You are on page 1of 7

Odo B, Chinasa R, Odo AI.

The extent of involvement in cybercrime activities among


students in tertiary institutions in Enugu State of Nigeria. Global Journal of Computer Science and
Technology: Information and Technology. 2015; 15(3):16.
HE PURPOSED THAT showed that students involvement in cybercrime is dependent on

gender and Institution type.


Burns S, Roberts L. Applying the theory of planned behavior to predicting online safety behavior.
Crime Prevention and Community Safety. 2013; 15(1):4864.

The results of this study facilitate understanding of the


psychological processes underlying the use of online protective behaviours, and
can be used in the development of educational materials and cyber-identity
theft prevention strategies.
HE RECOMEDED THAT

Dhanalakshmi R, Prabhu C, Chellapan C. Detection of phishing websites and secure


transactions. International Journal of Communication Network and Security. 2011; 1(2):1521

We propose to consider websites identity claims. To enable secure transactions


,Password hashing has been done with MD5 hashing algorithms that strengthens
web password authentication. It is also shown that getting original password from
hashed form is not an easy task due to addition of salt value. If the user is valid, get
a session key via mobile, through which further access can be done.
Shalini D. Demographic relationship of cyber crime in india with special reference to
various age groups. Abhinav National Monthly Refereed Journal of Research in Commerce and
Management. 2014; 3(4):7073.

This particular paper deals with the issue of relationship o cybercrime and age of
criminals. Further this paper may contribute in searching out the solutions to slow
down the growth of cybercrime.
Amichai-Hamburger Y, Hayat Z. The impact of the Internet on the social lives of users: A
representative sample from 13 countries. Computers in Human Behavior. 2011; 27(1):5859.

One of the most vociferous criticisms of the Internet has always been that it contributes to
loneliness among its users. This study analyses results from the World Internet Project,
comprised of representative samples from 13 countries (22,002 participants). Thus creating an
exceptional international representative sample. In analyzing those results, we argue that in
order to achieve a comprehensive understanding of the Internets influence over individuals
social lives; it is essential to consider the different types of social connections that might be
influenced by the Internet. We assess the influence of Internet use over social interactions in
separate life domains (e.g. with family members; friends; colleagues). Our analysis confirms that
Internet usage can actually enhance the social lives of its users. Qualifications to the research
are discussed while highlighting the different life domains in which we found significant
correlations between Internet usage and increased social interactions.
Henson B, Reyns BW, Fisher BS. Fear of crime online? Examining the Institutions in ZariaKaduna state of Nigeria. American International Journal of Contemporary Research. 2013;
3(9):98114.

In the present study I test these factors on cyber crimes as their relationships with
fear of cyber crime are generally unexplored in the literature. Precisely, four cyber
crimes are chosen, including online scam, cyber bullying, digital piracy, and
computer virus.This study is the first study that takes into account of four types of
cyber crime concurrently while addressing the relationship between fear of crime
and the three major predictors. The findings suggest that fear of cyber crime does
not always share the same predictors, depending on the crime. Internet use also
plays a role in the fear of cyber crime.
Jain SK, Jain M. Exploring impact of consumer and product characteristics on e-commerce
adoption: A study of consumers in India. Journal of Technology Management for Growing
Economies. 2011; 2(2):3564

The paper aims at examining the impact of various consumer and product
characteristics on adoption of e-commerce among consumers in India
Yu S. Digital piracy justification: Asian students versus American students.
International Criminal Justice Review. 2013; 23(2):18596.
The literature has shown that digital piracy is more rampant in Asia and Asians are often found to have a more
favorable attitude toward digital piracy in research. This study examines the attitude toward justifying digital
piracy in light of the techniques of neutralization. A comparison is made between Asian international students
and American students. The result shows Asian international students are significantly more likely to justify
digital piracy, but their general morality is not significantly different from American students. This finding
supports neutralization theory in that people do not need to change their moral belief to favor criminal behavior
as long as they can apply the techniques of neutralization to justify it. Moreover, Asian Americans, among all
racial groups in the American sample, are the only group that does not show significant difference in their digital
piracy justification, compared to the Asian international students. Considering that Asian Americans and Asian
international students rarely share the same social environment in their upbringing, this finding further suggests
there is something about being Asian, rather than social factors, that endorses digital piracy justification.

Wilsem J. Hacking and harassment: Do they have something in common?


Comparing risk factors for online victimization. Journal of Contemporary Criminal
Justice. 2013; 29(4):437453.

Contrary to committing hacking offences, becoming a victim of hacking has


received scant research attention. This article addresses risk factors for this type of
crime and explores its theoretical and empirical connectedness to the more
commonly studied type of cybercrime victimization: online harassment. The results
show that low self-control acts as a general risk factor in two ways. First, it leads to
a higher risk of experiencing either one of these two distinct types of victimization
within a 1-year period. Second, cumulatively the experiences of being hacked and
harassed are also more prominent among this group. However, specific online
behaviors predicted specific online victimization types (e.g., using social media
predicted only harassment and not hacking). The results thus shed more light on
the extent to which criminological theories are applicable across different types of
Internet-related crime.
Yu S. Fear of cyber crime among college students in the United States: An exploratory
study. International Journal of Cyber Criminology. 2014; 8(1):3646.

A literature review on fear of crime suggests perceived crime seriousness, perceived


risk of victimization, and victimization experience as the three major predictors for
fear of crime. In the present study I test these factors on cyber crimes as their
relationships with fear of cyber crime are generally unexplored in the literature.
Precisely, four cyber crimes are chosen, including online scam, cyber bullying,
digital piracy, and computer virus. This study is the first study that takes into
account of four types of cyber crime concurrently while addressing the relationship
between fear of crime and the three major predictors. The findings suggest that fear
of cyber crime does not always share the same predictors, depending on the crime.
Internet use also plays a role in the fear of cyber crime.
B. K. Mishra, N. Jha, SEIQRS model for the transmission of malicious objects in computer
network, Appl. Math. Modell., 34 (2010) 710 715.
Susceptible (S) exposed (E) infectious (I) quarantined (Q) recovered (R) model for the transmission of
malicious objects in computer network is formulated. Thresholds, equilibria, and their stability are also found with
cyber mass action incidence. Threshold Rcq determines the outcome of the disease. If Rcq 1, the infected fraction
of the nodes disappear so the disease die out, while if Rcq > 1, the infected fraction persists and the feasible region is
an asymptotic stability region for the endemic equilibrium state. Numerical methods are employed to solve and
simulate the system of equations developed. The effect of quarantine on recovered nodes is analyzed. We have also
analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the computer
network.
B. K. Mishra, S. K. Pandey, Effect of antivirus software on infectious nodes in computer network:
A mathematical model, Physics Letters A, 376 (2012), 2389 2393.
H e developed the vertical transmission of maliceious code,andalso to effect of anti virus software to remove the
malicious code in the network.

Bimal Kumar Mishra, Neha Keshri,2013, Mathematical model on the transmission


of worms in wireless sensor network -, Applied Mathematical Modelling, Elsevier, 37, 4103-4111
Wireless sensor networks (WSNs) have received extensive attention due to their great potential in civil
and military applications. The sensor nodes have limited power and radio communication capabilities. As
sensor nodes are resource constrained, they generally have weak defense capabilities and are attractive
targets for software attacks. Cyber attack by worm presents one of the most dangerous threats to the
security and integrity of the computer and WSN. In this paper, we study the attacking behavior of possible
worms in WSN. Using compartmental epidemic model, we propose susceptible exposed infectious
recovered susceptible with a vaccination compartment (SEIRS-V) to describe the dynamics of worm
propagation with respect to time in WSN. The proposed model captures both the spatial and temporal
dynamics of worms spread process. Reproduction number, equilibria, and their stability are also found. If
reproduction number is less than one, the infected fraction of the sensor nodes disappears and if the
reproduction number is greater than one, the infected fraction persists and the feasible region is
asymptotically stable region for the endemic equilibrium state. Numerical methods are employed to solve
and simulate the systems of equations developed and also to validate our model. A critical analysis of
vaccination class with respect to susceptible class and infectious class has been made for a positive
impact of increasing security measures on worm propagation in WSN
1. Gan,C., Xiaofan, Y., Qingyi, Z., Jian, J., and Li, H.,2013, The spread of computer virus

under the effect of external computers, Nonlinear Dynamics., 73(3),pp. 16151620


In reality, the external computers, in particular, external infected computers are connected to the
Internet. Based on this reasonable assumption, a new computer virus propagation model is
established. Different from all the previous models, this model regards the external computers as
a single compartment to study. Through a qualitative analysis, it is found that (1) this model
possesses a unique (viral) equilibrium, and (2) this equilibrium is globally asymptotically stable.
Further study shows that, by taking effective measures, the number of infected computers can be
made below an acceptable threshold..

