Monday, July 5, 2010

Cyber Liability Insuranse

I am going to give you some insight about "Cyber Liability Insurance" and how essential it is. As you know almost all the businesses create own web site in order to benefit from advantage of cyber space in their activities,and somehow using Internet became an important and necessary daily activity. In spite of all the obvious benefit of cyber space , businesses face some in this context.
For example If you have Web site content, your company can be targeted for violating copyright or intellectual property laws,or maybe A rogue employee posting on a blog, social media page or discussion forum can make your company liable for slander or defamation. So it is rational to protect yourself against potential threats on the cyber space by using cyber liability insurance . You can get more information on this topic at:

Saturday, July 3, 2010

Data is a Colorful Gold that must be protected

As you know data is considered as raw material which convert to information and then it becomes in a meaningful form that shows something. There are so many businesses that use data for finding hidden needs and new trends in order to build new values into the marker and,so become successful businesses. Thus ,we can say data is very important and valuable resource for businesses,and I call it "Colorful Gold" ,because it could be about anythings , anywhere and any time.
One the other hand data create power as Sergey Brin and Larry Page , co founder of Google ,are the fifth most powerful people in the world according to Forbes magazine .Definitely everyone wants to keep its own valuable things and data (Colorful Gold) is a valuable things that need protection ,especially on the Internet which become as a huge pool of data and information.


References:

Wednesday, June 30, 2010

Advertisement on Cyberspace and Need for Regulation

Advertisement on the Internet is Widely exercised by almost every businesses and they can introduce and sell their product by using Internet.At the same time customer can easily gather information about almost any product and services by just typing the name of products and services on any Internet search Engine.As far as advertisement on th Internet concern there are some issue that must be addressed,for example you can see different ads about Beauty products , Health product ,Sex enhancement and so many other products .

Obviously these products can affect human health and just imagine if and just if these products wouldn't be standard and authorized ,then what would be happen for people who use them.So , I think it is necessary to regulate those Internet ads that related to human health in order to prevent any potential health problem.

Sunday, June 27, 2010

Love in Cyberland

In this post I want to write something about love in cyber space which is quite common these days. As I remember when I was 15 , people use different tools such as mail and phone to contact with their partner ,and in some cases they even used those tools to find a love partner. But in this time Internet dominated all the communication tools and use in many purposes ,especially it is being more used by people to find a partner either for a short or long time. That 's why we can say technology always change the way of finding love partner time to time ,however it creates some issues that must be addressed.
For example ,there are lots of chart rooms and online dating sites that user can find a partner by using them ,they can put their pictures , anthropometric information ,ideas and so on and so far,but the issue is how those information are reliable? Since anyone can put fake information on the Internet to device other people with any intention,you now why ,because this is a cyberland and anything could be unreal ,that's why love in cyberland is riskier than real world.

Friday, June 25, 2010

AMC files Rs 10-cr defamation against Canadian national

I read a news related to defamation today ,and found it useful to share with you.It is about an Indian corporation that filed lawsuit against Canadian activist ,Lisa Warden for putting a video clip on You tube that damaged its reputation.

Lisa Warden,an animal rights activist , criticized Ahmedabad Municipal Corporation (AMC) with putting a video clip that shows how they catch dogs by using Iron tongs . She believed using Iron tongs for catching dogs is dangerous for the dogs,while AMC argue that she crashed out its image .
Personally, I didn't watch this clip and have no idea about dog catching with any tools ,but just imagine that if a member of India's parliament put this video clip on YouTube,anyone couldn't sue him or her and it could be completely legal. I would say poor animals who don't have a parliament to do some benefit for them in any part of the world.

References:

Sunday, June 20, 2010

Kids and Internet

As Internet become main communication and also entertainment tools ,it lures more group of people especially children who naturally have more curiosity to discover new things ,and Internet has plenty of good and bad things for them . So ,there is always concern about bad thing for children on the Internet . According to survey by Symantec lab ,children spent about 11.4 hour per week in 2010 which is 10 percent more than last year that shows children have been absorbed by Internet attractiveness.

According to another study in New Zealand, more than one third of New Zealand children have seen violent and nude image on the Internet ,while New Zealand parent are more concern about their children online habit (84 per cent compared with 71 per cent worldwide).I believe that it is serious concern which needs not only do parents pay attention to their children's online behavior,but also governments have to find an implement a proper solution for overcoming this problem.


