{"title":"网络犯罪:一个多方面的问题","authors":"Mitali Aryan","doi":"10.59126/v1i3a6","DOIUrl":null,"url":null,"abstract":"Cybercrime has caused widespread damage to personalities, companies, including the city council. Computers have unleashed an era of greater efficiency and creativity. Communication and connectivity have reached new heights in the last twenty years. The Internet started a new revolution, the online revolution. As the masses are accustomed and inclined to their daily activities online, most are looking for easy money and information. This criterion represents modern criminals who, in addition to the availability of extensive equipment to access almost all systems, enjoy the anonymity of boundless cyberspace and therefore take human error and system vulnerabilities for granted. The batch consists of these cyber criminals, malicious hackers, malicious hackers, and spammers. This paper attempts to understand cybercrime on a long continuum, starting with the doctrinal research method part. Research and analysis of the world's leading cybersecurity companies were integrated. Without delving into the actual instruments of manipulation, an attempt was made to visualize all progress as a series of activities.","PeriodicalId":424180,"journal":{"name":"THE JOURNAL OF UNIQUE LAWS AND STUDENTS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CYBERCRIME: A MULTIFACETED ONE\",\"authors\":\"Mitali Aryan\",\"doi\":\"10.59126/v1i3a6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cybercrime has caused widespread damage to personalities, companies, including the city council. Computers have unleashed an era of greater efficiency and creativity. Communication and connectivity have reached new heights in the last twenty years. The Internet started a new revolution, the online revolution. As the masses are accustomed and inclined to their daily activities online, most are looking for easy money and information. This criterion represents modern criminals who, in addition to the availability of extensive equipment to access almost all systems, enjoy the anonymity of boundless cyberspace and therefore take human error and system vulnerabilities for granted. The batch consists of these cyber criminals, malicious hackers, malicious hackers, and spammers. This paper attempts to understand cybercrime on a long continuum, starting with the doctrinal research method part. Research and analysis of the world's leading cybersecurity companies were integrated. Without delving into the actual instruments of manipulation, an attempt was made to visualize all progress as a series of activities.\",\"PeriodicalId\":424180,\"journal\":{\"name\":\"THE JOURNAL OF UNIQUE LAWS AND STUDENTS\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"THE JOURNAL OF UNIQUE LAWS AND STUDENTS\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.59126/v1i3a6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"THE JOURNAL OF UNIQUE LAWS AND STUDENTS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59126/v1i3a6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cybercrime has caused widespread damage to personalities, companies, including the city council. Computers have unleashed an era of greater efficiency and creativity. Communication and connectivity have reached new heights in the last twenty years. The Internet started a new revolution, the online revolution. As the masses are accustomed and inclined to their daily activities online, most are looking for easy money and information. This criterion represents modern criminals who, in addition to the availability of extensive equipment to access almost all systems, enjoy the anonymity of boundless cyberspace and therefore take human error and system vulnerabilities for granted. The batch consists of these cyber criminals, malicious hackers, malicious hackers, and spammers. This paper attempts to understand cybercrime on a long continuum, starting with the doctrinal research method part. Research and analysis of the world's leading cybersecurity companies were integrated. Without delving into the actual instruments of manipulation, an attempt was made to visualize all progress as a series of activities.