Cyber Crime and Its Entext

1
Aadesh Taneja
Aadesh Taneja

Send Message

To: Author

GJCST Volume 23 Issue E1

Article Fingerprint

ReserarchID

CSTNWSL1E7W

Cyber Crime and Its Entext Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Any crime that uses a computer or network is considered a cybercrime, sometimes known as computer crime. People and businesses are exposed to the expanding hazards of cybercrime as a result of their increased reliance on technology. Nowadays, it’s pretty typical for us to use computers for our daily tasks. For instance, we use personal computers, smart phones, public surfing areas, and other devices to pay our life insurance premiums, electricity bills, reserve aircraft, train, or bus tickets, order books, and so forth. Since then, the number of people conducting business online has grown quickly due to the ease it offers the user to conduct business without being physically present in the region where the transaction takes place. Along with the rise in cybercrime, there are also an increasing number of users doing online transactions. Online users must be aware of these types of attacks and exercise caution when conducting online transactions due to the rise in cyber attacks. In this context, the paper will review the growth of cybercrimes in India and measures taken by the government of India to combat the cybercrimes.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Aadesh Taneja. 2026. \u201cCyber Crime and Its Entext\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 23 (GJCST Volume 23 Issue E1): .

Download Citation

Cyber Crime and Its Extent - Analysis of internet security, cyber threats, and prevention methods showcased in academic research studies.
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: DDC Code: 363.25968 LCC Code: HV8079.C65
Version of record

v1.2

Issue date

August 1, 2023

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 2126
Total Downloads: 22
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Any crime that uses a computer or network is considered a cybercrime, sometimes known as computer crime. People and businesses are exposed to the expanding hazards of cybercrime as a result of their increased reliance on technology. Nowadays, it’s pretty typical for us to use computers for our daily tasks. For instance, we use personal computers, smart phones, public surfing areas, and other devices to pay our life insurance premiums, electricity bills, reserve aircraft, train, or bus tickets, order books, and so forth. Since then, the number of people conducting business online has grown quickly due to the ease it offers the user to conduct business without being physically present in the region where the transaction takes place. Along with the rise in cybercrime, there are also an increasing number of users doing online transactions. Online users must be aware of these types of attacks and exercise caution when conducting online transactions due to the rise in cyber attacks. In this context, the paper will review the growth of cybercrimes in India and measures taken by the government of India to combat the cybercrimes.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cyber Crime and Its Entext

Aadesh Taneja
Aadesh Taneja

Research Journals