References:
Tom G. "Kids easy online targets",Heraldsun.com, www.heraldsun.com.au,June 17, 2010 12:00AM

Harvey S."Kiwi kids see bad images online'',Stuf.co.Nz,www.stuff.co.nz,16 Jun 2010.

Wednesday, June 16, 2010

SMS Blocker

Recently ,I have read some news about SMS blocker which was very new to me and want to share with you.In fact SMS blocker or Blocker is a new technique of scamming based on sending text messages . There are different variations of the attack. Some pop up pornographic pictures and keep them up until you pay; some claim your Windows license is invalid and that you must sent the SMS in order to reactivate it. Some ask for two SMS messages.. Based on researcher in Kaspersky lab there are as many as 500,000 SMS blocker infection each day.
In recent month ,a growing number of SMS blocker attack has been reported specially in eastern Europe and Asia.

References:



Saturday, June 12, 2010

Cyber space and freedom of speech

As you know Internet became dominate communication tools these days ,and definitely, not only it will be used by much more users than now,but also with more innovative application in near future. As a result of Internet attractiveness and accessibility , many people use it for impressing their own ideas in any form,it could be a simple picture ,short video clip ,article ,critic and so on.By the time there is no problem to impress idea ,if there is no violation of other people values. But the Internet is a global platform and when you put your ideas users can access to your ideas around the world,however the issue of censorship in some part of the world maybe denied Internet users access to your ideas if it violated either moral and ethical value or legal and political issues.Now ,an important question must be addressed ;what is the boundaries of freedom of speech on the Internet? The answer couldn't be as short as its question,because there is different religions ,ethics ,legal and political issues in each part of the world,so something could be legal in some part ,while it is considered as a crime in another part .Thus ,freedom of speech on the Internet is an important issue that must be considered for anyone who want to impress own ideas on the Internet.

Saturday, June 5, 2010

Online Fraud :An Obstacle for Economic Activity on th Internet

We live in the twenty first century which marked as dot com age,and in this atmosphere knowledge is a dominant phenomena . Definitely Internet has strongly affected all the business activity and this trend will become more dominant and powerful in the future .
As far as Internet security is concern, cyber crime can be considered as huge obstacle for developing economic activity on the Internet . So ,it is very important to create a safe and convenient condition in order to develop economic activity on the cyber space.

Tuesday, June 1, 2010

Online Scam

We are using Internet for doing many things and benefited from an unlimited and convenient access to the Internet application 24 hours . For example we are confident with Internet banking application and are not worry about thieves and snatchers on the street ,or we are very happy when we compare price of product from different site on the Internet and buy them with using our credit card while we are chatting with our Friend via Yahoo . Despite of all the good thing that we can say about Internet , at the same time it can potentially create many threat for it's users . Criminals use different method in order to reach their goals.

Online frauds ,which is very fast growing global phenomena on the cyber space, cause many Internet users loss their money and even face physical and mental problems. According to ABC news Queensland police have launched a campaign to curb the growing rate of online fraud and wants victims to come forward as part of an international campaign. They found that most of online fraud victims are embarrassed to contact police.
Reference:

Monday, May 31, 2010

25% increase in attempts to infect computers

According to Kaspersky Lab report over 327 million computers were infected worldwide during first quarter of 2010 and It increased 26% compare to previous quarter. The geographical distribution of malicious attack also changed. In the last quarter of 2009 the top three targets were China (31.07%), Russia (9.82%) and India (6.19%). While the number of attacks against Chinese users fell dramatically to 18.05%, whilst those against Russian users rose to 13.18% .Key to these types of attacks is that the exploits are used to take advantage of different vulnerabilities in browsers and plug-ins, as well as PDF viewers. I think that Cybercrime is being fuelled by the spread of the Internet itself combined with ineffective legislation and growing unemployment.
Reference:
http://www.itnewsafrica.com/?p=7819

