Language:
English
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Cybercrime
1.
This refers to any illegal activity involving a computer, networked device or a network. Many
cybercrime
s take place purely for financial gain although some take place against computers or devices to impair them or disable them and others use computers to spread malware, illegal information, images, or other types of data.
Learn more in: The Role of Education and Awareness in Tackling Insider Threats
2.
Activities of attacks such as unauthorized access to information systems through computer and internet networks such as espionage, financial theft, capturing data, theft of financial data and passwords, blocking the use of the system and log in, blocking or delaying communication.
Learn more in: Business Management and Strategy in Cybersecurity for Digital Transformation
3.
Cybercrime
is defined as any illegal activity that uses a computer either as the object of the crime OR as a tool to commit an offense.
Learn more in: Cybersecurity: What Matters to Consumers – An Exploratory Study
4.
Is all illegal acts, the commission of which involves the use of information and communication technologies. It is generally thought of as any criminal activity involving a computer system.
Learn more in: Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
5.
The use of a computer to commit a crime.
Learn more in: International Cooperation and Legal Response to Cybercrime in Pakistan
6.
Cybercrime
is a crime involving a computer and a network. The computer may have been used to commission a crime, or it may be the target.
Cybercrime
can affect a person's security and financial health.
Learn more in: Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
7.
The use of a computer to commit a crime.
Learn more in: Psychosocial Aspects of Cybercrime Victimization in Pakistan
8.
It is a computer related crime, done against an individual or group of individuals to harm the reputation or cause mental and physical harm.
Learn more in: Biometrics for Forensic Identification in Web Applications and Social Platforms Using Deep Learning
9.
Committing an illegal act using a computer or network device.
Learn more in: Cybercrimes Technologies and Approaches
10.
This is the activity of criminals who operate on the internet.
Learn more in: Underground Cyber Economy and the Implication for Africa's Development: A Theoretical Overview
11.
Cybercrime
is the use of a computer device or an online network to commit digital crimes and destruction such as fraud, online image abuse, identity theft or threats and intimidation, which are unethical in nature, and such illegal activities can result in loss, damages, destruction to users and their computing devices.
Learn more in: Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
12.
The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Learn more in: Revisiting the Cyberbullying Legislation in Bangladesh: A Comparative Study With the Global Scenario
13.
Cybercrime
is an activity that a user performs with computer, mobile device and the Internet that is punishable by law. Examples of
cybercrime
s are online fraud, character assassination, misinformation, and blackmailing.
Learn more in: Statistical Methods for Conducting the Ontology and Classifications of Fake News on Social Media
14.
law violations involving abuse and misuse of information conducted on or through the Internet.
Learn more in: Emerging Cybercrime Variants in the Socio-Technical Space
15.
Crime committed using a computer or a network, where a computer may or may not have played an instrumental part in the commission of the crime.
Learn more in: Fighting Cybercrime and Protecting Privacy: DDoS, Spy Software, and Online Attacks
16.
A
cybercrime
is a crime committed through a computer or computer network. The computer might have been used to conduct the crime, or it could be the intended victim.
Learn more in: Cyberwar: Its Psychological Impact on Employees and Consequences for Organizations
17.
A criminal activity which is carried out using computers to commit an offense.
Learn more in: Cyber Threat Ransomware and Marketing to Networked Consumers
18.
The use of a computer, internet, or information technology as a means to further illegal ends.
Learn more in: Examining the Impact of COVID-19 on Cryptocurrency Enforcement in the United States
19.
Criminal activity involving computer systems, networks, and/or the internet.
Learn more in: Cybercrime in Online Gaming
20.
Cybercrime
is any type of crime in which digital devices are used as weapons or targets.
Learn more in: Mapping Cyberbullying and Workplace Cyberbullying: A Road Towards Understanding Research Gaps in the Indian Context
21.
Any crime that is facilitated or committed using a computer, network, or hardware device.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
22.
Any crime that is facilitated or committed using a computer, network, or hardware device.
Learn more in: Cyberchondria, Coronavirus, and Cybercrime: A Perfect Storm
23.
In a broad sense is a crime in which the computer or communication networks are the target, tool, or are involved in criminal act.
Learn more in: Crime and Victimization in Cyberspace: A Socio-Criminological Approach to Cybercrime
24.
It is also known as digital crime.
Learn more in: Cyber Forensics: Its Importance, Cyber Forensics Techniques, and Tools
25.
Cybercrime
is defined as any criminal activity involving a computer, networked device, or network. While most
cybercrime
s are committed to generate profit for the perpetrators, some
cybercrime
s are committed against computers or devices directly in order to damage or disable them.
