The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Among the most treasured characteristics of the Internet is arguably its default technical architecture that facilitates online anonymity. This feature is most commonly cherished by Internet users as they are empowered to publish online content anonymously; or in the alternative to conceal their true identities behind fictitious names (pseudonyms). Anonymity is believed to have bolstered freedom of...
Computer and mobile phone based crimes have increased alarmingly in India. From the unauthorized dissemination, keeping information systems secure from tampering and from unauthorized removals are the need of the hour, otherwise, the incidents of hacking, data theft, cyber bullying and now cyber extortion as well has kept the cyber security team on its toes. For this a majority of the respondents...
This paper presents a review of recent academic scholarship and debates on cyber terrorism, and more broadly of what is known about terrorist's direct use of the Internet as weapon and, less directly, as a communication device. It presents an overview of a field of discourse that has, since its inception, provided a number of foreboding and even doomsday warnings about the future of cyber terrorism,...
Identity theft has been known for some centuries whereby falsified identity documents were misused as well as offences such as impersonating others were common in the society. However, the advent of technology changed the method used for conducting this crime, whereby through the use of the Internet, personal information is can be stolen and misused by criminals. The crime has its causes originating...
Cybercrime is a pervasive threat for today's Internet-dependent society. While the real extent and economic impact is hard to quantify, scientists and officials agree that cybercrime is a huge and still growing problem. A substantial fraction of cybercrime's overall costs to society can be traced to indirect opportunity costs, resulting from unused online services. This paper presents a parsimonious...
In this paper the Slovene perspective on the perception of cyber crime in terms of awareness and fear is presented. On the basis of theoretical knowledge the online survey has been prepared and conducted. The results of the perception of cyber crime and its understanding have been analyzed. The results and their interpretations are the basis for further work with the cyberspace users. Based on the...
Internet is a global system of interconnected computer networks that helps users reach to all digital data, such as multimedia files. So, this leads to plagiarization, violation of copyrights and data over the Internet. Thus, the digital intellectual property becomes a big issue of the Internet sharing system. Various techniques have been proposed to protect these violations; unfortunately, they became...
Although the Internet allows people to release, convey and obtain information freely and conveniently, the excessive spread of illegal and harmful information negatively affects the Internet development and obstructs Internet culture from thriving. On the basis of analyzing the root cause of illegal and harmful content on the Internet, this article helps to establish an index system for measuring...
The widespread application of P2P file sharing brings about some critical problems, such as security, piracy and intellectual property. In order to protect the intellectual property rights of radio film and television resources, in this paper, under the environment of China next generation Internet (CNGI), a PCADRM (P2P-based content access digital rights management) system is constructed, which is...
This paper reviews attitudes toward acceptance and usability of file sharing for music downloading in Russia. There is a significant issue with respect to the copyright law legislation and enforcement. Since infrastructure, market conditions, social and economical situations in developing countries are different from those of developed countries, we decided to apply a well establish theory to a new...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
As the Internet has become an indivisible part of our daily life, the crime associated with it has increased dramatically as well. However, the dominant approaches currently used to fight against the cybercrime focus only on how to collect and preserve digital evidence after a crime has been committed, in which some of digital evidence could not be collected due to the design of file systems as well...
Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.