Organised Crime in the Digital Age
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2021, Vol 5, Issue 4
Abstract
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional†organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age. Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta "Organised Crime in the Digital Age" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41185.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41185/organised-crime-in-the-digital-age/dr-s-krishnan
Authors and Affiliations
Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta
Increasing Vulnerability of the user Data at Cyberspace
Cyber Stalking is a burgeoning concept where a person is vigiled by another using electronic media without consent. Using the pragmatic stealthiness of networking tactics, a stalker intrudes into the privacy of the victi...
Energy data collection by survey and its comparison with bill data
In the Implementation of any electrical powergeneration project, the basic requirement is the totalelectrical energy demand estimation. In order to estimatethe total electrical energy demand, various methods canbe used b...
Computational Investigation on the Effect of Fences on Aerodynamic Characteristics of an Aircraft Wing
A computational study, to improve the stall characteristics of wing at high angles of attack, with and without fence configuration is done here. Wing fences, also known as boundary layer fences and potential fences are f...
Child Labour : A Devastating Evil and Measures Taken by Indian Judiciary
Child labour is not a new issue for India. With the increasing population, the problem and issue of Child labour is also increasing. India is the second largest country after Africa which is adversely affected by child l...
Level of Awareness on Climate Change Adaptation of the
The study determined the level of awareness on climate change adaptation of the faculty members, students, and non teaching personnel of the University of Eastern Philippines System. The awareness was measured in terms o...