1. Han, X., and Qiulin, T., 2010, Dynamical behavior of computer virus on Internet,
Applied Mathematics and Computation. 217(6), pp.25202526.
In this paper, we presented a computer virus model using an SIRS model and the threshold
value R0 determining whether the disease dies out is obtained. If R0 is less than one, the disease-free
equilibrium is globally asymptotically stable. By using the time delay as a bifurcation parameter, the
local stability and Hopf bifurcation for the endemic state is investigated. Numerical results
demonstrate that the system has periodic solution when time delay is larger than a critical values. The
obtained results may provide some new insight to prevent the computer virus.

1. Saini, D.K., 2011, Mathematical Model for the Effect of Malicious Object on Computer
Network Immune System, Applied Mathematical Modeling. 35(8), pp. 3777-3787
in this paper, a nonlinear mathematical model is proposed and analyzed to study the effect of
malicious object on the immune response of the computer network. Criteria for local stability,
instability and global stability are obtained. It is shown that the immune response of the system
decreases as the concentration of malicious objects increases, and certain criterias are
obtained under which it settles down at its equilibrium level. This paper shows that the malicious
objects have a grave effect on cyber defense mechanism. The paper has two parts (i) in the
first part a mathematical model is proposed in which dynamics of pathogen, immune response
and relative characteristic of the damaged node in the network is investigated, (ii) in second part
the effect of malicious object on the immune response of the network has been examined.
Finally how and where to use this modeling is discussed.
2.Yang, L., Yang, X., Qingyi, Z., and Luosheng W., 2013 A computer virus model with
graded cure rate, Nonlinear Analysis, real world Application. 14(1), pp. 414-422
A dynamical model characterizing the spread of computer viruses over the Internet
is established, in which two assumptions are imposed: (1) a computer possesses
infectivity once it is infected, and (2) latent computers have a lower cure rate than
seizing computers. The qualitative properties of this model are fully studied. First,
the basic reproduction number, R0, for this model is determined. Second, by
introducing appropriate Lyapunov functions, it is proved that the virus-free
equilibrium is globally asymptotically stable if R0 1, whereas the viral equilibrium
is globally asymptotically stable if 1 < R0 4. Next, the sensitivity analysis of R0 to
three system parameters is conducted, and the dependence of R0 on the remaining
system parameters is investigated. On this basis, a set of policies is recommended
for eradicating viruses spreading across the Internet effectively.

1. Zhu, Q., Xiaofan, Y., Lu-Xing, Y., and Chunming, Z., 2012, Optimal control of
computer virus under a delayed model, Appl. Math. Comput., 218(23),pp.1161311619.
This paper addresses the issue of how to suppress the spread of computer virus by means of
the optimal control method. First, a controlled delayed computer virus spread model is
established. Second, an optimal control problem is formulated by making a tradeoff between the
control cost and the control effect. Third, the optimal control strategies are theoretically
investigated. Finally, it is experimentally shown that the spread of infected nodes can be
suppressed effectively by adopting an optimal control strategy.

1. Zhu, Q., Xiaofan, Y., Lu-Xing, Y., and Xulong, Z., 2013, A mixing propagation model of
computer viruses and countermeasures, Nonlinear Dynamics., 73(3), pp.14331441.

