cyber crime full report
#4
Heart 

[attachment=5938]
This article is presented by:
Raji, Ayodele Kamaldeen
Department of Computer Science, Kwara State Polytechnic, Ilorin
Computer Crimes: Control, Prevention, and Detection to Organizations in Nigeria


ABSTRACT
The last half century or more witness some major progress in the development of various technologies in almost all areas of human endeavour in both developed and developing countries. Specifically, Information Technology has advanced so well that almost everyone anywhere uses computers for their day-to-day activities. Today's computers are becoming more powerful, smaller, cheaper, and more user-friendly as technology improves. As they have improved, computers have proliferated in our society, our businesses, and our personal lives. Most modern businesses and governments depend on their computer systems to support their operations, from personnel files to financial management. In addition, computers played an important role in computational research such as Bio-Informatics, Differential Calculus, and Evolutionary Genetics. In today's environment, most businesses and government processes could not survive without the computer-especially e-mail or totally web-based businesses. However, an organization that uses computer for its daily transactions is liable to be the target of computer crimes. This article evaluates the concepts of computer crimes, detection and the controls. An understanding of various types of computer-related crimes is given. The paper finally exposed us to dangers it poses to organizations, factors that encourage it, and recommending possible controls and preventive measures against computer crimes.

INTRODUCTION
The world we are in today is all about Information Technology (IT) because we are in the age of Information Technology and the people with the right information, with proper way of disseminate this information and processing them is considered as the most successful. Information technology is the transfer of information using telecommunication and micro-based computer system. Nowadays, the computer has replaced manual records, and the fraudulent input document has been substituted by manipulating data held in a computer system. This manipulation does not need to be sophisticated. Computers have become the mainstay of business and government processes. Business has been using them for years and in most countries, there are drives towards electronic or joined up government. This is to allow the people to access government services from their desktop in their own home.
According to Oxford Advance Learners dictionary (2001), crime is the activities that involve breaking the law or illegal act or activities that can be punished by law. Computer crime has been defined as the act of stealing or misusing the computer hardware or software (Olawepo 1999: 48). The larger the organization, the more they make use of computers for their day-to-day activities and more likely it is that someone is out there to commit a crime. Computer crimes were committed for many reasons, some which are rational, others of which may make no sense to the observer. There are those who will steal under the best of employment circumstances. Other would not steal even if they were the worst treated employees in the world. This is dependent on individual character. Olawepo (1999) observed that it is against the backdrop that management of computerized organizations should address all the energy at disposal, the issue of detection and preventing computer related crimes.
Finally, the growing danger from crimes committed against computers, or against information store on computers, is beginning to claim attention in national capitals. The existing laws are likely to be unenforceable against such crimes in most countries around the world, especially Nigeria. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cyber crime management system using vb, cyber crime security abstract, cyber crime in india ppt pdf, who is this in spanish, raji ntranet, who started bal majuri mohim, how to report cyber crime in india,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: cyber crime full report - by satabdi dash - 09-08-2010, 07:19 PM
RE: cyber crime full report - by projectsofme - 13-10-2010, 09:09 PM
RE: cyber crime full report - by seminar class - 12-03-2011, 04:00 PM
RE: cyber crime full report - by seminar class - 23-03-2011, 02:22 PM
RE: cyber crime full report - by seminar class - 26-03-2011, 02:50 PM
RE: cyber crime full report - by seminar class - 28-03-2011, 09:23 AM
RE: cyber crime full report - by seminar class - 05-04-2011, 09:34 AM
RE: cyber crime full report - by seminar class - 18-04-2011, 09:21 AM
RE: cyber crime full report - by seminar paper - 15-02-2012, 09:54 AM
RE: cyber crime full report - by seminar paper - 18-02-2012, 10:33 AM
RE: cyber crime full report - by seminar paper - 02-03-2012, 01:58 PM
RE: cyber crime full report - by seminar details - 18-10-2012, 01:46 PM
RE: cyber crime full report - by Guest - 27-02-2013, 10:53 PM
RE: cyber crime full report - by Guest - 03-04-2013, 12:53 PM
RE: cyber crime full report - by computer topic - 04-04-2013, 01:01 PM
yzurkj ltifzs kwmink - by MichaelPn - 17-03-2014, 09:40 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 45,721 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 32,947 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 27,041 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 28,738 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 69,647 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 77,634 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 25,581 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 43,724 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 47,047 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,874 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: