Exploring Cyber Intelligence Alternatives for Countering Cyber Crime

被引:0
|
作者
Gayatri, P. Usha [1 ]
Neeraja, S. [2 ]
Poornima, Ch. Leela [3 ]
Sekharaiah, K. Chandra [4 ]
Yuvaraj, M. [5 ]
机构
[1] MVSREC, Hyderabad, Andhra Pradesh, India
[2] MCE, Hyderabad, Andhra Pradesh, India
[3] SRKVS Samiti, Hyderabad, Andhra Pradesh, India
[4] JNTUH, Sch IT, Hyderabad, Andhra Pradesh, India
[5] MEC, Hyderabad, Andhra Pradesh, India
关键词
Artificial Intelligence (AI); Information Technology (IT); Web Intelligence (WI); Collective Intelligence (CI); Information and Communication Technologies (ICTs);
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, a case study of cyber crime is presented in the context of JNTUHJAC website. CERT-In is identified as the organization relevant to handling this kind of cybercrime. This paper is an attempt to find and do away with the lacunae in the prevailing cyber laws and the I.T. Act 2000 and the related amendment act 2008 such that law takes cognizance of all kinds of cybercrimes perpetrated against individuals/societies/nations. It is found that ICANN is an organization to control the cyberspace by blocking the space wherein the content involves cognizable offence.
引用
收藏
页码:900 / 902
页数:3
相关论文
共 50 条
  • [21] The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India
    Kumar, Poonam
    Mittal, Saurabh
    INTERNATIONAL JOURNAL OF TECHNOETHICS, 2012, 3 (01) : 43 - 52
  • [22] Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime
    Li, Xingan
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2015, 9 (02): : 185 - 204
  • [23] Cyber Crime Hospitals lack the Money for a successful Cyber Defense
    不详
    GESUNDHEITSOEKONOMIE UND QUALITAETSMANAGEMENT, 2021, 26 (01): : 21 - +
  • [24] National Intelligence and Cyber Competitiveness: Partnerships in Cyber Space
    Greiman, Virginia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 59 - 66
  • [25] Strategic cyber intelligence
    Borum, Randy
    Felker, John
    Kern, Sean
    Dennesen, Kristen
    Feyes, Tonya
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (03) : 317 - 332
  • [26] Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
    Eom, Jung Ho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 323 - 331
  • [27] Exploring the implications of 'low visibility' specialist cyber-crime units
    Harkin, Diarmaid
    Whelan, Chad
    AUSTRALIAN AND NEW ZEALAND JOURNAL OF CRIMINOLOGY, 2019, 52 (04): : 578 - 594
  • [28] A Survey of Cyber Crime in India
    Gunjan, Vinit Kumar
    Kumar, Amit
    Avdhanam, Sharda
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT), 2013,
  • [29] Cyber-crime on the rise
    不详
    COMMUNICATIONS NEWS, 2000, 37 (06): : 12 - 12
  • [30] Cyber crime and violation of copyright
    Vukelic, B.
    Skaron, K.
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1127 - 1130