Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber Crime

Handbook of Research on Threat Detection and Countermeasures in Network Security
A conventional crime is a crime committed by conventional means; an example of conventional crimes is theft. Cyber crime is a crime committed by using the cyber media as internet, email and alike. An example of cyber crime is the email scam.
Published in Chapter:
Cyber Crimes: Types, Sizes, Defence Mechanism, and Risk Mitigation
Hasan L. Al-Saedy (British Institute of Technology and E-Commerce, UK)
DOI: 10.4018/978-1-4666-6583-5.ch009
The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Proposals to Win the Battle Against Cyber Crime
A crime committed using a computer and the communication as an object or subject of crime for illegal action to steal a person's identity, illegal imports, or malicious programs.
Full Text Chapter Download: US $37.50 Add to Cart
Financial Forensic Evidence and Acceptability in the Court of Law
Refers to criminal activities committed by means of computers or the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Regulation of Cybercafés in Nigeria
This is referred to as criminal activity committed on the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime Toolkit Development
computer related crime, is a crime that involves a computer and a network.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security: Cyber Risk Challenges for Future Leaders and Businesses
The use of classical hacker tools to break into systems with the intent to install botnets that start attacks or steal data. These attacks are typically carried out by crime groups with the goal of making money.
Full Text Chapter Download: US $37.50 Add to Cart
Exploratory Research of Cyber Security Dimensions: Selected Use Cases Analysis
It refers to activities that can potentially cause harm to systems, applications, networks and other devices forming information and communication system.
Full Text Chapter Download: US $37.50 Add to Cart
The Changing New Face of the Concept of Crime in the Digital Age: Cyber Crime
It is a type of crime that is committed by using technological and informatics tools, unlike classical crime types. It covers the total harm to countries, nations, communities, people, institutions, and individuals by exploiting security vulnerabilities by using information systems.
Full Text Chapter Download: US $37.50 Add to Cart
Turning Weakness into Strength: How to Learn From an IT Security Incident
Cyber crime is one potential classification of an information security incident. An information security incident is termed cyber crime when it is a combination of illegal actions such as those defined in Section 18 of the United States Code, part 1030, but the effects are less than the threshold of cyber war ( Brenner, 2004 ). This definition encompasses a wide range of potential information security incidents.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Risk: A Big Challenge in Developed and Emerging Markets
A harmful activity executed by one group through computers, IT systems, and/or the internet and targeting the computers, IT infrastructure, and internet presence of another entity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR