Show simple item record

AuthorAl-Khater W.A.
AuthorAl-Maadeed, Somaya
AuthorAhmed A.A.
AuthorSadiq A.S.
AuthorKhan M.K.
Available date2022-05-19T10:23:11Z
Publication Date2020
Publication NameIEEE Access
ResourceScopus
Identifierhttp://dx.doi.org/10.1109/ACCESS.2020.3011259
URIhttp://hdl.handle.net/10576/31128
AbstractCybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing, and other forms of cyber hacking. They mostly lead to a privacy breach, security violation, business loss, financial fraud, or damage in public and government properties. Thus, this study intensively reviews cybercrime detection and prevention techniques. It first explores the different types of cybercrimes and discusses their threats against privacy and security in computer systems. Then, it describes the strategies that cybercriminals may utilize in committing these crimes against individuals, organizations, and societies. It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique. Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques.
SponsorThis work was supported by the NPRP from the Qatar National Research Fund (a member of the Qatar Foundation) under the National Priorities Research Program (NPRP) under Grant PRP12S-0312-190332. The statements made herein are solely the responsibility of the authors.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
SubjectComputer privacy
Crime
Network security
Personal computing
Child pornographies
Communication tools
Computer technology
Detection models
Prevention techniques
Privacy and security
Privacy breaches
Security violations
Computer crime
TitleComprehensive review of cybercrime detection techniques
TypeArticle
Pagination137293-137311
Volume Number8


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record