Volume 2 Issue 1 Research Article Open Access

Cyber Crime and its Effects on Society in Our Digital Era

Dr. Sreeja Vinayadas, Sayed Ali Moosa Alaswami, Layla Ashraf Mohamed, Ruaa Mohamed Kayani, Al Hanoof Abdul Karim
IJHSIMS-V2I1P105
DOI: 10.64137/30508509/IJHSIMS-V2I1P105  |  Year of Publication: 2025
Abstract

Cybercrimes are a type of computer and internet crime that targets cyber security systems that protect information and contacts to harm piracy, violation of property rights, extortion, or fraud. These crimes cause much damage to institutions and individuals. Thus, this report will discuss how deep cyberattacks can have impacts on various levels. Also, how can this type of crime be prevented and stopped by awareness and protection methods applied by individuals and institutions, and steps were taken by the government to prohibit such crime.

Keywords: Awareness Crime Exploitation of Technical Rights
Cite this Article

Use the text below for your bibliography.

References

[1] Introduction to Cybercrime, 2011. [Online]: Available: https://www.studymode.com/essays/Introduction-To-Cyber-Crime-550163.html
[2] Adv. Prashant Mali, What are Types of Cybercrime? 2009. [Online]: Available: https://www.lawyersclubindia.com/articles/classification-of-cybercrimes--1484.asp
[3] Sumanjit Das, and Tapaswini Nayak, "Impact of Cyber Crime: Issues and Challenges" International Journal of Engineering Sciences and Emerging Technologies, vol. 6, no. 2, pp. 142-453, 2013. |Google Scholar| Publisher Site|
[4] Majid Yar, and Kevin F. Steinmetz, Cybercrime and Society, London: SAGE Publications, 2019. | Publisher Site|
[5] Gerald Cliff, Growing Impact of Cybercrime in Local Government, 2017. [Online]: Available: https://icma.org/articles/pm-magazine/growing-impact-cybercrime-local-government
[6] Researchers Identify Negative Impacts of Cyber Attacks, 2018. [Online]: Available: https://www.ox.ac.uk/news/2018-10-29-researchers-identify-negative-impacts-cyber-attacks
[7] Why a Firewall is the First Line of Defense Against Cyber Attacks? [Online]: Available: https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/why-a-firewall-is-the-first-line-of-defense-against-cyber-attacks/
[8] Encryption 101: What It Is, How It Works, and Why We Need It, 2015. [Online]: Available: https://www.trendmicro.com/vinfo/us/security/news/online-privacy/encryption-101-what-it-is-how-it-works
[9] Eliza Paul, What is Digital Signature: How it Works, Benefits, Objectives, Concepts, 2017. [Online]: Available: https://www.emptrust.com/blog/benefits-of-using-digital-signatures/
[10] Tony Bradley, What is an IDS and Why Do You Need It? 2018. [Online]: Available: https://www.alertlogic.com/blog/what-is-a-network-ids-and-why-do-you-need-it/
[11] Amer S. Mustafa, Combating Cyber Crime in The Kingdom of Bahrain, 2015. [Online]: Available: https://unipath-magazine.com/combating-cyber-crime-in-the-kingdom-of-bahrain/