Professional Documents
Culture Documents
This particular paper deals with the issue of relationship o cybercrime and age of
criminals. Further this paper may contribute in searching out the solutions to slow
down the growth of cybercrime.
Amichai-Hamburger Y, Hayat Z. The impact of the Internet on the social lives of users: A
representative sample from 13 countries. Computers in Human Behavior. 2011; 27(1):5859.
One of the most vociferous criticisms of the Internet has always been that it contributes to
loneliness among its users. This study analyses results from the World Internet Project,
comprised of representative samples from 13 countries (22,002 participants). Thus creating an
exceptional international representative sample. In analyzing those results, we argue that in
order to achieve a comprehensive understanding of the Internets influence over individuals
social lives; it is essential to consider the different types of social connections that might be
influenced by the Internet. We assess the influence of Internet use over social interactions in
separate life domains (e.g. with family members; friends; colleagues). Our analysis confirms that
Internet usage can actually enhance the social lives of its users. Qualifications to the research
are discussed while highlighting the different life domains in which we found significant
correlations between Internet usage and increased social interactions.
Henson B, Reyns BW, Fisher BS. Fear of crime online? Examining the Institutions in ZariaKaduna state of Nigeria. American International Journal of Contemporary Research. 2013;
3(9):98114.
In the present study I test these factors on cyber crimes as their relationships with
fear of cyber crime are generally unexplored in the literature. Precisely, four cyber
crimes are chosen, including online scam, cyber bullying, digital piracy, and
computer virus.This study is the first study that takes into account of four types of
cyber crime concurrently while addressing the relationship between fear of crime
and the three major predictors. The findings suggest that fear of cyber crime does
not always share the same predictors, depending on the crime. Internet use also
plays a role in the fear of cyber crime.
Jain SK, Jain M. Exploring impact of consumer and product characteristics on e-commerce
adoption: A study of consumers in India. Journal of Technology Management for Growing
Economies. 2011; 2(2):3564
The paper aims at examining the impact of various consumer and product
characteristics on adoption of e-commerce among consumers in India
Yu S. Digital piracy justification: Asian students versus American students.
International Criminal Justice Review. 2013; 23(2):18596.
The literature has shown that digital piracy is more rampant in Asia and Asians are often found to have a more
favorable attitude toward digital piracy in research. This study examines the attitude toward justifying digital
piracy in light of the techniques of neutralization. A comparison is made between Asian international students
and American students. The result shows Asian international students are significantly more likely to justify
digital piracy, but their general morality is not significantly different from American students. This finding
supports neutralization theory in that people do not need to change their moral belief to favor criminal behavior
as long as they can apply the techniques of neutralization to justify it. Moreover, Asian Americans, among all
racial groups in the American sample, are the only group that does not show significant difference in their digital
piracy justification, compared to the Asian international students. Considering that Asian Americans and Asian
international students rarely share the same social environment in their upbringing, this finding further suggests
there is something about being Asian, rather than social factors, that endorses digital piracy justification.
1. Han, X., and Qiulin, T., 2010, Dynamical behavior of computer virus on Internet,
Applied Mathematics and Computation. 217(6), pp.25202526.
In this paper, we presented a computer virus model using an SIRS model and the threshold
value R0 determining whether the disease dies out is obtained. If R0 is less than one, the disease-free
equilibrium is globally asymptotically stable. By using the time delay as a bifurcation parameter, the
local stability and Hopf bifurcation for the endemic state is investigated. Numerical results
demonstrate that the system has periodic solution when time delay is larger than a critical values. The
obtained results may provide some new insight to prevent the computer virus.
1. Saini, D.K., 2011, Mathematical Model for the Effect of Malicious Object on Computer
Network Immune System, Applied Mathematical Modeling. 35(8), pp. 3777-3787
in this paper, a nonlinear mathematical model is proposed and analyzed to study the effect of
malicious object on the immune response of the computer network. Criteria for local stability,
instability and global stability are obtained. It is shown that the immune response of the system
decreases as the concentration of malicious objects increases, and certain criterias are
obtained under which it settles down at its equilibrium level. This paper shows that the malicious
objects have a grave effect on cyber defense mechanism. The paper has two parts (i) in the
first part a mathematical model is proposed in which dynamics of pathogen, immune response
and relative characteristic of the damaged node in the network is investigated, (ii) in second part
the effect of malicious object on the immune response of the network has been examined.
Finally how and where to use this modeling is discussed.
2.Yang, L., Yang, X., Qingyi, Z., and Luosheng W., 2013 A computer virus model with
graded cure rate, Nonlinear Analysis, real world Application. 14(1), pp. 414-422
A dynamical model characterizing the spread of computer viruses over the Internet
is established, in which two assumptions are imposed: (1) a computer possesses
infectivity once it is infected, and (2) latent computers have a lower cure rate than
seizing computers. The qualitative properties of this model are fully studied. First,
the basic reproduction number, R0, for this model is determined. Second, by
introducing appropriate Lyapunov functions, it is proved that the virus-free
equilibrium is globally asymptotically stable if R0 1, whereas the viral equilibrium
is globally asymptotically stable if 1 < R0 4. Next, the sensitivity analysis of R0 to
three system parameters is conducted, and the dependence of R0 on the remaining
system parameters is investigated. On this basis, a set of policies is recommended
for eradicating viruses spreading across the Internet effectively.
1. Zhu, Q., Xiaofan, Y., Lu-Xing, Y., and Chunming, Z., 2012, Optimal control of
computer virus under a delayed model, Appl. Math. Comput., 218(23),pp.1161311619.
This paper addresses the issue of how to suppress the spread of computer virus by means of
the optimal control method. First, a controlled delayed computer virus spread model is
established. Second, an optimal control problem is formulated by making a tradeoff between the
control cost and the control effect. Third, the optimal control strategies are theoretically
investigated. Finally, it is experimentally shown that the spread of infected nodes can be
suppressed effectively by adopting an optimal control strategy.
1. Zhu, Q., Xiaofan, Y., Lu-Xing, Y., and Xulong, Z., 2013, A mixing propagation model of
computer viruses and countermeasures, Nonlinear Dynamics., 73(3), pp.14331441.
stability of these equilibria are fully investigated. From the obtained results it
can be deduced that the CMC strategy is efficacious in deracinating viruses
Kumar, M., Mishra, B.K.., and Panda, T.C., 2015 Stability analysis of quarantine of epidemic
model with latent and breaking out over the internet, International Journal of Hybrid
Information technology. , 8(7), pp.133-148
In this paper, a new epidemic model, known as the SLBQRS model, is proposed in a
computer network with Latent and Breaking-out periods of a virus in its life cycle.
Furthermore, an infected computer will be referred to as latent or breaking-out
depending on whether all viruses staying in it are in their respective latent periods
or at least one virus staying in it is in its breaking-out period. In the real world there
exists no infected computer at all that has no infectivity. A breaking-out computer
can get treated with a higher probability, because it usually suffers from a marked
performance degradation or even breaks down, which can be perceived evidently
by the user. The quarantine is a method of isolating the most infected nodes from
the network and reduce the spreading virus till they get recovered. The qualitative
properties of this model are investigated. The result shows that the dynamic
behavior of the model is determined by a threshold R0. Specially, virus-free
equilibrium is globally asymptotically stable if R0 1. Next, the sensitivity analysis
of R0 to six system parameters is also analyzed. On this basis, a collection of
strategies are advised for eradicating viruses spreading across the Internet
effectively. Threshold R0, equilibrium and their stability are discussed in terms of
the Jacobian of the system. Numerical methods and MATLAB are employed to solve
and simulate the system of equations developed and analysis of the model gives
remarkable exposure.
2. Piqueira JRC, Navarro BF, Monteiro LHA, 2005, Epidemiological models applied to
viruses in computer networks, Journal of Computer Science, 1(1), 31-34
To investigate the use of classical epidemiological models for studying computer
virus propagation we described analogies between computer and population
disease propagation using SIR (Susceptible-Infected-Removed) epidemiological
models. By modifying these models with the introduction of anti-viral individuals
we analyzed the stability of the disease free equilibrium points. Consequently,
the basal virus reproduction rate gives some theoretical hints about how to avoid
infections in a computer network. Numerical simulations show the dynamics of
the process for several parameter values giving the number of infected
machines as a function of time.
Piqueira JRC, Cesar FB, 2008, Dynamical models for computer viruses propagation, elsevir,
computers & security 27 (2008) 355359,27(2008)355-359
Computer viruses are an important risk to computational systems endangering
either corporations of all sizes or personal computers used for domestic
applications. Here, classical epidemiological models for disease propagation are
adapted to computer networks and, by using simple systems identification
techniques
model
called
SAIC
(Susceptible,
Antidotal,
Infectious,
h no pr-otection.
Vaccinated:- A vaccination is a treatment which makes the body stronger against a particular
infection
Quarantine is a state, period, or place of isolation in which people or animals that have
arrived from elsewhere or been exposed to infectious or contagious disease are placed
Quarantine, or isolation, is presented as an incarcerative function that is particularly susceptible to rational
analysis as to its impact on public protection. use of quarantine would reduce seri ous violent crime by no
more than 10 percent,
Recovery
Incidence Rate
A measure of the frequency with which a disease occurs in a population over a specified time period.
Incidence rate or incidence is numerically defined as the number of new cases of a disease within a
time
period,
as
proportion
of
the
number
of
people
at
risk
for
the
disease