The document summarizes a research study on cybercrime trends in India from 2016-2020. Some key findings include:
- The highest number of cybercrimes occurred in Karnataka, especially Bengaluru which has emerged as India's tech hub.
- The majority of crimes were financial/banking scams targeting identities, bank accounts, and credit cards.
- Fraud was the main motive behind cybercrimes, with over 60% of cases attributed to identity theft, cheating, and fake profiles.
- Cybercrime rates are growing over 30% annually and correlated moderately with other crime rates and GDP. More education is needed to protect innocents from falling victim.
The document discusses new security technologies being implemented at airports to address evolving threats. It describes perimeter security systems, advanced screening equipment, surveillance technologies using video analytics, and explosive detection systems. However, it notes that as information about security measures spreads, terrorist groups work to develop new methods to bypass them, such as surgically implanted explosive devices. The key challenge for airports remains providing robust security while ensuring efficiency and compliance with privacy laws.
This document summarizes a geographic information system (GIS) that provides 3D mapping services on demand. The GIS uses various data sources like drones, aerial imagery, and satellite images to create 3D models of buildings, roads, terrain and other landscape features with less manual work than traditional methods. It aims to offer these customized 3D mapping services faster and at a lower cost than other vendors. The startup is currently pre-alpha but plans scaled versions with more automation and capabilities over time to build an on-demand GIS platform.
Design and planning of hostel building by vijayanVijayan S
This document presents the planning and design of a hostel building with G+4 stories. It includes the objectives, various loads considered, design of structural elements like slab, beam, column, footing and staircase. AutoCAD was used to design the plan, elevation and structural details. The building will have 102 rooms on each floor to accommodate 900 students. All structural designs like slab, beam, column etc. were done based on Indian codes and standards. Reinforcement details are provided for various elements. The concluded that the design is safe and reliable to be constructed.
This document provides an overview of Kalyan Acharjya's proposed work on face recognition for his M.Tech dissertation. It discusses conducting literature research on existing face recognition techniques, identifying challenges in real-time applications, and exploring standard face image databases. The presentation covers topics such as how face recognition works, applications, and concludes with plans to modify existing algorithms and compare results to related work to enhance recognition rates.
The document discusses retaining walls and includes:
- Definitions of retaining walls and their parts
- Common types of retaining walls including gravity, semi-gravity, cantilever, counterfort and bulkhead walls
- Earth pressures like active, passive and at rest pressures
- Design principles for stability against sliding, overturning and bearing capacity
- Drainage considerations for retaining walls
- Theories for analyzing earth pressures like Rankine and Coulomb's theories
- Sample design calculations and problems for checking stability of retaining walls
The document summarizes the Geographic Information and Identification System (SIIG) that the Port of Sines in Portugal is implementing. SIIG is a web-based system built on ArcGIS technology that integrates 7 modules to support various port operations and functions through geographic data visualization and analysis. The modules include land management, concessions, planning, security, environment, and statistics. SIIG integrates data from various port systems to provide real-time vessel tracking and optimize port operations. GIS is central to integrating all port information systems and maximizing efficiency.
Effect of modeling of infill walls on performance of multi story rc buildingIAEME Publication
This document summarizes a study on the effect of modeling masonry infill walls in multi-story reinforced concrete buildings. Three models of an 8-story building were analyzed: a bare frame, a frame with infill excluding the ground floor to create a soft story, and a frame with full infill. Nonlinear static pushover analysis was performed on the models. The results showed that modeling full infill improved seismic performance by increasing base shear and stiffness, distributing plastic hinges elastically throughout the structure. The bare frame and soft-story structure had plastic hinges form in the life safety to collapse prevention range, indicating poorer performance, while the full infill structure remained elastic. Therefore, modeling infill walls more
The document discusses new security technologies being implemented at airports to address evolving threats. It describes perimeter security systems, advanced screening equipment, surveillance technologies using video analytics, and explosive detection systems. However, it notes that as information about security measures spreads, terrorist groups work to develop new methods to bypass them, such as surgically implanted explosive devices. The key challenge for airports remains providing robust security while ensuring efficiency and compliance with privacy laws.
This document summarizes a geographic information system (GIS) that provides 3D mapping services on demand. The GIS uses various data sources like drones, aerial imagery, and satellite images to create 3D models of buildings, roads, terrain and other landscape features with less manual work than traditional methods. It aims to offer these customized 3D mapping services faster and at a lower cost than other vendors. The startup is currently pre-alpha but plans scaled versions with more automation and capabilities over time to build an on-demand GIS platform.
Design and planning of hostel building by vijayanVijayan S
This document presents the planning and design of a hostel building with G+4 stories. It includes the objectives, various loads considered, design of structural elements like slab, beam, column, footing and staircase. AutoCAD was used to design the plan, elevation and structural details. The building will have 102 rooms on each floor to accommodate 900 students. All structural designs like slab, beam, column etc. were done based on Indian codes and standards. Reinforcement details are provided for various elements. The concluded that the design is safe and reliable to be constructed.
This document provides an overview of Kalyan Acharjya's proposed work on face recognition for his M.Tech dissertation. It discusses conducting literature research on existing face recognition techniques, identifying challenges in real-time applications, and exploring standard face image databases. The presentation covers topics such as how face recognition works, applications, and concludes with plans to modify existing algorithms and compare results to related work to enhance recognition rates.
The document discusses retaining walls and includes:
- Definitions of retaining walls and their parts
- Common types of retaining walls including gravity, semi-gravity, cantilever, counterfort and bulkhead walls
- Earth pressures like active, passive and at rest pressures
- Design principles for stability against sliding, overturning and bearing capacity
- Drainage considerations for retaining walls
- Theories for analyzing earth pressures like Rankine and Coulomb's theories
- Sample design calculations and problems for checking stability of retaining walls
The document summarizes the Geographic Information and Identification System (SIIG) that the Port of Sines in Portugal is implementing. SIIG is a web-based system built on ArcGIS technology that integrates 7 modules to support various port operations and functions through geographic data visualization and analysis. The modules include land management, concessions, planning, security, environment, and statistics. SIIG integrates data from various port systems to provide real-time vessel tracking and optimize port operations. GIS is central to integrating all port information systems and maximizing efficiency.
Effect of modeling of infill walls on performance of multi story rc buildingIAEME Publication
This document summarizes a study on the effect of modeling masonry infill walls in multi-story reinforced concrete buildings. Three models of an 8-story building were analyzed: a bare frame, a frame with infill excluding the ground floor to create a soft story, and a frame with full infill. Nonlinear static pushover analysis was performed on the models. The results showed that modeling full infill improved seismic performance by increasing base shear and stiffness, distributing plastic hinges elastically throughout the structure. The bare frame and soft-story structure had plastic hinges form in the life safety to collapse prevention range, indicating poorer performance, while the full infill structure remained elastic. Therefore, modeling infill walls more
The document provides details about the construction process of two building projects. It discusses the site introduction, site and safety plans, external works including survey, site clearance and earthworks. It also describes the foundation works and various stages of the superstructure such as slabs, beams, columns, walls, stairs, doors, windows and roofing. Plants, machinery and temporary facilities used on site are outlined. The document serves to document and analyze the construction process of the two projects.
1. The document discusses long wave radiation emitted by the Earth's surface and atmosphere. It describes the Earth as a gray body that emits radiation in the infrared band given its average surface temperature of 288K.
2. It explains that the atmosphere absorbs and re-emits long wave radiation from the Earth's surface, and without this greenhouse effect the average surface temperature would be around -17C instead of 15C.
3. It provides equations to calculate long wave radiation from a surface based on the surface temperature and the atmospheric emissivity and temperature, noting that multiple parameterizations exist to estimate the atmospheric emissivity.
The document discusses common construction defects in buildings such as cracks and dampness. It defines construction defects and lists main causes as application of forces, effects of materials, temperature changes, and biological agents. Common cracks are categorized based on width and appearance. Cracks are further divided into structural and non-structural types. Main causes of cracks are identified as drying shrinkage, thermal movement, elastic deformation, creep, chemical reactions, foundation movement, and vegetation growth. Specific defect examples and their causes are outlined, such as cracks in brickwork from lack of tying and defective flashing. Remedies for preventing common defects are also provided.
This document provides an overview of different types of retaining walls, including gravity, cantilever, counterfort, sheet pile, and diaphragm walls. It discusses the key components and design considerations for gravity and cantilever retaining walls. Gravity walls rely on their own weight for stability, while cantilever walls consist of a vertical stem with a heel and toe slab acting as a cantilever beam. The document also covers lateral earth pressures, drainage of retaining walls, uses of sheet pile walls, and construction methods for diaphragm walls.
This Presentation about Brick Masonry with a Beautiful Slides. This presentation covers - Brick Masonry Definition, Type of Bricks, General Principals, Bonds of Bricks, Other Bonds, Junction in Walls, Bonds in Pires, Retraining Wall, Design of Retraining Wall, Strength of Brick Masonry, Reinforced Brickwork. Hope You Enjoy!
▶️ YouTube: https://www.youtube.com/c/JoynulAbadinRasel
☕ Buy me a Coffee: https://www.buymeacoffee.com/JoynulAbadinR
The document provides information about site development and excavation for construction projects. It discusses developing the site, including performing a site analysis to evaluate soil types, drainage, and other elements. It also describes different types of excavation including open excavations, trenches, and pits. Finally, it discusses various methods for supporting excavations, such as sheeting, soldier beams and lagging, sheet piling, tiebacks, contiguous bored piles, secant piles, slurry walls, and dewatering when below the water table.
Shear walls are vertical structural elements designed to resist lateral forces like winds and earthquakes. They work by transferring shear forces throughout their height and resisting uplift forces. Properly designed and constructed shear wall buildings are very stable and ductile, providing warnings before collapse during severe earthquakes. Common types of shear walls include reinforced concrete, plywood, and steel plate shear walls. Shear walls are an effective and efficient way to resist lateral loads in seismic regions.
Urbanization is a widespread occurrence across the nation. Urbanism has been affecting the rise in urban crime as a result of societal perception. According to empirical data, crime has risen in metropolitan areas. The study issue is dependent on the specific types of crime that occur in urban settings. | Publisher: International Journal of Research and Innovation in Social Science (IJRISS)
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to analyze crime data and predict crime patterns in Bangalore, India. It first provides background on the increasing issue of crime and importance of understanding crime patterns. It then reviews related work applying clustering, classification, and other algorithms to crime data from various locations. Next, it discusses motivations for using machine learning to predict crimes in advance. The paper then compares different studies that have used techniques like k-means clustering, decision trees, naive bayes, and random forests on crime data. It evaluates these techniques and their limitations in accurately analyzing crime patterns and predicting future crimes. Finally, the document proposes using these machine learning methods and data mining approaches on crime data from Bangalore to help law enforcement agencies
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningWaqas Tariq
The concern about national security has increased significantly since the 26/11 attacks at Mumbai, India. However, information and technology overload hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis holds the promise of alleviating such problem. In this paper we use a clustering/classify based model to anticipate crime trends. The data mining techniques are used to analyze the city crime data from Tamil Nadu Police Department. The results of this data mining could potentially be used to lessen and even prevent crime for the forth coming years
The document discusses the rise of digital technology in Vietnam and its impacts. Key points include:
- Vietnam has seen rapid growth in internet and social media penetration, with 66% of the population now having internet access. Digital media has become the second largest touchpoint after TV.
- E-commerce is growing significantly and estimated to reach $33 billion by 2025. Mobile apps have disrupted transportation, food delivery, payments, and lending.
- While digital brings convenience, issues around privacy, cybersecurity and fake news have risen. The government is working to regulate data protection and promote e-government services and transparency.
- Market research is evolving digitally, with a trend away from paper/phone surveys towards online panels
New Research Articles 2019 May Issue International Journal of Data Mining & K...IJDKP
Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist researchers in extracting useful information from the rapidly growing volumes of digital data.
This document discusses cyber crimes in India. It begins with an abstract that outlines the goals of researching digital security and cybercrimes in India to increase awareness and address vulnerabilities. Some key points made in the document include:
- Cybercrime cases in India have been increasing rapidly as smartphone and internet usage rises.
- Common cybercrimes discussed include ATM hacking, SIM swap fraud, and hacking of celebrity Twitter accounts.
- The document covers risk assessment, risk management, and risk communication approaches to addressing cybercrimes.
- The government of India is taking steps to increase cybercrime awareness and has established coordination centers to handle cybercrime issues.
The document summarizes bad netiquette behaviors of digital citizens in Sri Lanka over the past few decades based on a qualitative analysis of secondary sources. It finds that the most common issues are posting inflammatory or offensive comments online, sharing personal information without consent, gaining unauthorized access to internet resources, and trolling people online. Younger generations are typically more involved in these behaviors both as perpetrators and victims. Having good netiquette that respects others and maintains privacy is recommended to address social and privacy problems online.
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...MOHDSAIFWAJID1
There is no doubt regarding the notion that crime is deteriorating the socio-economic
structure of society. Crime poses a serious threat to human values and existence. Therefore this
menace should be stopped as early as possible otherwise it would lead to unavoidable
circumstances. Whenever policies are formed there are some certain factors that are always taken
into consideration to stop the crime. These measures were effective but with the passage of time
there seems to be a constant situation and crime seems to be at its peak. This situation has forced us
to think that there may be other factors that are leading to criminal behaviour in humans. These
factors may be uncertain, unknown or indeterminate. Though previous researches in this regard
have taken into consideration all the known factors, the present work takes into account both known
and unknown factors together with the relationship among them. Taking into account all the factors
which nourish crime either directly or indirectly, here we try to model the situation mathematically
using Neutrosophic Cognitive Map since it provides us with a methodology of representing known
and unknown factors together. The work is carried out using graphical methods and concepts
together with linear algebra. The present work takes into account the crimes which are occurring in
South Africa and models this situation taking into considerations all the certain and uncertain
factors. The study reveals that relative poverty & inadequate housing, limited social and cognitive
abilities, exclusion from school, family violence, culture conflict, colonialism, unemployment,
income inequality, violent expressions of masculinity and use of violence to ‘resolve’ are directly
related to crime in the country. The other factors such as Adherence to social norms, the multi-racial
character of the society, Racial discrimination, apartheid policy, political transition, restructuring of
the criminal justice system, gathering of people, intimate partner violence & femicide and use of
‘tik’ (crystal meth/ methamphetamine) which were not supposed to have a direct influence on crime
in the country by previous researches are also having a significant effect on crime. The present work
contributes effectively in identifying the factors leading to criminal behaviour among people. This
would in turn help policymakers to take necessary steps at ground level to curb the crime in the
country. The work also shows the modelling of the situation using Fuzzy Cognitive Maps just to
represent the effectiveness of Neutrosophic Cognitive Maps over them.
Analysis Of Demographic Characteristics Based On Data Of Social Network UsersSarah Morrow
This document analyzes demographic characteristics based on data from social network users. It discusses how the proliferation of the internet and digital technologies has created new opportunities for demographic research. Specifically, data collected through social networking services can be used as a new information source for demographic studies. The document outlines several key points. First, it discusses traditional methods and sources for demographic research. It then explains how social network analysis and data mining of social media platforms allows researchers to study population dynamics and demographic behavior in new ways. Finally, it explores how social network data can provide insights for areas like health and mortality. The overall aim is to demonstrate the potential of social network data for advancing demographic research.
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
Criminalization may be a general development that has significantly extended in previous few years. In
order, to create the activity of the work businesses easy, use of technology is important. Crime investigation analysis
is a section records in data mining plays a crucial role in terms of predicting and learning the criminals. In our
paper, we've got planned an incorporated version for physical crime as well as cybercrime analysis. Our approach
uses data mining techniques for crime detection and criminal identity for physical crimes and digitized forensic tools
(DFT) for evaluating cybercrimes. The presented tool named as Comparative Digital Forensic Process tool
(CDFPT) is entirely based on digital forensic model and its stages named as Comparative Digital Forensic Process
Model (CDFPM). The primary step includes accepting the case details, categorizing the crime case as physical crime
or cybercrime and sooner or later storing the data in particular databases. For physical crime analysis we've used kmeans
approach cluster set of rules to make crime clusters. The k-means method effects are a lot advantageous by the
utilization of GMAPI generation. This provides advanced and consumer-friendly visual-aid to k-means approach for
tracing the region of the crime. we have applied KNN for criminal identification with the
help of observing beyond crimes and finding similar ones that suit this crime, if no past document is discovered then
the new crime sample are introduced to the crime data-set. With the advancements of web, the network form has
become much more complicated and attacking methods are further more than that as well. For crime analysis
we're detecting the attacks executed on host system through an outsider the usage of
assorted digitized forensic tools to produce information security with the help of generating reports for an
event which could need any investigation. Our digitized technique aids the development of the society
by helping the investigation businesses to follow a custom-built investigative technique in crime analysis and criminal
identification as opposed to manually looking the database to analyze criminal activities, and as a
result facilitate them in combating crimes.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
The document provides details about the construction process of two building projects. It discusses the site introduction, site and safety plans, external works including survey, site clearance and earthworks. It also describes the foundation works and various stages of the superstructure such as slabs, beams, columns, walls, stairs, doors, windows and roofing. Plants, machinery and temporary facilities used on site are outlined. The document serves to document and analyze the construction process of the two projects.
1. The document discusses long wave radiation emitted by the Earth's surface and atmosphere. It describes the Earth as a gray body that emits radiation in the infrared band given its average surface temperature of 288K.
2. It explains that the atmosphere absorbs and re-emits long wave radiation from the Earth's surface, and without this greenhouse effect the average surface temperature would be around -17C instead of 15C.
3. It provides equations to calculate long wave radiation from a surface based on the surface temperature and the atmospheric emissivity and temperature, noting that multiple parameterizations exist to estimate the atmospheric emissivity.
The document discusses common construction defects in buildings such as cracks and dampness. It defines construction defects and lists main causes as application of forces, effects of materials, temperature changes, and biological agents. Common cracks are categorized based on width and appearance. Cracks are further divided into structural and non-structural types. Main causes of cracks are identified as drying shrinkage, thermal movement, elastic deformation, creep, chemical reactions, foundation movement, and vegetation growth. Specific defect examples and their causes are outlined, such as cracks in brickwork from lack of tying and defective flashing. Remedies for preventing common defects are also provided.
This document provides an overview of different types of retaining walls, including gravity, cantilever, counterfort, sheet pile, and diaphragm walls. It discusses the key components and design considerations for gravity and cantilever retaining walls. Gravity walls rely on their own weight for stability, while cantilever walls consist of a vertical stem with a heel and toe slab acting as a cantilever beam. The document also covers lateral earth pressures, drainage of retaining walls, uses of sheet pile walls, and construction methods for diaphragm walls.
This Presentation about Brick Masonry with a Beautiful Slides. This presentation covers - Brick Masonry Definition, Type of Bricks, General Principals, Bonds of Bricks, Other Bonds, Junction in Walls, Bonds in Pires, Retraining Wall, Design of Retraining Wall, Strength of Brick Masonry, Reinforced Brickwork. Hope You Enjoy!
▶️ YouTube: https://www.youtube.com/c/JoynulAbadinRasel
☕ Buy me a Coffee: https://www.buymeacoffee.com/JoynulAbadinR
The document provides information about site development and excavation for construction projects. It discusses developing the site, including performing a site analysis to evaluate soil types, drainage, and other elements. It also describes different types of excavation including open excavations, trenches, and pits. Finally, it discusses various methods for supporting excavations, such as sheeting, soldier beams and lagging, sheet piling, tiebacks, contiguous bored piles, secant piles, slurry walls, and dewatering when below the water table.
Shear walls are vertical structural elements designed to resist lateral forces like winds and earthquakes. They work by transferring shear forces throughout their height and resisting uplift forces. Properly designed and constructed shear wall buildings are very stable and ductile, providing warnings before collapse during severe earthquakes. Common types of shear walls include reinforced concrete, plywood, and steel plate shear walls. Shear walls are an effective and efficient way to resist lateral loads in seismic regions.
Urbanization is a widespread occurrence across the nation. Urbanism has been affecting the rise in urban crime as a result of societal perception. According to empirical data, crime has risen in metropolitan areas. The study issue is dependent on the specific types of crime that occur in urban settings. | Publisher: International Journal of Research and Innovation in Social Science (IJRISS)
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to analyze crime data and predict crime patterns in Bangalore, India. It first provides background on the increasing issue of crime and importance of understanding crime patterns. It then reviews related work applying clustering, classification, and other algorithms to crime data from various locations. Next, it discusses motivations for using machine learning to predict crimes in advance. The paper then compares different studies that have used techniques like k-means clustering, decision trees, naive bayes, and random forests on crime data. It evaluates these techniques and their limitations in accurately analyzing crime patterns and predicting future crimes. Finally, the document proposes using these machine learning methods and data mining approaches on crime data from Bangalore to help law enforcement agencies
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningWaqas Tariq
The concern about national security has increased significantly since the 26/11 attacks at Mumbai, India. However, information and technology overload hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis holds the promise of alleviating such problem. In this paper we use a clustering/classify based model to anticipate crime trends. The data mining techniques are used to analyze the city crime data from Tamil Nadu Police Department. The results of this data mining could potentially be used to lessen and even prevent crime for the forth coming years
The document discusses the rise of digital technology in Vietnam and its impacts. Key points include:
- Vietnam has seen rapid growth in internet and social media penetration, with 66% of the population now having internet access. Digital media has become the second largest touchpoint after TV.
- E-commerce is growing significantly and estimated to reach $33 billion by 2025. Mobile apps have disrupted transportation, food delivery, payments, and lending.
- While digital brings convenience, issues around privacy, cybersecurity and fake news have risen. The government is working to regulate data protection and promote e-government services and transparency.
- Market research is evolving digitally, with a trend away from paper/phone surveys towards online panels
New Research Articles 2019 May Issue International Journal of Data Mining & K...IJDKP
Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist researchers in extracting useful information from the rapidly growing volumes of digital data.
This document discusses cyber crimes in India. It begins with an abstract that outlines the goals of researching digital security and cybercrimes in India to increase awareness and address vulnerabilities. Some key points made in the document include:
- Cybercrime cases in India have been increasing rapidly as smartphone and internet usage rises.
- Common cybercrimes discussed include ATM hacking, SIM swap fraud, and hacking of celebrity Twitter accounts.
- The document covers risk assessment, risk management, and risk communication approaches to addressing cybercrimes.
- The government of India is taking steps to increase cybercrime awareness and has established coordination centers to handle cybercrime issues.
The document summarizes bad netiquette behaviors of digital citizens in Sri Lanka over the past few decades based on a qualitative analysis of secondary sources. It finds that the most common issues are posting inflammatory or offensive comments online, sharing personal information without consent, gaining unauthorized access to internet resources, and trolling people online. Younger generations are typically more involved in these behaviors both as perpetrators and victims. Having good netiquette that respects others and maintains privacy is recommended to address social and privacy problems online.
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...MOHDSAIFWAJID1
There is no doubt regarding the notion that crime is deteriorating the socio-economic
structure of society. Crime poses a serious threat to human values and existence. Therefore this
menace should be stopped as early as possible otherwise it would lead to unavoidable
circumstances. Whenever policies are formed there are some certain factors that are always taken
into consideration to stop the crime. These measures were effective but with the passage of time
there seems to be a constant situation and crime seems to be at its peak. This situation has forced us
to think that there may be other factors that are leading to criminal behaviour in humans. These
factors may be uncertain, unknown or indeterminate. Though previous researches in this regard
have taken into consideration all the known factors, the present work takes into account both known
and unknown factors together with the relationship among them. Taking into account all the factors
which nourish crime either directly or indirectly, here we try to model the situation mathematically
using Neutrosophic Cognitive Map since it provides us with a methodology of representing known
and unknown factors together. The work is carried out using graphical methods and concepts
together with linear algebra. The present work takes into account the crimes which are occurring in
South Africa and models this situation taking into considerations all the certain and uncertain
factors. The study reveals that relative poverty & inadequate housing, limited social and cognitive
abilities, exclusion from school, family violence, culture conflict, colonialism, unemployment,
income inequality, violent expressions of masculinity and use of violence to ‘resolve’ are directly
related to crime in the country. The other factors such as Adherence to social norms, the multi-racial
character of the society, Racial discrimination, apartheid policy, political transition, restructuring of
the criminal justice system, gathering of people, intimate partner violence & femicide and use of
‘tik’ (crystal meth/ methamphetamine) which were not supposed to have a direct influence on crime
in the country by previous researches are also having a significant effect on crime. The present work
contributes effectively in identifying the factors leading to criminal behaviour among people. This
would in turn help policymakers to take necessary steps at ground level to curb the crime in the
country. The work also shows the modelling of the situation using Fuzzy Cognitive Maps just to
represent the effectiveness of Neutrosophic Cognitive Maps over them.
Analysis Of Demographic Characteristics Based On Data Of Social Network UsersSarah Morrow
This document analyzes demographic characteristics based on data from social network users. It discusses how the proliferation of the internet and digital technologies has created new opportunities for demographic research. Specifically, data collected through social networking services can be used as a new information source for demographic studies. The document outlines several key points. First, it discusses traditional methods and sources for demographic research. It then explains how social network analysis and data mining of social media platforms allows researchers to study population dynamics and demographic behavior in new ways. Finally, it explores how social network data can provide insights for areas like health and mortality. The overall aim is to demonstrate the potential of social network data for advancing demographic research.
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
Criminalization may be a general development that has significantly extended in previous few years. In
order, to create the activity of the work businesses easy, use of technology is important. Crime investigation analysis
is a section records in data mining plays a crucial role in terms of predicting and learning the criminals. In our
paper, we've got planned an incorporated version for physical crime as well as cybercrime analysis. Our approach
uses data mining techniques for crime detection and criminal identity for physical crimes and digitized forensic tools
(DFT) for evaluating cybercrimes. The presented tool named as Comparative Digital Forensic Process tool
(CDFPT) is entirely based on digital forensic model and its stages named as Comparative Digital Forensic Process
Model (CDFPM). The primary step includes accepting the case details, categorizing the crime case as physical crime
or cybercrime and sooner or later storing the data in particular databases. For physical crime analysis we've used kmeans
approach cluster set of rules to make crime clusters. The k-means method effects are a lot advantageous by the
utilization of GMAPI generation. This provides advanced and consumer-friendly visual-aid to k-means approach for
tracing the region of the crime. we have applied KNN for criminal identification with the
help of observing beyond crimes and finding similar ones that suit this crime, if no past document is discovered then
the new crime sample are introduced to the crime data-set. With the advancements of web, the network form has
become much more complicated and attacking methods are further more than that as well. For crime analysis
we're detecting the attacks executed on host system through an outsider the usage of
assorted digitized forensic tools to produce information security with the help of generating reports for an
event which could need any investigation. Our digitized technique aids the development of the society
by helping the investigation businesses to follow a custom-built investigative technique in crime analysis and criminal
identification as opposed to manually looking the database to analyze criminal activities, and as a
result facilitate them in combating crimes.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...AJHSSR Journal
ABSTRACT:The development of information technology has changed the business strategy of the business
world including banking by placing information technology as the main element in the process of providing
services. Adoption of digital banking services is very much needed in the banking business due to increasing
digital access, banking business competition is getting tougher with Digital Banks and Fintech (financial
technology). Banking solutions make operational cost efficiencies and implement an integrated cashless society.
BRI's digital sector performance faces challenges from competing banks and rampant digital sector banking
crimes. This study aims to explain the role of brand trust in mediating the effect of perceived risk and brand
image on the intention to use BRI digital banking. The sampling method used is non-probability sampling. The
data collection technique was carried out by filling out a questionnaire. The analysis technique used in this study
is Partial Least Square (PLS). The results of the study show that perceived risk has a negative effect on brand
trust and intention to use digital banking services. This study also shows that brand image has a positive effect
on brand trust and intentions to use digital banking services. This study shows the role of brand trust in a
positive mediating effect of perceived risk and brand image on the intention to use digital banking services.
KEYWORDS : brand trust, perceived risk, brand image, intention to use digital banking
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...ijistjournal
The purpose of this paper is to examine how we can achieve a cashless society in Nigeria especially given her infrastructure deficits. This study examines the cashless economic system so as to assess its feasibility in Nigeria with regards to timeless, preparedness and adequacy against the backdrop of our level of development both technologically and educationally. Nigeria has continued to evolve in different realms. The economy is being reformed, the institutions are being reshaped and laws are being re-examined so as to reposition the nation to take its rightful position in the international community. As a way of fast-tracking the Nigerian economy so as to be among the first 20 world economies come 2020, Nigeria proposed 2012 for the adoption of the cashless economy system starting with Lagos State but could not realized its objective. The study used structured questionnaire as a means of data collection and the collected data were analyzed using simple percentage procedure. The results indicate that: majority of Nigerians are already aware of the policy and majority agree that the policy will help fight against corruption/money laundering and reduce the risk of carrying cash and can also foster economic growth. Major problems envisaged that can hinder the implementation of the policy are: cyber fraud, limited point of sales and numeracy illiteracy. Based on the findings some recommendations made are: the government should adopt a different strategy to educate the non-literate Nigerians about the cashless economy; and the Federal Government of Nigerian should establish a Cybercrime law.
The document discusses the potential for a cashless society in Nigeria and examines its drivers and challenges. It notes that Nigeria proposed adopting a cashless economy starting in Lagos in 2012 but was unable to realize this goal due to infrastructure deficits. The study found that most Nigerians are aware of the cashless policy and believe it could help reduce corruption, money laundering, and crime. However, major challenges include cyber fraud, limited payment options, and financial illiteracy among the population. The document recommends educating citizens, especially non-literate Nigerians, about the cashless economy and establishing laws around cybercrime.
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...ijtsrd
The document discusses the effectiveness of public-private partnership (PPP) strategies in managing urban crime in Kaduna South Local Government Area of Nigeria. It finds that 73% of residents are aware of PPP strategies and 41.7% agree they are effective. The most effective strategy is found to be the use of vigilante groups, while the least is job creation for ex-offenders. The study recommends establishing crime management offices in all districts and encouraging collaboration between local vigilantes and community leaders to improve PPP effectiveness in crime management.
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
Build applications with generative AI on Google CloudMárton Kodok
We will explore Vertex AI - Model Garden powered experiences, we are going to learn more about the integration of these generative AI APIs. We are going to see in action what the Gemini family of generative models are for developers to build and deploy AI-driven applications. Vertex AI includes a suite of foundation models, these are referred to as the PaLM and Gemini family of generative ai models, and they come in different versions. We are going to cover how to use via API to: - execute prompts in text and chat - cover multimodal use cases with image prompts. - finetune and distill to improve knowledge domains - run function calls with foundation models to optimize them for specific tasks. At the end of the session, developers will understand how to innovate with generative AI and develop apps using the generative ai industry trends.
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
Open Source Contributions to Postgres: The Basics POSETTE 2024ElizabethGarrettChri
Postgres is the most advanced open-source database in the world and it's supported by a community, not a single company. So how does this work? How does code actually get into Postgres? I recently had a patch submitted and committed and I want to share what I learned in that process. I’ll give you an overview of Postgres versions and how the underlying project codebase functions. I’ll also show you the process for submitting a patch and getting that tested and committed.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Data analytics on cybercrime
1. MISSION
CHRIST is a nurturing ground for an individual’s
holistic development to make effective contribution to
the society in a dynamic environment
VISION
Excellence and Service
CORE VALUES
Faith in God | Moral Uprightness
Love of Fellow Beings
Social Responsibility | Pursuit of Excellence
Data analytics on cybercrime – An Indian
Perspective
Leo L
Research Scholar,
CHRIST (Deemed to be University)
Email: l.leo@res.christuniversity.in
Dr. Sangeetha R
Associate Professor,
Department of Management Studies
CHRIST (Deemed to be University)
2. Excellence and Service
CHRIST
Deemed to be University
Introduction
● Cybercrime, also known as Internet crime or Digital crime, is a fast growing
mode of crime at present. Digital platforms have given plenty of positive
opportunities, but at the same time it is misused by criminals for fraudulent
activity.Cybercrime is a growing threat in the virtual world because
individuals and organizations are relying more on internet at an increasing
rate.
● Ginni Rometty (2016), IBM’s chairman, stated that cybercrime is the biggest
threat to every profession, industry and every company in the world.
Accenture (2019) in its report predicts the total value of cybercrime to be
around 5.2 trillion US Dollars worldwide over a five year period, from 2019
to 2023. Steve Morgan (2019) Cyber security Ventures estimates that
cybercrime’s global damages will cost six trillion US Dollars every year by
2021.
3. Excellence and Service
CHRIST
Deemed to be University
Review of Literature
● Samrin Sulaiman (2019) has examined the public awareness on cybercrime with special
reference to Chennai. The researcher has concluded that the criminals use the internet to
conduct fraudulent activities against many organisations and the general public, such as
credit/debit card scams, personal data theft and phishing.
● Navneet Kaur (2018) has identified various kinds of cybercrimes towards individuals and
organisations. It is a conceptual paper based on secondary data, as the researcher has given
a theoretical meaning and concepts of types of cybercrimes. The researcher has concluded
that laws and regulations are very essential to fight the cybercrimes.
● Muhammad Dharma (2018) has examined the effect of cybercrimes on the buyer’s level of
confidence on internet shopping resulting in fraud victimisation in E-commerce sites. The data
is based on secondary sources.
● Djanggih, h. (2018) determined and analysed the impact of cybercrime on children as victims.
The results of this descriptive analysis show that the development of cybercrime affecting
children as victims increase every year, in various forms.
● Yerra Shankar Rao (2020) carried out a study to describe the concepts of cybercrime and
suggest suitable ways to overcome it. The results have shown that no law has the potential to
completely eliminate digital crime. It is a conceptual paper based on secondary data.
4. Excellence and Service
CHRIST
Deemed to be University
Review of Literature
● Rennie Naidoo (2020) analysed and interpreted COVID-19 related cybercrime data from
across the globe. The researcher mentioned that the number of cybercrimes has increased,
especially during the pandemic, triggering off fake charities, relief programmes, social media
profiles, websites, emails, products and work-from-home jobs.
● Kamini Dashora (2011) has made a study on various problems related to the cybernet and
also suggested some ideas to overcome it. Some of the problems include hacking, phishing,
cybersquatting and cyber terrorism. It is concluded that it helps to take preventive methods,
such as updating antivirus, control over cookies and avoiding using credit or debit cards.
● Md Shamimul Hasan (2015) research is carried out to protect students by creating awareness
and provide some empirical evidence to assist policy makers in combating cybercrime. This
paper also suggests remedies to young generations, to diminish the risk of being victims in
cybercrime
● Malathi A, Babboo SS and Anbarasi A (2011) state that data mining plays an important role in
combating crime-related issues. The law administration and intelligence analysis can further
help in decision-making.
● McClendon, L., & Meghanathan, N (2015) show that data mining is an important tool that can
be used to detect crime and prevent it
5. Excellence and Service
CHRIST
Deemed to be University
Data and Methodology
● The research is based on descriptive analysisdata and statistics are taken
from secondary sources, such as websites, NCB reports, journals and
articles. The study has explored the cybercrime statistics of the past four-
year’s (2016-2019) statistics, while data mining is done for 2020.
● It has information on different types of cybercrime, such as identity theft,
banking frauds, online cheating, tampering computers, publishing obscene
materials and fake accounts.
● The study is carried out according to the state and metropolitan cities, which
also identify the motives behind the cybercrimes, such as fraud, anger or
revenge, distortion, stealing data and political motives.
● Analysis is carried out using statistical techniques like Correlation, Standard
Deviation and Regression related to GDP, Unemployment and Literacy rates.
7. Excellence and Service
CHRIST
Deemed to be University
Motives behind Cyber Crime Statewise – 2016 to 2019
Cyber Crime Motives 2016 2017 2018 2019
2020
(Estimat
ed)
2019(
%)
Personal Revenge
1056
628 794 1207 1076 2.71
Anger 714 461 581 452 1.30
Fraud 5987 12213 15051 26891 31423 60.37
Extortion 571 906 1050 1842 2082 4.14
Causing Disrepute 448 1002 1212 1874 2256 4.21
Prank 121 321 296 1385 1473 3.11
Sexual Exploitation 1255 1460 2030 2266 2654 5.09
Political Motives 40 139 218 316 405 0.71
Terrorist Activities - 110 44 199 207 0.45
Inciting Hate against
Country/Community 152 206 218 49 82 0.11
Disrupt Public Service 33 55 21 28 22 0.06
Sale/purchase of illegal drugs 14 8 6 10 6 0.02
Developing own business 141 156 198 181 210 0.41
Spreading Piracy 23 90 671 45 369 0.10
Steal Information 18 10 16 93 92 0.21
Source: NCRB Report
8. Excellence and Service
CHRIST
Deemed to be University
Descriptive statistics of dependent and independent
variables
S.N State Cyber
crimes
(2019)
Other
crimes
(X1)
GDP
(X2)
Unemployme
nt rate
(X3)
Literacy
rate 2011
(X4)
1 Karnataka 12020 151671 154439882 0.9 75.37
2 Telangana 2691 128563 86103090 2.3 60.2
3 Assam 2231 130552 31588121 0.9 72.19
4 Uttar Pradesh 11416 617162 166822924 9.4 67.68
5 Maharashtra 4967 504466 263279231 4.9 82.34
6 Andhra
Pradesh
1886 143865 86295708 5.4 67.02
7 Odisha 1485 120040 49222925 4.4 72.89
8 Jharkhand 1095 61111 29720373 17 66.41
9 Meghalaya 89 3808 3348064 2.5 74.43
10 Rajasthan 1762 302632 94258604 15 66.11
Mean(X
̄ ) 3964.2 220351.2 96507892 6.27 70.464
Standard Deviation(𝜎) 4276.8 200912.3 78824966 5.72 6.236
Coefficient of
Variation(C.V)
107.88 91.17 81.67 91.29 8.85
9. Excellence and Service
CHRIST
Deemed to be University
Top ten cybercrimes in metropolitan cities of India
from 2016 to 2020
City 2016 2017 2018 2019 2020
(Estimated)
% (2019) Population
(Lakhs)
Crime
Rate
Bengaluru 762 2743 5253 10555 12801 57.45 85 124.2
Lucknow 361 608 962 1262 1563 6.87 29 43.5
Hyderabad 291 328 428 1379 1448 7.51 77.5 17.8
Jaipur 532 685 415 544 486 2.96 30.7 17.7
Ghaziabad 62 118 191 347 412 1.89 23.6 14.7
Mumbai 980 1362 1482 2527 2778 13.75 184.1 13.7
Kanpur 136 229 229 365 412 1.99 29.2 12.5
Patna 167 79 115 202 176 1.10 20.5 9.9
Pune 269 318 153 309 251 1.68 50.5 6.1
Surat 66 105 155 228 273 1.24 45.8 5
Other Metro
Cities
546 687 715 654 739 3.56 564.5 1.2
Total 4172 7262 10098 18372 21335 100 1140.4 16.1
Source: NCRB Report *Estimation for 2020 is calculated using linear regression *Crime Rate 2019 = Population/No of crimes
10. Excellence and Service
CHRIST
Deemed to be University
Findings:
● The highest number (12,020) of crime has taken place in Karnataka, in 2019,
this could be because Bengaluru in Karnataka is regarded as Silicon Valley of
India due to its leading role in the IT sector.
● A majority of crime is related to Financial/Banking scam, in which the
criminals mostly operate in the area of money-related offences to hack bank
accounts, ATMs, Debit/Credit card and OTP scams.
● SLL (Special Local Law) crimes such as gambling, copyright, and trademarks
are decreasing gradually.
● There are 26,891 (60% in 2019) criminals, who are motivated to commit
fraudulent activities through identity theft, cheating and fake profiles. Not all
the cybercrimes are financially motivated, but some also involve sexual
exploitation, anger, personal revenge, pranks or political motives.
11. Excellence and Service
CHRIST
Deemed to be University
Findings:
● The highest rate (57%) of cybercrimes has taken place in Bengaluru (10,555
cases in 2019) compared to other cities.
● Correlation analysis between the cybercrimes with other crimes (0.59) and
GDP (0.65) in India, which has a positive moderate correlation.
● it was found that cybercrimes are continuously growing at an alarming rate of
more than 30%, while nowhere was it shown to be declining.
● It is found that that there is a slight correlation (0.20) between literacy and
crime. Innocents with low digital knowledge fall prey to cybercrimes.
12. Excellence and Service
CHRIST
Deemed to be University
Suggestions and recommendations:
● Avoid using e-mail, credit or debit card and e-banking facilities while browsing
through a public internet or Wi-Fi.
● Let your password contain a mix of uppercase, lowercase and
alphanumericals. Never share it with anyone.
● Protect your computers through antivirus software and update it frequently.
● Download the apps only from reliable sources. Avoid giving unnecessary
permissions such as contacts, cameras, files and location.
● Never share your bank login credentials, One Time Password (OTP), Debit
card or credit card details or ATM PIN with anyone, even if they claim to be
bank employees.
● Be cautious while sharing identity proof documents such as aadhar, PAN
Change the password at least once every six months on all your devices and
applications.
● Always report cybercrime complaints at https://cybercrime.gov.in/.
13. Excellence and Service
CHRIST
Deemed to be University
Limitations and Scope
● The research is based on past four years data only
● Though internet is global, attempt is made at India level
● There is a scope for further study at sector level
● The research can be further explored around the globe while major factors
influencing cybercrimes can be explored.
14. Excellence and Service
CHRIST
Deemed to be University
Conclusion:
● The study noted that there were motives to develop businesses illegally,
which would affect the genuine ones and also halt paying of taxes to the
Government of India, therefore affecting economic progress. Cybercrimes can
bring down the state and country’s performance.
● Ch, Rupa et al. (2020) mention in their research that cybercrime will cost
nearly $6 trillion per annum by 2021, as per the cyber security ventures report
in 2020. It also states that existing literature in the area of cyber-attacks is
insufficient to compute and forecast malicious attack, especially with
unstructured data.
● Mittal (2019) says that android-based applications can be developed using
machine learning algorithms that could help government and police
departments.
15. Excellence and Service
CHRIST
Deemed to be University
References:
● Djanggih, h. (2018). The phenomenon of cybercrimes which impact children as victims in
indonesia. Yuridika, 33(2), 212.
● Er. Navneet Kaur, Introduction of Cyber Crime and its Type, International Research Journal of
Computer Science, ISSN: 2393- 9842, 2018, Vol 5, Issue 8, Page 435- 439(Kaur 2018)
● Muhammad Dharma Tuah Putra Nasution, Andysah Putera Utama Siahann, Yossie Rossanty,
Solly Aryza, The Phenomenon of Cyber Crime and Fraud Victimisation In Online Shop,
International Journal of Civil Engineering and Technology, ISSN: 0976- 6316, 2018, Vol 9,
Issue 6, Page 1583- 1592 (Siahaan and Muhammad Dharma Tuah, n.d.)
● Rao, Y. S., Pradhan, D., Charana Panda, T., & Rath, R. (2020). Digital Crime and its Impact in
Present Society. International Journal of Engineering Research and Technology (IJERT), 8(1).
Retrieved from www.ijert.org
● Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European
Journal of Information Systems, 29(3), 306–321.
https://doi.org/10.1080/0960085X.2020.1771222
16. Excellence and Service
CHRIST
Deemed to be University
● Kamini Dashora(2011). Cyber Crime in the Society: Problems and Preventions. Journal of
Alternative Perspectives in the Social Sciences ( 2011) Vol 3, No 1, 240-259
● Monalisa Hati (2016). Cyber Crime: A Threat to the Nation and its Awareness, Journal of
Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified
Vol. 5, Issue 7, July 2016
● Md Shamimul Hasan et al. (2015). Perception and Awareness of Young Internet Users
towards Cybercrime: Evidence from Malaysia , Journal of Social Science Volume 11, Issue 4
Pages 395-404
● Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy, Cyber Space Technology: Cyber
Crime, Cyber Security and Models of Cyber Solution, a Case Study of Nigeria, International
Journal of Computer Science and Mobile Computing, ISSN: 2320- 088X, 2017, Vol 6, Issue
11, Page 94- 113(Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy 2017)
● Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study
integrating network externalities and motivation theory. Computers in human behavior, 27(3),
1152-1161.