Comprehensive review of cybercrime detection techniques
Author | Al-Khater W.A. |
Author | Al-Maadeed, Somaya |
Author | Ahmed A.A. |
Author | Sadiq A.S. |
Author | Khan M.K. |
Available date | 2022-05-19T10:23:11Z |
Publication Date | 2020 |
Publication Name | IEEE Access |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1109/ACCESS.2020.3011259 |
Abstract | Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing, and other forms of cyber hacking. They mostly lead to a privacy breach, security violation, business loss, financial fraud, or damage in public and government properties. Thus, this study intensively reviews cybercrime detection and prevention techniques. It first explores the different types of cybercrimes and discusses their threats against privacy and security in computer systems. Then, it describes the strategies that cybercriminals may utilize in committing these crimes against individuals, organizations, and societies. It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique. Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques. |
Sponsor | This work was supported by the NPRP from the Qatar National Research Fund (a member of the Qatar Foundation) under the National Priorities Research Program (NPRP) under Grant PRP12S-0312-190332. The statements made herein are solely the responsibility of the authors. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Computer privacy Crime Network security Personal computing Child pornographies Communication tools Computer technology Detection models Prevention techniques Privacy and security Privacy breaches Security violations Computer crime |
Type | Article |
Pagination | 137293-137311 |
Volume Number | 8 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2427 items ]