Thursday, May 27, 2010

Fury over Facebook Murder

I read a news about above title in the sun news paper that is related to facebook and cyberspace issues . The issue became public when a facebook user killed an 18 years old girl who met her attacker on the facebook . The Australian authorities are concerned about growing number of crimes link to Facebook.
Australian police this month warned teenagers to be vigilant about their privacy settings after a man allegedly used a fake Facebook profile to lure 18-year-old Nona Belomesoff to an isolated bushland area and murder her. Police believe Belomesoff's alleged killer preyed on her by using the interests openly listed on her Facebook page to strike up a rapport. The Australian Police warned teenagers to be careful about their privacy settings on the facebook.
Definitely,it was not the last case ,so Facebook users have to be careful about their information and also be aware of who add as friends on the facebook.
Reference:

YouTube and copyright Issues

We use YouTube for watching not only short clips but also sometimes whole part of a movie.As you can find so many number of movie there ,I think by myself ,What about copy right ,"Are all the movies uploaded legally in YouTube in terms of Copy right?" and "who is responsible for this issue?" ,so for finding a proper answer to these questions .
I searched on the internet and found that; YouTube does not view videos before they are posted online, and it is left to copyright holders to issue a takedown notice under the terms of the Digital Millennium Copy Right Act which is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works.
I did it further effort and tried to uploaded a clip on YouTube to test how it could be in terms of copy right issue. That was interesting to me when I saw this message ;

"Do not upload TV shows, music videos or commercials without permission," it says, "unless they consist entirely of content that you created yourself."

So ,it means sharing file in YouTube is and good opportunity ,at the same time it can breach copy right law in many cases .




Friday, May 14, 2010

Google Earth and Privacy Issues

Google earth is a virtual global map and geographical information program that enable users to get useful information about their destination whom they want to go or willing to know about it .For example it is very useful program for travelers who want to know more detailed about the location of hotels ,attractive places ,shopping mall and other places of their destination .

Other than that google earth is a useful program for different group of people who need some geographical information. Like the other programs ,Google earth introduce new version of its program with new application included street view in April 2008,that rise privacy issues over Google earth street view . Google has been sued by many government for street view images ,for instance Switzerland sued Google for Street View images that displaying car license plates and people's faces.Google has also faced backlash over Street View in the United Kingdom, Canada, Greece, and Japan.
References:

Sunday, May 9, 2010

Hacking

I cant remember exactly when and where I hear something about computer hacking which was very unfamiliar to me at that time .Definitely computer hacking or hacking is one the Buzz word in the area of computer and network security which comes with the word hackers.For many ,hacker are talent people who can do everything on the web and should be respected ,on the other hand for some, hacker are criminal and must be treated by the law. In fact hacking ,which is a criminal act ,mostly implemented by talent people who have knowledge and intention for doing that. From cyberlaw point of view hacking is modification of something by someone who is not authorized and eligible to do that,so it is considered as a crime .

Thursday, May 6, 2010

Cyberbullying and Online Harrasment


In this post I want to introduce Cyberbllying or Cyber Harassment which are frequently used interchangeably. Online harassment or “cyberbullying” has been defined as “an overt, intentional act of aggression towards another person online” (Ybarra and Mitchell 2004a: 1308) or a “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices” (Hinduja and Patchin 2009: 5).

Online bullies use a number of technologies, such as instant-messenger (IM), text and multimedia messaging on a cell phone, email, social network sites, and other websites.In fact Cyberbulying is a new way to bother other people by using new technologies ,and based on numbers of researches young people are among people who experienced cyberbulying.
Reference:
Enhancing Child Safety and Online Technology (2008),available at:http://cyber.law.harvard.edu



Tuesday, May 4, 2010

Cyberlaw in Iran

Part I: Definitions

Article 1 - The meaning of law in the following terms are used:

A - Computer system


Any device or set of devices connected hardware is software that through implementation of automated data processing applications to act.

B - Communication Systems

any electronic transfer of information between a source (transmitter, the light source) and a receiver or detector light path through one or more communication protocols by which receptor is understood and interpreted.

C - Computer data


Each symbol of the events, information or concepts in a way favorable for processing in a computer system that includes a program is appropriate and makes the performance of computer systems to implement these steps. Given a financial value.

D - Data content


Each symbol of topics, concepts or instructions, such as text, sound or picture, either during or stored for the communication between computer systems or processing by a person or computer system used by the computer system and to create .

