By N. Kshetri

Integrating theories from a variety of disciplines, Nir Kshetri compares the styles, features and methods of cybercrime actions in significant areas and economies within the international South comparable to China, India, the previous moment global economies, Latin the United States and the Caribbean, Sub-Saharan Africa and center East and North Africa.

Show description

Read Online or Download Cybercrime and Cybersecurity in the Global South PDF

Similar security & encryption books

Internet and Wireless Security

Many agencies are remodeling their companies in the course of the improvement of knowledge and communications applied sciences. the safety of this e-commerce is now a key enabler for companies and this ebook provides an outline of present and destiny infrastructures for e-business together with XML protection mechanisms and subsequent iteration Public Key Infrastructures (PKI), in addition to electronic archiving and instant defense that is set to be an incredible development zone with the entire rollout of 3G cellular networks.

CompTIA Security+ SYO-201 Cert Guide

CompTIA® safety+ SY0-201 Cert advisor   David L. Prowse   DVD positive factors entire perform examination   grasp each subject on CompTIA’s new safety+ SY0-201 examination. verify your wisdom and concentration your studying. Get the sensible place of work wisdom you wish!   Start-to-finish safeguard+ SY0-201 coaching from desktop safeguard advisor, safeguard+ coach, and writer David L.

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

The one whole advisor to designing, enforcing, and assisting state of the art certificate-based id suggestions with PKI   Layered procedure is designed to assist readers with generally different backgrounds quick examine what they should understand Covers the complete PKI undertaking lifecycle, making advanced PKI architectures easy to appreciate and set up Brings jointly idea and perform, together with on-the-ground implementers' wisdom, insights, top practices, layout offerings, and troubleshooting information    PKI exposed brings jointly the entire suggestions IT and protection execs have to observe PKI in any atmosphere, irrespective of how complicated or refined.

CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001

Arrange your self for the latest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) research advisor presents a hundred% assurance of all examination targets for the hot CSA+ certification. The CSA+ certification validates a candidate's talents to configure and use danger detection instruments, practice information research, determine vulnerabilities with a objective of securing and conserving corporations platforms.

Extra info for Cybercrime and Cybersecurity in the Global South

Example text

In this regard, it is worth noting that according to Kaspersky Lab, in 2010Q1, Facebook was the No. 4 most targeted site by phishers, after PayPal, eBay and HSBC (Richmond, 2010). The explosion of SM has posed fundamental security and privacy challenges in the GN as well as in the GS. SM have attracted various actors that engage in illegal, extra-legal and criminal activities (Kshetri, 2011c). 0 and social networking sites (Kshetri, 2010b). Cybercrimes associated with SM are not limited to hardcore criminals.

While most of the discussion and debate about mobile cybercrimes have been centred around malware, such crimes are not only—not even primarily—about malware. Mobile devices are vulnerable to a host of risks and threats unrelated to malware. Indeed, mobile cybercrimes involving social engineering skills are increasing. Mobile users are reported to be victims of an SMS text scam involving fake lotteries and sweepstakes, which trick the recipients to send personal information including bank account details.

A rapid rise in cybercrimes associated with these economies has increased the importance of developing a supply of highly skilled human resources to deal with this problem. Likewise, GS economies’ technology-related factors such as low investment in R & D and low rate of adoption of cybersecurity-related technology explain these economies’ poor orientation to cybersecurity. They also have a tendency to use low-cost technologies, which are more prone to cyberthreats. Cybercrime and Cybersecurity in the Global South 19 Some GS-based manufacturers and retailers use counterfeit software to reduce the costs of machines (Chapter 4).

Download PDF sample

Rated 4.10 of 5 – based on 14 votes