Learn more in: Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
26.
The usage of the computer and its related technologies for the purpose of disrupting, with the motivation to gain financial gains or causing political, social, and psychological harm.
Learn more in: Cyber Crime Regulation, Challenges, and Response
27.
Technological crimes or crimes committed to complement traditional crimes for financial gain.
Learn more in: Cybercrime and Cybercriminals
28.
A
cybercrime
is any criminal activity that involves a computer a networked device or a network.
Learn more in: Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites
29.
Is conducted with the assistance of computers. Examples of
cybercrime
may include identity theft, online fraud, or other methods used to defraud individuals.
Learn more in: The Evolutionary Path of Legal Responses to Cybercrime Threats Over the Last Decade
30.
A broad term that refers to criminal activities committed using networks of electronic communication (e.g. the Internet) and digital devices.
Learn more in: Online Child Pornography: Conceptual Issues and Law Enforcement Challenges
31.
a) Also referred to as computer crime, or computer-based criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing money from online bank accounts.
Cybercrime
also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet; b) Crimes perpetrated over the Internet, typically having to do with online fraud.
Learn more in: Defending Information Networks in Cyberspace: Some Notes on Security Needs
32.
“Crime committed with, or facilitated by, computers, the Internet, and the World Wide Web, and other online services” ( Davis, 2002 ). Today’s technologies now permit enemies of the state to engage in acts of asymmetrical warfare to damage and exploit weakness in their opponent’s defenses.
Learn more in: Laws and Methods for Mitigating Terrorism and Mass Violence
33.
Any crime that is facilitated or committed using a computer, network, or hardware device.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
34.
Kind of crime developed with the new technologies of communication and information.
Learn more in: Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries
35.
The violation of law on internet platforms (or in cyberspace) by incorporating internet tools and electronic devices such as phones and computers.
Learn more in: Intimate Partner Cyber Abuse Viewed Through the Lens of Criminology
36.
A crime that involves a computer and a network.
Learn more in: Cyber Crime Against Women and Girls on Social Sites in Bangladesh
37.
Criminal activities conducted in cyberspace.
Learn more in: The Increased Need for Cybersecurity in Developing Countries: COVID-19 and the Adverse Cybercrime Risks Imposed
38.
Criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud (Taylor 1999).
Learn more in: Turning Westward: Information Policies in Post Communist Romania and Bulgaria
39.
Crime that either (1) is carried out through the use of computers and networks or (2) targets computers and networks.
Learn more in: Digital Ethics
40.
Criminal activities carried out by means of computers and technology and/or targeting computers/technology.
Learn more in: US Cybersecurity Laws and Regulations: Current Trends and Recommendations for Improvement
41.
Crime done in or using cyberspace is called
cybercrime
.
Learn more in: A Survey on Emerging Cyber Crimes and Their Impact Worldwide
42.
A crime, in the legal sense, using the internet or computer network.
Learn more in: Indirect Attribution in Cyberspace
43.
Any crime committed using the ICT platform. These may be child pornography, phishing, cyber terrorism, etc.
Learn more in: Investigating Cybercrime in Nigeria
44.
Illegal intrusions that involve the use of information communication technologies.
Learn more in: Cyber Security Education in the Fourth Industrial Revolution: The Case of South Africa
45.
It is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
Cybercrime
may threaten a person, company or a nation's security and financial health.
Learn more in: Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things
46.
Illegal actions conducted via any technological device, which includes hardware and software.
Learn more in: Online Activism to Cybercrime
47.
The use of a computer to commit a crime.
Learn more in: Theoretical Context of Cybercrime
48.
The use of a computer to commit a crime.
Learn more in: International Context of Cybercrime and Cyber Law
49.
Any criminal action perpetrated primarily through the use of a computer.
Learn more in: Cybersecurity Legislation
Find more terms and definitions using our
Dictionary Search
.
Cybercrime
appears in:
Cybersecurity Education for Awareness and...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Cybercrime
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 176,600 titles for
Cybercrime
to find related research papers.
Learn More About Cybercrime in These Related Titles
The Role of Child Life Specialists in Commun...
Social Sciences & Humanities
Copyright 2023. 472 pages.
While the genesis of the Certified Child Life Spec...
In Stock
$29.50 Individual Chapters
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$29.50 Individual Chapters
Handbook of Research on Organizational Cultu...
Business & Management
Copyright 2021. 394 pages.
Organizations are facing major disruptions in tech...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$29.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Servant Leadership: Research and Practice
Business & Management
Copyright 2014. 405 pages.
Leaders represent a necessary part of any organiza...
In Stock
$29.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$29.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$29.50 Individual Chapters