E - Data traffic

Any given by the computer in the communication chain is produced to the communication from source to destination routing and communication, including source, destination, route, time, date, size, duration and type of core services, etc. will be.
And - info (information) Data, text, images, sounds, code, computer programs, software and database or computer is created.

F - Subscribe information

any information available on service provider there and to its member services and communication services, including technical requirements and courses using the service, shared identity, IP address or postal or geographic telephone numbers and other personal details, he is.

G- Service provider

Every natural or juridical person that the user of its services can communicate with computer system provides the computer or data or the service provider rather than communication or its users to process or store.

Part II: Crimes and Punishments

Chapter One

crimes against privacy and data communications and computer systems

Part one - unauthorized access

Article 2

Anyone who intentionally and without authorization, in violation of safeguards data or computer system or communications, access to finds a fine of one million rials to six million Rials or imprisonment of ninety-one days to one year sentence be.

Part two - listening and receiving unauthorized

Article 3

Whoever intentionally and without authorization data in moving non-public in a relationship private, or from one or more computer system or telecommunications or electromagnetic waves, hear or receive a sentence of ninety-one day to one year or pay fine one million to six million Rials Rials will be sentenced.

Part three: crimes against national security

Article 4

Whoever intentionally and without authorization to transfer data in series or in computer or telecommunications system or data carrier that value for internal security or foreign country, the following acts committed crimes will be sentenced under :

A -data subject access to material or study them from one to three years imprisonment and fine of up to ten million rials hundred million rials

B-Putting these data available to persons unqualified access to imprisonment from two to ten years

C- revealing and putting these data available to the government, organization, company, or group of foreign powers or their agents to imprisonment from five to fifteen years

Note :

1-series data, data that expose them to national security or harm to national interests.

2-Regulations on series data and how they classify will provide in three months from the date of adoption of this law by the Justice Department and in cooperation with the ministries of the country, information, communications and information technology and defense forces supported.

Reference:

http://www.iranictnews.ir/

Sunday, May 2, 2010

Cyberlaw case in Hyderabad

Software expert tried to take revenge against a women, who turned down his marriage proposal, falls into cyber crime cell net. Engineer had put obscene profiles of the victim on various networking sites like Facebook and Orkut and also sent letter through post containing morphed pictures of the girl, with written message in Telgu, which formed thebasic evidence and led to his arrest by Hyderabad Police.
Definitely this is Cybercrime case and must be treated according to cyber law . This is a good exapmple of Cycercrime against person.

Friday, April 30, 2010

Public Key Infrastructure

Rcently, the Internet has been spread all over the world and it has used to be an infrastructure of e-commerce. However, there are several security problems on networks.The Public Key Infrastructure or PKI was initially developed in 1977 ,and it is powerful and widely use technology and can be considered as a good solution to the Internet security problems,however Most consumers didn't realized it, even when using it .
What is PKI?
IT is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates which shows identity of each domain.In other word PKI respective user identities by means of a certificate authority (CA).The primary role of the CA is to publish the key bound to a given user. In fact CA is an entity that issues digital certificates for use by other parties .





Wednesday, April 28, 2010

Digital Property Right

In this post I want to write a Little bite a bout digital property right which is very important for online business. Much like reale properly right ,digital property supported by three basic mechanisms.Patent law is concentrate on producing or reproducing a new digital inventions and support inventors right .Copyright addresses the right to publish or duplicate expressions of ideas .Trademark is concerned with word or images used to identify products in the market. However the boundaries between them have been modified by legislation an courts. For better understanding of digital property right
Advertising rights. In the physical world, a property owner can earn revenue by selling advertising space on billboards, marquees, kiosks, signposts, even wall space. Likewise, the Internet is ripe with opportunities for enterprising individuals and businesses to target potential clients through advertising on websites, message boards, 3-D virtual environments, and other online real estate space.
Mining rights. Similar to a landowner in the physical world offering the rights to minerals and other natural resources that exist on a parcel of land, online real estate frequently contains underlying resources that can make it extraordinarily valuable. In the context of online property, these resources exist in the form of data. Data can be mined from online property in a number of ways that can be beneficial to business interests, academic researchers, the medical community, and many other professional fields.
Application rights. A property owner in the physical world can make arrangements with businesses to operate valuable equipment on a piece of real property. Software applications in the digital world can be thought of like physical equipment. The rights to operate applications in an online space can add value to the online property and create significant business opportunities for the applications’ owners.


