Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Ahmed Mateen, Qaiser Abbas
10.5120/ijca2016911909

Ahmed Mateen and Qaiser Abbas. Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus. International Journal of Computer Applications 152(8):29-32, October 2016. BibTeX

@article{10.5120/ijca2016911909,
	author = {Ahmed Mateen and Qaiser Abbas},
	title = {Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2016},
	volume = {152},
	number = {8},
	month = {Oct},
	year = {2016},
	issn = {0975-8887},
	pages = {29-32},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume152/number8/26342-2016911909},
	doi = {10.5120/ijca2016911909},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The objective of this research paper is to bring forth the new challenges faced by Pakistan regarding the Cyber Crime. In this arena of technology, Pakistan is in the danger zone of Cyber Crime. Storm of Cyber Crime is hitting almost every country with new power and challenges. Like whatever other nation of the world, Cyber Crime is on ascend in Pakistan. A year ago, digital violations brought on an estimated misfortune adding up to $ 575 billion world over. This paper is divided into major three section. In the first section paper has discussed the new trends coming in Pakistan in future in cyber-crime. Section 2 discussed explains the causes of this storm of cyber-crime and in the 3rd section prospective solution/methodology regarding to check this problem.

References

  1. Andel, T. R. and McDonald, J. T., 2013. A Systems Approach to Cyber Assurance Education. In Proceedings of the InfoSecCD'13: Information Security Curriculum Development Conference .
  2. Avais, M. A., Wassan, A. A., Narejo, H., and Khan, J.A., 2014. Awareness Regarding Cyber Victimization among Students of University of Sindh, Jamshoro. International Journal of Asian Social Science. 4(5): 632-641.
  3. Bhadauria, S. S., Sharma, V., and Litoriya, R., 2010. Empirical analysis of Ethical issues in the era of future information technology. InSoftware Technology and Engineering (ICSTE) 2nd International Conference on  7(2): 2-31.
  4. Gunjan, V. K., Kumar, A., and Avdhanam, S., 2013. A survey of cyber crime in India. In Advanced Computing Technologies (ICACT), 15th International Conference on: 1-6.
  5. Harris, J., 2004. Maintaining ethical standards for a computer security curriculum. In Proceedings of the 1st annual conference on Information security curriculum development, 5(6): 46-48 .
  6. Holt, T. J., and Bossler, A. M., 2014. An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1): 20-40.
  7. Hooper, C., Martini, B., and Choo, K. K. R., 2013. Cloud computing and its implications for cybercrime investigations in Australia. Computer Law & Security Review, 29(2): 152-163.
  8. Jadhav, D. S., Parode, V. D., Dige, Y. C. and Patil, S. K., 2013. Virtual offense in Maharashtra (India): Legend and truth?. In Intelligent Systems and Signal Processing (ISSP), International Conference on . 319-324.
  9. Jamil, D. and Khan, M. N. A., 2011. Is ethical hacking ethical?.International Journal of Engineering Science and Technology (IJEST), ISSN, 0975-5462.
  10. Kundi, G. M., Nawaz, A., Akhtar, R., and MPhil Student, I. E. R., 2014. Digital revolution, cyber-crimes and cyber legislation: A challenge to governments in developing countries. Journal of Information Engineering and Applications, 4(4): 61, 71, 2225-0506.
  11. Luallen, M. E., and Labruyere, J. P., 2013. Developing a critical infrastructure and control systems cybersecurity curriculum. In System Sciences (HICSS) 46th Hawaii International Conference on, 1782-1791 .
  12. Papanikolaou, A., Vlachos, V., Papathanasiou, A., Chaikalis, K., Dimou, M., and Karadimou, M., 2013. Cyber crime in Greece: How bad is it?. In Telecommunications Forum (TELFOR). 1-4.
  13. Ramesh, P., and Maheswari, D., 2012. Survey of cyber crime activities and preventivemeasures. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology 6(4): 301-305 .
  14. Razzaq, A., Hur, A., Ahmad, H., and Masood, M., 2013 . Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Autonomous Decentralized Systems (ISADS), Eleventh International Symposium on. 1-6.
  15. Patki, A. B. Lakshminarayanan, S. Sivasubramanian, S. and Sarma, S.S., 2003. Cyber crime information system for cybernetics awareness. I. Proceedings.2003 International Conference on. 46-53.

Keywords

Cyber-crime, Hacktivism, IoT, Social Network, Cyber Forensic.