Cybercrime is Very Dangerous Form of Criminal Behavior and Cybersecurity

Siniša Franjić

Abstract


Computer crime is a form of criminal behavior in which the use of computer technology and information systems is manifested as a mode of crime or the computer is used as a means or purpose of perpetration with which is producing some relevant criminal consequence. Computer crime is also an unlawful violation of property in which computer data is intentionally altered (manipulated by a computer), destroyed (computer sabotaged) or used in conjunction with hardware (theft of time). Objective of this paper is consideration of using new computer technology in everyday life. Unfortunately, some users using new technology for criminal acts. For Analysis, author use official resources from books, scientific papers and online resources. Even though it is a new technology, police and justice successfully deal with different types of computercrimes.

Keywords


Cybersecurity; Crime; Threats; Hacking.

References


Bača, M. Uvod u računalnu sigurnost“, Narodne novine, Zagreb, Hrvatska, (2004): 1. – 2.; 25.

Australian Federal Police, AFP, Cyber crime“, (2019.). Available online: https://www.afp.gov.au/what-we-do/crime-types/cyber-crime.

Reich, Pauline C. “Cybercrime, Cybersecurity, and Financial Institutions Worldwide.” Advances in E-Business Research (2008): 1–33. doi:10.4018/978-1-59904-828-4.ch001.

Kerr, O. S. Computer Crime Law“, West Academic Publishing, St. Paul, USA, (2018):1.

FindLaw, Computer Crime“, (2019), Available online: https://criminal.findlaw.com/criminal-charges/computer-crime.html

Vacca, John R. “Practical Internet Security” (2007). doi:10.1007/978-0-387-29844-3.

Heckman, Kristin E., Frank J. Stech, Roshan K. Thomas, Ben Schmoker, and Alexander W. Tsow. “Cyber Denial, Deception and Counter Deception.” Advances in Information Security (2015). doi:10.1007/978-3-319-25133-2.

Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Cybercrime and digital forensics: An introduction." Routledge, Taylor & Francis Group, Abingdon, USA (2015): 83-85.

Kizza, Joseph Migga. “Guide to Computer Network Security.” Texts in Computer Science (2020). doi:10.1007/978-3-030-38141-7.

WikiBooks, The Computer Revolution/Security/Computer Crime“, (2019.), Available online: https://en.wikibooks.org/wiki/The_Computer_Revolution/Security/Computer_Crime

Lilley, Peter. "Hacked, attacked & abused: Digital crime exposed." Kogan Page Publishers, (2002).

Easttom, Chuck. "Computer security fundamentals." Pearson IT Certification, (2019).

Stallings, William, Lawrie Brown, Michael D. Bauer, and Arup Kumar Bhattacharjee. "Computer security: principles and practice." Upper Saddle River, NJ, USA: Pearson Education, (2012).

Schell, Bernadette Hlubik, and Clemens Martin. "Cybercrime: A reference handbook." ABC-CLIO, (2004).

Kremling, Janine, and Amanda M. Sharp Parker. "Cyberspace, cybersecurity, and cybercrime." SAGE Publications, (2017).

Donofrio, A. W., Computer Forensics“in Saferstein, R.: Criminalistics - An Introduction to Forensic Science, Twelfth Edition“, Pearson, New York, USA, (2018).

Pavišić, B., D. Modly, and P. Veić. "Kriminalistika–Knjiga 2 (Criminalistics–Book 2)―." Dušević&Kršovnik, Rijeka, Croatia 218 (2012).

Ingram, J. L. "Criminal Evidence, Tenth Edition", Anderson Publishing, LexisNexis Group, (2009).

Bryant, Robin, and Sarah Bryant. "Blackstone’s Handbook for Policing Students." Oxford University Press, (2014).

Franjić, S.; Silaev, S., "Criminal law aspects of computer crime." The International Journal of FORENSIC COMPUTER SCIENCE (2017): 36-41.


Full Text: PDF

DOI: 10.28991/esj-2020-SP1-02

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Siniša Franjić