Utility rights. Utilities associated with real property are the “tools” that make the property useful and productive – electricity, water lines, and telecommunications lines among them. The digital world has its utilities as well. Discreet software functions, such as file converters, calculators, voice over Internet protocol (VoIP), and defragmentation programs, among others, form a digital “tool belt” that can help make online real estate space more valuable and productive. The opportunity to supply digital utilities to online property spaces represents real revenue potential for software developers.
Service rights. The need for third-party contractors to offer services to support business ventures exists in the digital world just as it does in the physical world. Many online real estate spaces will benefit from access to services like data backup, printing and publishing, and network administration. Providing these services in the online environment represents an excellent revenue stream that is ready to be tapped by entrepreneurs in the digital world.


Commerce rights. The exchange of good and services for money are the basics of commerce in both the physical world and the digital world. In online real estate spaces, enterprising business owners will have the ability to earn profits by placing such things as pay-per-view content (including audio, video, graphics and text files) and vending portals within easy access of visitors to those online environments.
“Flow” rights. Landowners in the physical world also hold certain rights to those things that flow through their real property – natural resources such as water, petroleum, and natural gas. The digital world sees similar “flows” of resources from one online space to another. These resources include data, information, user traffic, and monetary funds. The ability to monitor or even control or regulate these flows of digital resources can be valuable to properly-equipped businesses, and many online real estate owners will be eager to work with those who can offer the tools to tap into these flows.
References:
http://digitalpropertyregistry.org/DigitalRightsDefined.html

A Cyberlaw Case: Man who Erases Facebook Data After Threat of Suit

Pete Warden, a British immigrant and entrepreneurial software engineer who blogs under “PeteSearch,” ostensibly destroyed his database showing regional patterns among 210 million Facebook users when the social networking site accused him of misusing the site according to its terms of use and threatened him with a lawsuit.


According to the man’s blog, Pete Warden of Boulder, Colorado, said he had planned to give the data to social science researchers. Facebook maintained that Warden gathered the data in contravention to its terms of use. In response, Warden says he has now destroyed the data, heading off a potential lawsuit he reportedly wasn’t entirely convinced was legal.




After I read this case two things comes in mind , the first point is mainly related to social network and information security, this guy wasn't the first person who collected information from Facebook and other social networks and definitely couldn't be the last one ,so there is always potential risk that people misuse such information that they collected illegally from social networks.Thus social networks users have to be aware of such potential threat and don't share important information on these networks.


Second point is related to Cybele issues ,I believed that this case must trial based on Cyberlaw ,because he violated Term of use of the Facebook as a user ,whether or not this guy didn't have any wrong intention from collecting that information.
Reference:
Man who erases Face book data....,http//www.exmainer,com






Tuesday, April 27, 2010

Online transaction,has it more benefits or chalanges?

Online transactions widely adopted by customers which enable them to benefit from online purchasing .While this trends become more popular and so many business build or change their business plan based on Internet and online transactions,both business and customer face some critical challenges in this way. There is no doubt that online transactions have important benefits for both parties ,however the identity theft or credit card fraud can be considered as main obstacle for developing online transactions.
According to survey By Tim Wilson Dark and Reading More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims. Based on the survey about 44 percent of respondent said they had suffered from bank or credit card fraud and average amount of stolen was $3000 per person.
Now what do you think about online transactions ? Do you prefer traditional or online transaction ? please make your answers or comments about these questions.
Reference:
Wilson T,Reading D.(April ,2010)More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims,http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=224600470

Monday, April 26, 2010

Footbal and cybercrime

Yes this in my topic in this post ;Football and cybercrime ,maybe you think that there is no relationship between them,but I tell you there is. These days Internet application increases ,and many Internet users doing their works via the Internet from buying books from the Amazon or buying ticket for a football mach .Now you see the relationship,as online ticketing for football match become more popular , it's create another area of cyber crime ,especially for the important event such as FIFA world cup 2010 that so many football fans want to catch tickets of their national team matches . According to Walter Tapfumanei, communication officer, Africa Agency for ICT Development.

"The problem is that so many people are competing for tickets to the World Cup. In the process, many of them are getting swindled through phishing and fake online promotions for tickets to the event."

In 2009 South Africa was at number 50 on the list of countries where most attacks took place and has jumped 7 places to number 43 in 2010 which is mainly due to FIFA world cup effects. This is not the end of story ,I 'm sure that it will become more popular in the future that many football fans loose their money in this way.So,it is important for both issuers and buyers of online tickets to be aware of fraud activities on the Internet.


Reference:


Online bookings spur cybercrime in South Africa,http://news.idg.no/cw/art.cfm?id=F8BA8D87-1A64-6A71-CEF65DDE92D103F4

Saturday, April 24, 2010

Zeos ,The Most Prevalant Financial Malware

Zeos also knows as Zbot infects PCs, waits for the user to log onto a list of targeted banks and financial institutions, and then steals their credentials which are sent to a remote server in real time. It can modify genuine web page from bank's server to ask for personal information such as payment card number and PIN.

Ironically .Most antivirus was unable to detect zeos , based on study conducted in US and UK in 2009. The new version of Zeos (known as Zeos 2) targeted Internet explorer and FireFox browsers and use complicated methods to avoid antivirus detection.

Zeos which affected PCs for the first in 2006,it is still considered as one of the dangerous Pisces of malware on the Internet.

Wednesday, April 21, 2010

What is zombie computer ?

A zombie computer refers to a computer that connect to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user. Hacker can use zombie computer in many ways, for example Zombies can be used to conduct distributed denial of service attacks or to send spam email.

Furthermore hackers have full access to data on a zombie computer ,and they can copy ,corrupt change or even delete entire of hard copy .Also they can install a software on a zombie computer which help them to get the user name, password , and even financial information such as credit card number and bank account.Hacker can use this information to commit fraud.

Tuesday, April 20, 2010

Online Banking Fraud

As Online Banking became more popular and the Banks perused their customers to do that ,the number of online banking fraud increase enormously. For example in UK,According to UK Payment Association the number of online banking fraud doubled in the last two years which is mainly due to criminals use more sophisticated method to gain access to customers account information.
Criminals are using a variety of methods -- including database hacks, brute forcing and phishing - to get login credentials from non-financial websites, such as social networking sites and Web-based email services.
Many online bank customers use their ID and password for other web sites which are not as secure as bank's web site that enable criminals to get information form those sites and use them for accessing to customers bank account. So ,an important suggestion for online banking users could be : Never use your online banking ID and password for other websites

Friday, April 16, 2010

Financial and cyber crime most prevalent economic crime in Malaysia

This is the last news about cybercrime in malaysia :

"KUALA LUMPUR, April 13 (Bernama) -- Financial and cyber crimes were among the most prevalent economic crimes commited in Malaysia, says Honorary Group Chairperson of International Cybercrime and Forensics Examiner (ICFE) Group of Companies, Tommy Seah."

As I mentioned in the previous post ,the number of cybercrime cases increases,it is mainly due to increases of online application especially in business area and social networking and lack of knowledge about computer crimes and corresponding issues among Internet users.In the case of Malaysia ,as country that want to be attractive for foreign investors,it is crucial to raise level of knowledge about cybercrime in both public and private sectors . One way to achieve this goal could be developing knowledge of students by putting at least one subject in school curriculum about Internet security,cyberlaw and related issues. Furthermore ,both public and private sectors must train their employees in order to keep customers information from misusing by intruders in the cyber space . In a short , developing skills and knowledge of Internet users could be an importnt step in order to reduce number of cybercrime cases .
Refrence:

Tuesday, April 13, 2010

Need for Inernational Organization on Cybercrime

Cyberspace is very important tools not only for business,education,government and so on ,but also it is very fascinating environment for those who tends to do something against the law for any reason.While the number of Internet users increased drastically by 399% from 360,985,492 at the end of year 2000 to 1,802,330,457 in December 2009(1), at the same time number of cybercrime cases increased too.Definitely,Internet users and application increase further and computer crime also become an important issue .Thus Constitution of an international organization on cyberlaw could be an important step toward improvment of internet security and development.




Refrences:


1.World Internet Users and Population Stats :www.internetworldstats.com/stats.htm

Followers