Cyber Police: An Idea for Securing Cyber Space with Unique Identification

α
Md. Baharul Islam
Md. Baharul Islam
σ
Ziaur Rahman
Ziaur Rahman
ρ
A.H. M. Saiful Islam
A.H. M. Saiful Islam
α Daffodil International University

Send Message

To: Author

Cyber Police: An Idea for Securing Cyber Space with Unique Identification

Article Fingerprint

ReserarchID

CSTNWSUN2W2

Cyber Police: An Idea for Securing Cyber Space with Unique Identification Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

References

20 Cites in Article
  1. Olalekan Adeyinka (2008). Internet Attack Methods and Internet Security Technology.
  2. F Amor (2012). Policy Memorandum: Increase Cyber-Security via Internet Governance, Reporting and Awareness Reforms.
  3. Anderson (2012). Defining and Measuring Cyber Crime.
  4. N Aseef (2005). Cyber-Criminal Activity and Analysis.
  5. J Aspnes,J Feigenbaum,M Mitzenmacher,D Parkes (2003). Towards Better Definitions and Measures of Internet Security.
  6. F Cleveland (2008). Cyber Security Issues for Advanced Metering Infrastructure (AMI).
  7. (2013). Cybercrime.
  8. H David (2010). Cybercrime Coming of Age.
  9. C Doyle (2013). Cyber-security: Cyber Crime Protection Security Act.
  10. Göran Ericsson (2010). Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure.
  11. P François (2010). Political Hacking: From Hacktivism to Cyberterrorism.
  12. Fortinet (2013). Cyber criminals Today Mirror Legitimate Business Processes.
  13. K Grzybowski (2012). Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization.
  14. P Guerra (2009). How Economics and Information Security Affects Cyber Crime and What It Means in the Context of a Global Recession.
  15. R Langner,P Pederson (2013). Bound to Fail: Why Cyber Security Risk Cannot Simply Be "Managed" Away.
  16. C Library (2009). Cybercrime: An Annotated Bibliography of Select Foreign-Language Academic Literature.
  17. P Library (2011). Cyber crime: Issues (Background Paper).
  18. I Ponemon (2011). Emerging Issue in Cyber Crime: Case Study Cyber Crime in Indonesia.
  19. G Software (2011). Towards a comprehensive Internet security strategy for SMEs.
  20. B Schaeffer,H Chan,S Ogulnick (2009). Cyber Crime and Cyber Security.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Md. Baharul Islam. 1969. \u201cCyber Police: An Idea for Securing Cyber Space with Unique Identification\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E12): .

Download Citation

Issue Cover
GJCST Volume 13 Issue E12
Pg. 17- 21
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 25322
Total Downloads: 10939
2026 Trends
Related Research

Published Article

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cyber Police: An Idea for Securing Cyber Space with Unique Identification

Ziaur Rahman
Ziaur Rahman
Md. Baharul Islam
Md. Baharul Islam Daffodil International University
A.H. M. Saiful Islam
A.H. M. Saiful Islam

Research Journals