The Deviant Security Practices of Cyber Crime

2021 ◽  
Author(s):  
Erik van de Sandt
Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2020 ◽  
Author(s):  
Shipra Varshney ◽  
Dheeraj Munjal ◽  
Ipsita Jash ◽  
Orijit Bhattacharya ◽  
Shagun Saboo
Keyword(s):  

Author(s):  
Anupam Bansal

“Cyber crime” has been used to describe a wide range of offences, including offences against computer data and systems (such as “Hacking”), computer related forgery and fraud (such as “phishing”), content offences (such as disseminating child pornography), and copyright offences (such as the dissemination of pirated content). The word “Cyber Crime” has been derived from the words “Cybernetic” which means the science of communication and automatic control systems in both machines and living things.


Author(s):  
Saipira Furstenberg ◽  
Edward Lemon ◽  
John Heathershaw

Abstract This article theorises the repressive security practices of authoritarian states in the context of transnationalism and globalisation. While emerging research on transnational repression has identified a range of extraterritorial and exceptional security practices adopted by authoritarian states, it has not fully studied the implications of such practices on space and statecraft. Using data from the Central Asia Political Exile Database project (CAPE) and interviews conducted with exiled Tajik opposition groups based in Russia and Europe, we theorise the spatial connections between the territorial and extraterritorial security practices using the concept of assemblages. We further outline how these practices escalate in a three-stage model, in which exiles go on notice, are detained and then rendered or assassinated. Such an approach sheds light on the inherent links between the normalisation of security practices and the creation of transnational space with distinct forms of geographical state power that is embedded in non-national spaces and is manifested through spatially organised actors, networks, and technologies within assemblages.


Sign in / Sign up

Export Citation Format

Share Document