Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cybercrime

Cybersecurity Education for Awareness and Compliance
This refers to any illegal activity involving a computer, networked device or a network. Many cybercrimes take place purely for financial gain although some take place against computers or devices to impair them or disable them and others use computers to spread malware, illegal information, images, or other types of data.
Published in Chapter:
The Role of Education and Awareness in Tackling Insider Threats
Shaun Joseph Smyth (Ulster University, UK), Kevin Curran (Ulster University, UK), and Nigel McKelvey (Computer Science Department, Letterkenny Institute of Technology, Ireland)
Copyright: © 2019 |Pages: 20
DOI: 10.4018/978-1-5225-7847-5.ch003
Abstract
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Business Management and Strategy in Cybersecurity for Digital Transformation
Activities of attacks such as unauthorized access to information systems through computer and internet networks such as espionage, financial theft, capturing data, theft of financial data and passwords, blocking the use of the system and log in, blocking or delaying communication.
Full Text Chapter Download: US $37.50 Add to Cart
E-Business Applications by the Food, Agro, and Marine Segments of Micro and Small Enterprises (MSEs)
Cybercrime can be described as any unlawful conduct involving a computer, networked device, or network.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: What Matters to Consumers – An Exploratory Study
Cybercrime is defined as any illegal activity that uses a computer either as the object of the crime OR as a tool to commit an offense.
Full Text Chapter Download: US $37.50 Add to Cart
Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
Is all illegal acts, the commission of which involves the use of information and communication technologies. It is generally thought of as any criminal activity involving a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
International Cooperation and Legal Response to Cybercrime in Pakistan
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
Cybercrime is a crime involving a computer and a network. The computer may have been used to commission a crime, or it may be the target. Cybercrime can affect a person's security and financial health.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Biometrics for Forensic Identification in Web Applications and Social Platforms Using Deep Learning
It is a computer related crime, done against an individual or group of individuals to harm the reputation or cause mental and physical harm.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrimes Technologies and Approaches
Committing an illegal act using a computer or network device.
Full Text Chapter Download: US $37.50 Add to Cart
Underground Cyber Economy and the Implication for Africa's Development: A Theoretical Overview
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
Cybercrime is the use of a computer device or an online network to commit digital crimes and destruction such as fraud, online image abuse, identity theft or threats and intimidation, which are unethical in nature, and such illegal activities can result in loss, damages, destruction to users and their computing devices.
Full Text Chapter Download: US $37.50 Add to Cart
Revisiting the Cyberbullying Legislation in Bangladesh: A Comparative Study With the Global Scenario
The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of Cybersecurity in the Business World
A criminal activity carried out in order to damage or disable a networked device or network in order to derive monetary gains for cyber criminals, or harm an entity’s ability to earn further.
Full Text Chapter Download: US $37.50 Add to Cart
Statistical Methods for Conducting the Ontology and Classifications of Fake News on Social Media
Cybercrime is an activity that a user performs with computer, mobile device and the Internet that is punishable by law. Examples of cybercrimes are online fraud, character assassination, misinformation, and blackmailing.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cybercrime Variants in the Socio-Technical Space
law violations involving abuse and misuse of information conducted on or through the Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Fighting Cybercrime and Protecting Privacy: DDoS, Spy Software, and Online Attacks
Crime committed using a computer or a network, where a computer may or may not have played an instrumental part in the commission of the crime.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberwar: Its Psychological Impact on Employees and Consequences for Organizations
A cybercrime is a crime committed through a computer or computer network. The computer might have been used to conduct the crime, or it could be the intended victim.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Threat Ransomware and Marketing to Networked Consumers
A criminal activity which is carried out using computers to commit an offense.
