A Comprehensive Review of Cyber Terrorism in the Current Scenario

被引:0
|
作者
Vats, Prashant
机构
来源
2016 2ND IEEE INTERNATIONAL INNOVATIVE APPLICATIONS OF COMPUTATIONAL INTELLIGENCE ON POWER, ENERGY AND CONTROLS WITH THEIR IMPACT ON HUMANITY (CIPECH) | 2016年
关键词
Cyber Terrorism; Internet; Denial of Service (DOS); Electronic Surveillance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research paper we have discussed about the phenomenon of Cyber terrorism and its growing impact in the current scenario. We have reviewed the laws and acts in various countries like US, UK, Canada, Australia and in India. We have also tried to review the Cyber terrorism from the aspect of the Indian IT Act 2000. We have carried out a comparative review of the various laws made by these individual countries to deal with the Cyber Terrorism. In the end we have concluded that The existing laws in various countries are not efficient to restrain the cyber crimes and, thus urging a need for implementing modifications through which these activities can be prevented. There is a need of international cooperation of nations to crack down the efficiency on the cyber crime.
引用
收藏
页码:277 / 281
页数:5
相关论文
共 50 条
  • [31] Research communities in cyber security: A comprehensive literature review
    Katsikeas, Sotirios
    Johnson, Pontus
    Ekstedt, Mathias
    Lagerstrom, Robert
    COMPUTER SCIENCE REVIEW, 2021, 42
  • [32] Perspectives on Terrorism, Culture, and Globalization: A Comprehensive Review of the Contemporary Scholarship
    Ivanova, Aleksandra G.
    Burganova, Inna N.
    Sheshukova, Galina V.
    TARIH KULTUR VE SANAT ARASTIRMALARI DERGISI-JOURNAL OF HISTORY CULTURE AND ART RESEARCH, 2020, 9 (01): : 182 - 194
  • [33] International Cooperation in Cyber Space to combat Cyber crime and terrorism
    Chaturvedi, Manmohan
    Unal, Aynur
    Aggarwal, Preeti
    Bahl, Shilpa
    Malik, Sapna
    2014 IEEE CONFERENCE ON NORBERT WIENER IN THE 21ST CENTURY (21CW), 2014,
  • [34] Diabetes and current Indian scenario: A narrative review
    Muralidharan, Shrikanth
    JOURNAL OF DIABETOLOGY, 2024, 15 (01) : 12 - 17
  • [35] The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India
    Kumar, Poonam
    Mittal, Saurabh
    INTERNATIONAL JOURNAL OF TECHNOETHICS, 2012, 3 (01) : 43 - 52
  • [36] Zika virus - emergence, evolution, pathology, diagnosis, and control: current global scenario and future perspectives - a comprehensive review
    Singh, Raj Kumar
    Dhama, Kuldeep
    Malik, Yashpal Singh
    Ramakrishnan, Muthannan Andavar
    Karthik, Kumaragurubaran
    Tiwari, Ruchi
    Saurabh, Sharad
    Sachan, Swati
    Joshi, Sunil Kumar
    VETERINARY QUARTERLY, 2016, 36 (03) : 150 - 175
  • [37] Initiatives in the fight against cyber terrorism
    Tolan, K
    CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 247 - 265
  • [38] Development of Cyber Theater and Cyber Theater Scenario Language
    Matsuda, H
    Morita, T
    Shindo, Y
    3RD IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2003, : 330 - 331
  • [39] Cyber Terrorism: A New Dimension in Battlespace
    Charvat, J. P. I. A. G.
    THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 77 - 87
  • [40] Cyber terrorism: A homogenized taxonomy and definition
    Plotnek, Jordan J.
    Slay, Jill
    COMPUTERS & SECURITY, 2021, 102