Minimize Cyber Losses in Cyber World through the Optimization Technique

نویسندگان

  • Narander Kumar
  • Priyanka Chaudhary
چکیده

In the modern era, internet plays crucial role in the human life. Now that time it is a backbone of human life. In Twentyfirst century criminals increasingly rely on these technologies and these advance technologies are also increase day by day criminals and their criminals operations. These criminals can easily lift to Internet to carry out such type of traditional crime such as sex trafficking, illicit drug. In addition they also exploit the digital world which facilitate the crime that are often technology credit/debit card fraud intellectual property theft, identity theft, cyber bullying, identify sensitive data. So cyber crime is a very problem in our society by which there is no of information loosed. In this paper, we present an enumeration technique by which we can minimize losses through cyber crime in cyber world. In this technique we find an optimal solution. This is based on the primary data and personal (social) interaction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Civil Responsibility of Government in the Cyberspace: Looking at the Cyber Ethics

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Sociological Investigation of the Usage of Cyber Space and its Relation with Social Isolation (Case Study: Science and Research Branch Students)

The development and improvement of electronic communication instruments and means in postmodern societies with fast intention has caused further multiplication in meanings and content of the communication itself. On the other hand the involvement of cyber space in our privacy has caused massive personality changes in people particularly the youth, In a way that individuals are separated from re...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Prevalence of Traditional and Cyber Bullying Among Teenagers Herat-Afghanistan

Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014