Based on the CMC(computer viruses and countermeasures) antivirus strategy proposed


by Chen and Carley, a mixing propagation model of computer viruses and
countermeasures is suggested. This model has two potential virus-free
equilibria and two potential endemic equilibria. The existence and global

stability of these equilibria are fully investigated. From the obtained results it
can be deduced that the CMC strategy is efficacious in deracinating viruses
Kumar, M., Mishra, B.K.., and Panda, T.C., 2015 Stability analysis of quarantine of epidemic
model with latent and breaking out over the internet, International Journal of Hybrid
Information technology. , 8(7), pp.133-148
In this paper, a new epidemic model, known as the SLBQRS model, is proposed in a
computer network with Latent and Breaking-out periods of a virus in its life cycle.
Furthermore, an infected computer will be referred to as latent or breaking-out
depending on whether all viruses staying in it are in their respective latent periods
or at least one virus staying in it is in its breaking-out period. In the real world there
exists no infected computer at all that has no infectivity. A breaking-out computer
can get treated with a higher probability, because it usually suffers from a marked
performance degradation or even breaks down, which can be perceived evidently
by the user. The quarantine is a method of isolating the most infected nodes from
the network and reduce the spreading virus till they get recovered. The qualitative
properties of this model are investigated. The result shows that the dynamic
behavior of the model is determined by a threshold R0. Specially, virus-free
equilibrium is globally asymptotically stable if R0 1. Next, the sensitivity analysis
of R0 to six system parameters is also analyzed. On this basis, a collection of
strategies are advised for eradicating viruses spreading across the Internet
effectively. Threshold R0, equilibrium and their stability are discussed in terms of
the Jacobian of the system. Numerical methods and MATLAB are employed to solve
and simulate the system of equations developed and analysis of the model gives
remarkable exposure.

1. Yang, L.X., and

Xiaofan, Y., 2014, A new epidemic model in computer virus,

Nonlinear Science and numerical simulation. 19(6), pp.1935-1944.


This paper addresses the epidemiological modeling of computer viruses. By
incorporating the effect of removable storage media, considering the possibility
of connecting infected computers to the Internet, and removing the conservative
restriction on the total number of computers connected to the Internet, a new
epidemic model is proposed. Unlike most previous models, the proposed model
has no virus-free equilibrium and has a unique endemic equilibrium. With the aid
of the theory of asymptotically autonomous systems as well as the generalized
PoincareBendixson theorem, the endemic equilibrium is shown to be globally
asymptotically stable. By analyzing the influence of different system parameters
on the steady number of infected computers, a collection of policies is
recommended to prohibit the virus prevalence

2. Piqueira JRC, Navarro BF, Monteiro LHA, 2005, Epidemiological models applied to
viruses in computer networks, Journal of Computer Science, 1(1), 31-34
To investigate the use of classical epidemiological models for studying computer
virus propagation we described analogies between computer and population
disease propagation using SIR (Susceptible-Infected-Removed) epidemiological
models. By modifying these models with the introduction of anti-viral individuals
we analyzed the stability of the disease free equilibrium points. Consequently,

the basal virus reproduction rate gives some theoretical hints about how to avoid
infections in a computer network. Numerical simulations show the dynamics of
the process for several parameter values giving the number of infected
machines as a function of time.

Piqueira JRC, Cesar FB, 2008, Dynamical models for computer viruses propagation, elsevir,
computers & security 27 (2008) 355359,27(2008)355-359
Computer viruses are an important risk to computational systems endangering
either corporations of all sizes or personal computers used for domestic
applications. Here, classical epidemiological models for disease propagation are
adapted to computer networks and, by using simple systems identification
techniques

model

called

SAIC

(Susceptible,

Antidotal,

Infectious,

Contaminated) is developed. Real data about computer viruses are used to


validate the model.

Susceptible:- person who is suspected, especially one suspected of a crime,o


ffense, or the like.
Infcetible:- which represents the number of newborn individuals, should be included in the
equation of susceptible individuals
Exposed:-susceptible to attack; vulnerable.These people are living outdoors wit

h no pr-otection.
Vaccinated:- A vaccination is a treatment which makes the body stronger against a particular

infection

Inoculation with a vaccine in order to protect against a particulardisease.

Quarantine is a state, period, or place of isolation in which people or animals that have
arrived from elsewhere or been exposed to infectious or contagious disease are placed
Quarantine, or isolation, is presented as an incarcerative function that is particularly susceptible to rational
analysis as to its impact on public protection. use of quarantine would reduce seri ous violent crime by no
more than 10 percent,
Recovery

The action or process of regaining possession or control of something stolen or lost

Incidence Rate
A measure of the frequency with which a disease occurs in a population over a specified time period.
Incidence rate or incidence is numerically defined as the number of new cases of a disease within a
time

period,

as

proportion

of

the

number

of

people

at

risk

for

the

disease

You might also like