International Journal of Social Science & Economic Research
Submit Paper

Title:
‘CYBER SECURITY’ VERSUS ‘CYBER CRIMES’, AN EXPLORATORY STUDY WITH SPECIAL REFERENCE TO ITS GROWTH AND ITS IMPACT ON A COMPANY’S PROFITABILITY

Authors:
Rishit Talwar

|| ||

Rishit Talwar
The Doon School

MLA 8
Talwar, Rishit. "‘CYBER SECURITY’ VERSUS ‘CYBER CRIMES’, AN EXPLORATORY STUDY WITH SPECIAL REFERENCE TO ITS GROWTH AND ITS IMPACT ON A COMPANY’S PROFITABILITY." Int. j. of Social Science and Economic Research, vol. 8, no. 8, Aug. 2023, pp. 2438-2452, doi.org/10.46609/IJSSER.2023.v08i08.024. Accessed Aug. 2023.
APA 6
Talwar, R. (2023, August). ‘CYBER SECURITY’ VERSUS ‘CYBER CRIMES’, AN EXPLORATORY STUDY WITH SPECIAL REFERENCE TO ITS GROWTH AND ITS IMPACT ON A COMPANY’S PROFITABILITY. Int. j. of Social Science and Economic Research, 8(8), 2438-2452. Retrieved from https://doi.org/10.46609/IJSSER.2023.v08i08.024
Chicago
Talwar, Rishit. "‘CYBER SECURITY’ VERSUS ‘CYBER CRIMES’, AN EXPLORATORY STUDY WITH SPECIAL REFERENCE TO ITS GROWTH AND ITS IMPACT ON A COMPANY’S PROFITABILITY." Int. j. of Social Science and Economic Research 8, no. 8 (August 2023), 2438-2452. Accessed August, 2023. https://doi.org/10.46609/IJSSER.2023.v08i08.024.

References

[1]. Á. Kemendi, P. Michelberger and A. Mesjasz-Lech. "ICT security in businesses - efficiency analysis". Journal of Entrepreneurship and Sustainability Issues. vol. 9. no. 1. pp. 123-149. Sep. 2021. 10.9770/jesi.2021.9.1(8).
[2]. Alansari, M. (2016). On Cyber Crimes and Cyber Security. Research Gate.
[3]. M. Aljuhami and D. M. Bamasoud. "Cyber Threat Intelligence in Risk Management". Jan. 2021.
[4]. J. O. Oyelami and A. M. Kassim. "Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices". Jan. 2020.
[5]. K. A. Memon et al.. "Analyzing distributed denial of service attacks in cloud computing towards the Pakistan information technology industry". Indian Journal of Science and Technology. vol. 13. no. 29. pp. 2062-2072. Aug. 2020. 10.17485/ijst/v13i29.1040.
[6]. K. Veena, K. Meena, Y. Teekaraman and A. Radhakrishnan. " C SVM Classification and KNN Techniques for Cyber Crime Detection". Wireless Communications and Mobile Computing. vol. 2022. pp. 1-9. Jan. 2022. 10.1155/2022/3640017.
[7]. M. Babi? and D. Purkovi?. "A new Systemic Taxonomy of Cyber Criminal activity". Jun. 2020.
[8]. O. T. Suryati and A. Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method". International Journal of Advances in Data and Information Systems. vol. 1. no. 1. pp. 1-8. Apr. 2020. 10.25008/ijadis.v1i1.176.
[9]. R. Sardar and T. Anees. "Web of Things: Security Challenges and Mechanisms". Ieee Access. vol. 9. pp. 31695-31711. Jan. 2021. 10.1109/access.2021.3057655.
[10]. S. S. Alsemairi. "The Role of Digital Technologies in Combating Cyber-Trafficking in Persons Crimes". Dec. 2022.

ABSTRACT:
The paper has attempted to understand the increasing use of educated computer technologists in hacking into computers to extract valuable information. Companies and individuals are working round the clock to enhance cyber security so that they can foil such attempts. With the advancement of artificial intelligence, there seems to be some hope in which these security measures can be adequately enhanced and data secured.

IJSSER is Member of