A Censorious Interpretation of Cyber Theft and its Footprints

V. Smirthy Singh*, Doreen Robin D.**, C. R. Rene Robin***
*Department of Physics, Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, Tamil Nadu, India.
**Computational Intelligence Research Foundation (CIRF), Chennai, Tamil Nadu, India.
***Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, Tamil Nadu, India.
Periodicity:January - March'2023
DOI : https://doi.org/10.26634/jit.12.1.19394

Abstract

Cybercrime is a type of crime that steals information from an owner and uses it for criminal purposes. There are other types of theft related to this crime, including identity theft, data theft, and deep fakes. This study provides a detailed analysis of cybercrime. The world has become more advanced in communication, especially after the invention of the internet, which provides a feasible environment for online dealings such as e-shopping, internet banking, and online payments. Although progress has been made to enhance innovation and development, there is a high risk of cybercrime worldwide. It has had a significant impact on digital platforms, adding both positives and negatives to global networking systems. Internet technology has been used by a few people for criminal activities, such as unauthorized access to networks and scams. These criminal activities or offences related to the internet, referred to as cybercrimes, are discussed in this paper.

Keywords

Cybercrime, Cyber-Theft, Internet, Unauthorized Access, Desired Attacks, Law of Web.

How to Cite this Article?

Singh, V. S., Robin, D. D., and Robin, C. R. R. (2023). A Censorious Interpretation of Cyber Theft and its Footprints. i-manager’s Journal on Information Technology, 12(1), 23-31. https://doi.org/10.26634/jit.12.1.19394

References

[3]. Dashora, K. (2011). Cyber crime in the society: Problems and preventions. Journal of Alternative Perspectives in the Social Sciences, 3(1), 240-259.
[6]. Marcum, C. D., & Higgins, G. E. (Eds.). (2014). Social Networking as a Criminal Enterprise. CRC Press.
[7]. Miriam, H., Doreen, D., Dahiya, D., & Rene Robin, C. R. (2023). Secured cyber security algorithm for healthcare system using blockchain technology. Intelligent Automation & Soft Computing, 35(2), 1889-1906.
[9]. Navarro, J. N., & Jasinski, J. L. (2017). Identity theft and social networks. In Social Networking as a Criminal Enterprise (pp. 88-109). Routledge.
[10]. Nguyen, T. N. (2023). A review of cyber crime. Journal of Social Review and Development, 2(1), 1-3.
[12]. Sarmah, A., Sarmah, R., & Baruah, A. J. (2017). A brief study on cyber crime and cyber laws of India. International Research Journal of Engineering and Technology (IRJET), 4(6), 1633-1640.
[13]. Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131-136.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.