0% found this document useful (0 votes)
256 views

Schematic Diagram: Awareness in Cybecrime

This schematic diagram summarizes research from various sources on the topics of threats, risks, and dangers associated with engaging in the cyber world. It maps out key concepts such as scenarios involving threats in the digital world, types of cybercrimes, cases of identities being threatened in the cyber world, the increasing threats posed by malicious software, awareness of cybercrime, and anti-cybercrime initiatives and laws in different countries. The diagram visually connects these concepts and their relationships based on information from multiple studies, reports, and news articles from 2000 to 2008.

Uploaded by

Anthony
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views

Schematic Diagram: Awareness in Cybecrime

This schematic diagram summarizes research from various sources on the topics of threats, risks, and dangers associated with engaging in the cyber world. It maps out key concepts such as scenarios involving threats in the digital world, types of cybercrimes, cases of identities being threatened in the cyber world, the increasing threats posed by malicious software, awareness of cybercrime, and anti-cybercrime initiatives and laws in different countries. The diagram visually connects these concepts and their relationships based on information from multiple studies, reports, and news articles from 2000 to 2008.

Uploaded by

Anthony
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Schematic Diagram

safekids.com (2007) cs.auckland.ac.nz (2008)


Aparte (2007)

Scenario in cyberworld Teens are prone with web Risks and dangers in
engaging threats threats utilizing Internet

stmargaretssec.moe.edu.sg
louisville.sparcc.org (2008) netsmartz.org (2008)
(2008)
There are risks in too much
There are threats across 2007 report of US students
exposing of personal
places in digital world engaging in the cyberworld
information in the internet

Carter (2002) Robertson (2008) Fontelera (2008)


Forms of threats in Users underestimate the Sufficient password
cybercrimes growing threats protection against threats

Mandal (2008) Carey (2008)

Cybercrime in the Cases in the cyberworld


modern society engaging to identity
threats

Field (2007) geek.com team (2000) Ferguson (2007)


Linking to top dangerous Scenario in embracing Threats are increasing
websites dangerous website posed by malicious
software

Sharma (2007) arabtimesonline.com (2008)

Awareness in Cybercrime law in other


cybecrime country Harsh (2008)

IT Act initiative in other


country

Oliva (2008)
Regalado (2007) infotech.indiatimes.com
(2008)
Cybercrime bill in the Anti cybercrime initiatives
Growth of internet users
Philippines and cooperations with
opens the chances of
local and other country
threats

Figure 1
9

You might also like