Full Text Chapter Download: US $37.50 Add to Cart
Examining the Impact of COVID-19 on Cryptocurrency Enforcement in the United States
The use of a computer, internet, or information technology as a means to further illegal ends.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime in Online Gaming
Criminal activity involving computer systems, networks, and/or the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Mapping Cyberbullying and Workplace Cyberbullying: A Road Towards Understanding Research Gaps in the Indian Context
Full Text Chapter Download: US $37.50 Add to Cart
Concept and Practices of Cyber Supply Chain in Manufacturing Context
Any crime that is facilitated or committed using a computer, network, or hardware device.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberchondria, Coronavirus, and Cybercrime: A Perfect Storm
Full Text Chapter Download: US $37.50 Add to Cart
Crime and Victimization in Cyberspace: A Socio-Criminological Approach to Cybercrime
In a broad sense is a crime in which the computer or communication networks are the target, tool, or are involved in criminal act.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
Cybercrime is defined as any criminal activity involving a computer, networked device, or network. While most cybercrimes are committed to generate profit for the perpetrators, some cybercrimes are committed against computers or devices directly in order to damage or disable them.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime Regulation, Challenges, and Response
The usage of the computer and its related technologies for the purpose of disrupting, with the motivation to gain financial gains or causing political, social, and psychological harm.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime and Cybercriminals
Technological crimes or crimes committed to complement traditional crimes for financial gain.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites
A cybercrime is any criminal activity that involves a computer a networked device or a network.
Full Text Chapter Download: US $37.50 Add to Cart
The Evolutionary Path of Legal Responses to Cybercrime Threats Over the Last Decade
Is conducted with the assistance of computers. Examples of cybercrime may include identity theft, online fraud, or other methods used to defraud individuals.
Full Text Chapter Download: US $37.50 Add to Cart
Online Child Pornography: Conceptual Issues and Law Enforcement Challenges
A broad term that refers to criminal activities committed using networks of electronic communication (e.g. the Internet) and digital devices.
Full Text Chapter Download: US $37.50 Add to Cart
Defending Information Networks in Cyberspace: Some Notes on Security Needs
a) Also referred to as computer crime, or computer-based criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing money from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet; b) Crimes perpetrated over the Internet, typically having to do with online fraud.
Full Text Chapter Download: US $37.50 Add to Cart
Laws and Methods for Mitigating Terrorism and Mass Violence
“Crime committed with, or facilitated by, computers, the Internet, and the World Wide Web, and other online services” ( Davis, 2002 ). Today’s technologies now permit enemies of the state to engage in acts of asymmetrical warfare to damage and exploit weakness in their opponent’s defenses.
Full Text Chapter Download: US $37.50 Add to Cart
Concept and Practices of Cyber Supply Chain in Manufacturing Context
Any crime that is facilitated or committed using a computer, network, or hardware device.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries
Kind of crime developed with the new technologies of communication and information.
Full Text Chapter Download: US $37.50 Add to Cart
Intimate Partner Cyber Abuse Viewed Through the Lens of Criminology
The violation of law on internet platforms (or in cyberspace) by incorporating internet tools and electronic devices such as phones and computers.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime Against Women and Girls on Social Sites in Bangladesh
A crime that involves a computer and a network.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Turning Westward: Information Policies in Post Communist Romania and Bulgaria
Criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud (Taylor 1999).
Full Text Chapter Download: US $37.50 Add to Cart
Digital Ethics
Crime that either (1) is carried out through the use of computers and networks or (2) targets computers and networks.
Full Text Chapter Download: US $37.50 Add to Cart
US Cybersecurity Laws and Regulations: Current Trends and Recommendations for Improvement
Criminal activities carried out by means of computers and technology and/or targeting computers/technology.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on Emerging Cyber Crimes and Their Impact Worldwide
Crime done in or using cyberspace is called cybercrime.
Full Text Chapter Download: US $37.50 Add to Cart
Indirect Attribution in Cyberspace
A crime, in the legal sense, using the internet or computer network.
Full Text Chapter Download: US $37.50 Add to Cart
Investigating Cybercrime in Nigeria
Any crime committed using the ICT platform. These may be child pornography, phishing, cyber terrorism, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Education in the Fourth Industrial Revolution: The Case of South Africa
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things
It is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may threaten a person, company or a nation's security and financial health.
Full Text Chapter Download: US $37.50 Add to Cart
Online Activism to Cybercrime
Illegal actions conducted via any technological device, which includes hardware and software.
Full Text Chapter Download: US $37.50 Add to Cart
Theoretical Context of Cybercrime
The use of a computer to commit a crime.
Full Text Chapter Download: US $37.50 Add to Cart
International Context of Cybercrime and Cyber Law
The use of a computer to commit a crime.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Legislation
Any criminal action perpetrated primarily through the use of a computer.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR