Full Paper View Go Back

A Review Toward Internet Crime Evaluation

Deepa Patil1 , aeem N2 , Sunil SG3

  1. CS Department Awuv Vijayapur, India.
  2. CS Department Awuv Vijayapur, India.
  3. CS Department Awuv Vijayapur, India.

Section:Review Paper, Product Type: Isroset-Journal
Vol.6 , Issue.3 , pp.71-75, Jun-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i3.7175


Online published on Jun 30, 2018


Copyright © Deepa Patil, Naeem N, Sunil SG . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepa Patil, Naeem N, Sunil SG, “A Review Toward Internet Crime Evaluation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.71-75, 2018.

MLA Style Citation: Deepa Patil, Naeem N, Sunil SG "A Review Toward Internet Crime Evaluation." International Journal of Scientific Research in Computer Science and Engineering 6.3 (2018): 71-75.

APA Style Citation: Deepa Patil, Naeem N, Sunil SG, (2018). A Review Toward Internet Crime Evaluation. International Journal of Scientific Research in Computer Science and Engineering, 6(3), 71-75.

BibTex Style Citation:
@article{Patil_2018,
author = {Deepa Patil, Naeem N, Sunil SG},
title = {A Review Toward Internet Crime Evaluation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {3},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {71-75},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=691},
doi = {https://doi.org/10.26438/ijcse/v6i3.7175}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.7175}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=691
TI - A Review Toward Internet Crime Evaluation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Deepa Patil, Naeem N, Sunil SG
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 71-75
IS - 3
VL - 6
SN - 2347-2693
ER -

456 Views    165 Downloads    88 Downloads
  
  

Abstract :
The idea of guilty party profiling in computer related wrongdoing is in its earliest stages. Essentially no exploration exists that relates guilty party profiling unequivocally to digital violations or digital hoodlums. However it can`t be denied that, given the expansiveness of potential suspects in a digital occasion, some strategy for diminishing that number to a reasonable level took after by the capacity to distinguish a modest number of trustworthy suspects is extremely alluring. Today, much digital wrongdoing is dealt with by the criminal equity framework as unique instances of physical wrongdoing. There is little contention, in any case, that there are parts of PC related wrongdoings and the offenders who execute them that are special to the virtual, as opposed to the physical world. The examination portrayed in this paper looks to set up criteria for dissecting digital wrongdoings and hoodlums in the clear, unambiguous setting of the virtual world. The creators have conjectured four general classes of PC related wrongdoing: 1) robbery, 2) framework assault, 3) individual and 4) psychological warfare. This paper talks about a particular part of the individual class of digital wrongdoing: digital stalking. The four sub-types talked about are the consequence of many years of observational application involving a large number of cases in the physical world. They have demonstrated dependable in examination of vicious violations, for example, assault and kill. A basic reason in the momentum look into is use of the sub-types in digital examination. This is a "Explore in-advance" paper, exhibiting a theory that will be tried exactly in the following period of the exploration. Nonetheless, we give a model case which we delineate the potential utilization of the profiling strategies introduced.

Key-Words / Index Term :
internet crime, power assertive,typology,subtypes,cyber stalking

References :
[1] R. D. Keppel, and R. Walter, “Profiling killers: a revised classification model for understanding sexual murder,” International Journal of Offender Therapy and Comparitive Criminology, vol. 43, no. 4, pp. 417437, 1999.
[2] M. L. Pittaro, “Cyber stalking: an analysis of online harassment and intimidation,” International Journal of Cyber Criminology, vol. 1, no. 2, pp. 180-197, 2007.
[3] L. E. Cohen, and M. Felson, “Social change and crime rate trends: a routine activity approach,” American Sociological Review, vol. 44, no. 4, pp. 588-608, 1979.
[4] E. E. Mustain, and R. Tewksbury, “A routine activity theory explanation for women`s stalking victimization,”. Violence Against Women, vol. 5, no. 1, pp. 43-62, 1999.
[5] L. McFarlane, and P. Bocij, “Cyber stalking: defining the invasion of cyberspace,” Forensic Update, vol. 1, no. 72, pp. 18-22, 2003.
[6] E. Ogilvie, “Cyberstalking,” in Trends and Issues in Crime and Criminal Justice, no. 166. Canberra, Australia: Australian Institute of Criminology, 2000, pp. 1-6.
[7] A. W. Burgess, and T. Baker, “Cyberstalking,” in Stalking and psychosexual obsession:Psychological perspectives for prevention, policing and treatment, J. Boon, and L. Sheridan, Eds. Chichester, UK: Wiley, 2002, ch. 12.
[8] L. McFarlane, and P. Bocij. (2003, September). An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers. First Monday [Online]. 8(9). [Cited: January 3, 2011] Available: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1 076/996.
[9] G. Wondracek, C. Platzer, E. Kirda, and C. Kruegel. “Is the Internet for porn? An insight into the online adult industry,” in Proc. 9th Workshop on the Economics of Information Security, Harvard University, Cambridge, Massachusetts, USA, 2010, pp. 1-14.
[10] T. J. Holt, and A. M. Bossler, “Examining the applicability of lifestyleroutine activities theory for cybercrime victimization,” Deviant Behavior, vol. 30, no. 1, pp. 1-25, 2009.
[11] N. A. Groth, and H. J. Birnbaum, Men Who Rape: The Psychology of the Offender. New York, NY: Plenum Press, 1979.
[12] R. R. Hazelwood, and A. W. Burgess, Practical Aspects of Rape Investigation (4th ed.). Boca Raton, FL : CRC Press, 2009.
[13] United States. Attorney General to the Vice President. 1999 Report on Cyberstalking: A New Challenge for Law Enforcement and Industry. Washington DC : United States Department of Justice, 1999.
[14] P. Bocij, Cyberstalking - Harassment in the Internet Age and How to Protect Your Family. Westport, CT: Praeger Publishers, 2004. ASIA.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation