By N. Kshetri

ISBN-10: 1137021942

ISBN-13: 9781137021946

ISBN-10: 1349437751

ISBN-13: 9781349437757

ISBN-10: 1691731781

ISBN-13: 9781691731787

Integrating theories from quite a lot of disciplines, Nir Kshetri compares the styles, features and procedures of cybercrime actions in significant areas and economies within the international South reminiscent of China, India, the previous moment international economies, Latin the USA and the Caribbean, Sub-Saharan Africa and heart East and North Africa.

Show description

Read or Download Cybercrime and Cybersecurity in the Global South PDF

Similar security & encryption books

IPsec Virtual Private Network Fundamentals - download pdf or read online

An creation to designing and configuring Cisco IPsec VPNsUnderstand the fundamentals of the IPsec protocol and research implementation most sensible practicesStudy up to date IPsec layout, incorporating present Cisco options within the safeguard and VPN marketplaceLearn how you can steer clear of universal pitfalls concerning IPsec deploymentReinforce conception with case reviews, configuration examples exhibiting how IPsec maps to real-world solutionsIPsec digital deepest community basics offers a easy operating wisdom of IPsec on a number of Cisco routing and switching systems.

Public-Key Cryptography: State of the Art and Future by Thomas Beth, Markus Frisch, Gustavus J. Simmons PDF

This record at the cutting-edge and destiny instructions of public-key cryptography is released in keeping with the phrases of reference of the eu Institute for method safety (EISS). The EISS used to be based in 1988 through cupboard answer of the kingdom govt of Baden-W}rttemberg and its uncomplicated activity is medical learn and information move within the box of defense in telecommunications and computing device and data platforms.

Read e-book online Digital Audio Watermarking Techniques and Technologies: PDF

"Digital audio watermarking has been proposed as a brand new and replacement option to implement highbrow estate rights and guard electronic audio from tampering. electronic Audio Watermarking recommendations and applied sciences: functions and Benchmarks is a accomplished compilation of the key theoretical frameworks, learn findings, and sensible purposes.

Download e-book for kindle: Keep Your Kids Safe on the Internet by Simon Johnson

Defend your kids from risks that lurk on the net. discover ways to establish the true threats--be they pedophiles, cyber-stalkers, hackers, spy ware, viruses, or adware--and formulate a good safety plan. opt for the simplest software program on your wishes and your funds from the book’s self reliant evaluate of firewalls, net filters, anti-virus items, and extra.

Additional resources for Cybercrime and Cybersecurity in the Global South

Example text

4 terabytes of sensitive data (Wrenn, 2012). Scotland Yard reportedly received intelligence that South American and Eastern European organized crime groups were planning a crime blitz during the Olympic Games. In the same vein, a survey conducted by Telus and the Rotman School of Management indicated that 22 per cent of Canadian businesses reported losses of laptops or mobile devices in 2011 (Tossell, 2012). While many stolen cellphones are sold, bartered, traded or exchanged, with local merchants or via websites such as eBay, Amazon, and Craigslist (Kerr, 2012), a significant proportion of cellphones stolen from the United States, Western Europe and other economies are often exported to China, Latin America, Africa and Easter European economies and sold on the black market (Rogers, 2012; Winkler, 2012).

Many GS economies have leveraged on mobile broadband to provide highspeed Internet services to previously unconnected areas. In Africa, for instance, mobile-broadband penetration in 2011 had reached 4 per cent compared with less than 1 per cent for fixed-broadband penetration. While Internet users in the GN often use mobile-broadband networks in addition to a fixed broadband, mobile broadband is usually the only access method for most people in the GS. 4. Diffusion of cloud computing and cybercrime Cloud computing, which is likened and equated to the Industrial Revolution in terms of technological innovations, structural change and the sources of economic growth, has started to transform economic activities in the GS.

A useful example is the botnet kit called “Aldi Bot”, which was first available for sale in September 2011 in underground electronic forums for US$7. A customer of the kit can reportedly use a botnet to perform largescale cyberattacks (Liebowitz, 2011). It is also important to consider the ease with which a cybercrime can be committed or can be hidden. For instance, according to a report from Verizon, only 8 per cent of cyberattacks required advanced computer skills to be carried out (Rooney, 2011).

Download PDF sample

Cybercrime and Cybersecurity in the Global South by N. Kshetri


by Thomas
4.0

Rated 4.10 of 5 – based on 20 votes