Skip to main content

Cyber-Crimes: Challenges of the Millennium Age

  • Conference paper
  • First Online:
Advances in Electrical Engineering and Electrical Machines

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 134))

  • 3513 Accesses

Abstract

The connecting gains arising between organized crimes and the Internet has increased the lapses of the digital world. How do hackers frame their attitudes? What factors encourage and improvise their actions? These are very vital but highly under studied questions. Drawing upon psychology, economics and international relation to propose a framework that elaborates these questions, we found that countries across the globe differ in terms of regulations, normative and cognitive legitimacy to different types of web problems. Cyber wars and crimes are also functions of the stocks of hacking skills relative to the availability of economic availabilities. An attacking unit’s selection criteria for the target network include reasonable significance and criticalness, level of digitization of values and weakness in defense systems. Managerial and policy implications are elaborated and directions for future research are suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Goldfoot, J.A.: It means computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

    Google Scholar 

  2. Baggili, I.: Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity 2009 International Journal of Cyber Criminology (2009)

    Google Scholar 

  3. Goodman, M.M.: Why the Police don’t Care about Computer Crime? 10 Harvard Journal of Law and Technology 468(997)

    Google Scholar 

  4. Kamat, N.: Law Relating to Computers Internet and E-commerce, p. 22. Universal Law Publishing Company Pvt. Ltd., New Delhi (2000)

    Google Scholar 

  5. Viswanathan, S.T.: The Indian Cyber law, p. 13. Bharat Law House, New Delhi (2000)

    Google Scholar 

  6. Konoorayar, V.: Regulating Cyber Space: The emerging problems and challenges. Cochin University Review 27 (2003)

    Google Scholar 

  7. Dion, M.: CIBC Research Chair on Financial Integrity, Faculté d’administration. Université de Sherbrooke, Sherbrooke (2007)

    Google Scholar 

  8. Ryan, Deci: Waves of global cyber war and crime (September 2000)

    Google Scholar 

  9. Stephen, D.T.: “Obscenity Online: A Transnational Approach to Computer transfers of Potentially Obscene Materials. 82 Cornell Law Review 905, 916 (1997)

    Google Scholar 

  10. Bednarz, A.: Profiling cyber-criminals: A promising but immature science. Network World (November 29, 2004)

    Google Scholar 

  11. Goueff, S.l.: The Journal of policy, regulation and strategy for telecommunications information and media. Camford Publishing Ltd. (2000)

    Google Scholar 

  12. Carblanc, Moers: Pattern of global cyber war and crime (September 2003)

    Google Scholar 

  13. Kshetri, N.: Journal of International Management 11, 541–562 (2005)

    Google Scholar 

  14. Lewis, N.: International Peace Institute-Transnational Organized crime and the Palermo convention (2010)

    Google Scholar 

  15. Kotabe, M.: Global Security Risks and International Competitiveness. Journal of International Management 11(4) (2005)

    Google Scholar 

  16. Zuckerman, M.J.: Criminals Hot on Money Trail to Cyberspace, USA Today (March 22, 2000)

    Google Scholar 

  17. Kshetri, N.: Pattern of global cyber war and crime (September 2005)

    Google Scholar 

  18. Lemos: Russia has signed agreements to help the U.S. in investigating some crimes, computer crimes are not among them (Lemos 2001). In: The U.S. Department of Justice requested the assistance of Russian authorities but received no response (Lemos 2001) (2001)

    Google Scholar 

  19. The USA Patriot Act, 2001 and the Gramm Leach Bliley (GLB) Act, 1999 require new security measures including customer identification and privacy protection

    Google Scholar 

  20. Kshetri, N.: Pattern of global cyber war and crime (September 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashad Yazdanifard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yazdanifard, R., Oyegoke, T., Seyedi, A.P. (2011). Cyber-Crimes: Challenges of the Millennium Age. In: Zheng, D. (eds) Advances in Electrical Engineering and Electrical Machines. Lecture Notes in Electrical Engineering, vol 134. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25905-0_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25905-0_68

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25904-3

  • Online ISBN: 978-3-642-25905-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics