2015
DOI: 10.1007/978-3-319-15150-2
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrime, Digital Forensics and Jurisdiction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 0 publications
0
21
0
3
Order By: Relevance
“…It is expected that losses due to these crimes will reach 10.5$ trillion by 2025 [5]. Cybercrime, also known as "computerrelated crime, is any criminal activity that involves a computer either as an instrument, target, or a means for perpetuating further crimes that come within the ambit of cybercrime" [6]. According to Shinder & Cross in [7], cybercrime, like traditional crime, needs three factors simultaneously for crime to occur.…”
Section: Background Workmentioning
confidence: 99%
“…It is expected that losses due to these crimes will reach 10.5$ trillion by 2025 [5]. Cybercrime, also known as "computerrelated crime, is any criminal activity that involves a computer either as an instrument, target, or a means for perpetuating further crimes that come within the ambit of cybercrime" [6]. According to Shinder & Cross in [7], cybercrime, like traditional crime, needs three factors simultaneously for crime to occur.…”
Section: Background Workmentioning
confidence: 99%
“…Eksploitasi tersebut sangat merugikan sehingga hal ini dinamakan cybercrime. Dalam hal ini sistem menjadi sasaran kegiatan kriminal, tempat penyimpanan data tentang kegiatan kriminal dan/atau alat yang digunakan untuk melakukan kejahatan (merencanakan kegiatan criminal) [2].…”
Section: Pendahuluanunclassified
“…Eksploitasi tersebut sangat merugikan sehingga hal ini dinamakan cybercrime. Dalam hal ini sistem menjadi sasaran kegiatan kriminal, tempat penyimpanan data tentang kegiatan kriminal dan/atau alat yang digunakan untuk melakukan kejahatan (merencanakan kegiatan criminal) [2].Backdoor shell merupakan kumpulan kode-kode atau script yang pada umumnya berbasis PHP yang dimanfaatkan oleh peretas untuk memperoleh akses pada file yang disimpan di web server target [3]. Jika pengelola website tidak dapat mendeteksi keberadaan backdoor shell maka hal itu dapat menimbulkan efek jangka panjang.…”
unclassified
“…Beyond doubt, the major intentional or unintentional threats ranging from digital crime to failure of technical part respectively. As a result, major destruction swept the new media turf, for examples, monetary theft, larceny, losing valuable data and services (Bidgoli, 2015;Chawki, et. al., 2015;Holt et.…”
Section: Information Securitymentioning
confidence: 99%