barest minimum. Well, although
globalized. Social media is one of the biggest key in making it happen. It is a globalizing agent. Apart from its benefits it has dark side too in the form of cyber harassment/stalking which leads to many social and psychological problems for the people under influence of this technology. The aim of this research essay is to investigate the increase of cyber harassment and bullying on social media and highlight the steps that are taken for its prevention. In order to have better understanding, we first going
It disregards race, culture and beliefs and propagates a rigid ideology, and if one does not follow this ideology then they are either oppressing or being oppressed. A prime example is the view of Muslim women by cyber-feminist bloggers and writers who often categorize them as oppressed simply because they wear a veil or are covered in some other way. They fail to realize that modesty forms a core component of the Muslim belief system and the women who cover themselves
both the digital society and the physical society. The community as traditionally conceived is playing a bigger role in policing in the 21st century but the concept of a digital society in cyber policing is profitably
and refined over time. The most notable development of this theory was by Robert Agnew in the article Pressured Into Crime: General Strain Theory. This theory contends that individuals experience a wide variety of strains and to gain some relieve from these strains, use deviant or criminal methods of coping. However, it has become evident that middle-class individuals commit crimes or are drawn to deviancy despite having the means to gain monetary success or other social
Internet, accessible on any digital device, usually containing interactive user feedback and creative participation. Common examples of new media include websites such as online newspapers, blogs, or wikis, video games, and social media. A defining characteristic of new media is dialogue. New Media transmit content through connection and conversation. It enables people around the world to share, comment on, and discuss a wide variety of topics. Unlike any of past technologies, New Media is grounded on
SYNCHROPHASOR TECHNOLOGY FOR CYBER SECURITY IN SMART GRID P.THANGARATHINAM N.SUGANYA thangam102@gmail.com suganraj06@gmail.com +91 9486052493 +91 9600750288 S.VIGNESH T.PRADDEEP vicky900666@gmail.com praddeepsvp@gmail.com +91 9629340245 +91 9489686137 FINAL YEAR - BE ELECTRICAL AND ELECTRONICS ENGINEERING Kongu Engineering College (Autonomous) Erode, Tamilnadu, ABSTRACT: The smart grid is controlled by an authority personal who uses LAN or the internet to control it. By knowing this information any
this profession. When it comes to your task and responsibilities you have to be on the call 24 hours a day, 7 days a week. You may be asked to investigate a number of crimes associated with customs and immigration including dealing with money laundering, human trafficking, immigration fraud, child exploitation, cyber crime, drug trafficking, gang activity and weapon smuggling and trafficking. Having Job specific skills like Undercover work, initiating criminal organizations or business to uncover