2016 International Conference on Computing, Communication and Automation (ICCCA) 2016
DOI: 10.1109/ccaa.2016.7813706
|View full text |Cite
|
Sign up to set email alerts
|

Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 1 publication
0
13
0
Order By: Relevance
“…Although Blockchain is widely touted as a secure and private realm, its short history shows cases with grave risks such as ruined reputations [26], lost finances [21] and stolen identities [25]. We will provide multiple examples of how Blockchain can be hijacked and used in malicious ways.…”
Section: Blockchain Data Analytics For Security and Privacymentioning
confidence: 99%
“…Although Blockchain is widely touted as a secure and private realm, its short history shows cases with grave risks such as ruined reputations [26], lost finances [21] and stolen identities [25]. We will provide multiple examples of how Blockchain can be hijacked and used in malicious ways.…”
Section: Blockchain Data Analytics For Security and Privacymentioning
confidence: 99%
“…There have been several attempts to classify the types of online crimes in recent years (Holt, 2016;Koops, 2010;Sabillon, Cano, Cavaller Reyes, & Serra Ruiz, 2016;Wall, 2001), suggesting cyberspace has provided new opportunities for criminal activity to be sanctioned appropriately (Upadhyaya & Jain, 2016). Grabosky (2001); (2014) sees cybercrime as little more than an online version of existing types crime, whereas Holt and Bossler (2014) and Crown Prosecution Service (n.d.) include both traditional crime moving online and exclusively online activities.…”
Section: Typology Of Cybercrimesmentioning
confidence: 99%
“…Ransomware are similar to other computer virus such as trojan horse, worms and spyware [27,28] and it is defined as the emergence of cyber hack jacking threat in new form in the cyberspace. Ransomware has become a significant problem [13] due to its rapid growth in global level [29].…”
Section:  Ransomwarementioning
confidence: 99%