Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer systems, i.e., malware, viruses, bots and other forms of complicated attacks or threats, to breach considerable organizations. Those threats could be for various goals, such as financial revenue, disruption of business, or political trend. The situation used by the cybercriminals is to attack diverse organizations and multiple targets for raising the likelihood ratio of success. It could be spread the viruses and malware programs that designed on daily basis. The influence of cybercrimes in business is shown in this paper by surveying some studies which were conducted in some countries.

Ali, L. (2019). Cyber Crimes-A Constant Threat For The Business Sectors And Its Growth (A Study Of The Online Banking Sectors In GCC). The Journal of Developing Areas, 53(1).
Bressler, M. S. (2009). The impact of crime on business: A model for prevention, detection & remedy. Journal of management and Marketing Research, 2(1), 12-20.
Burrows, J., & Hopkins, M. (2005) Business and crime in Tilley, N. (2005) (Ed.) Handbook of crime prevention and community safety. Devon, Willan Publishing.
Caravelli, J., & Jones, N. (2019). Cyber Security: Threats and Responses for Government and Business. ABC-CLIO.
Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security (pp. 63-72). Springer Berlin Heidelberg.
Chowdhry, D. G., Verma, R., & Mathur, M. (Eds.). (2020). The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. CRC Press.
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165.
Fahlevi, M., Saparudin, M., Maemunah, S., Irma, D., & Ekhsan, M. (2019). Cybercrime Business Digital in Indonesia. In E3S Web of Conferences (Vol. 125, p. 21001). EDP Sciences.
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113-122.
Levi, M., Morgan, J., & Burrows, J. (2003). Enhancing Business Crime Reduction: UK Directors' Responsibilities to Review the Impact of Crime on Business. Security Journal, 16(4), 7-27.
Levisohn, B. (2009). Experts Say Fraud Likely to Rise. Business Week Online [serial online].
January 12, 2009: 14-14. Available from: Business Source Complete, Ipswich, MA. Accessed February 18.
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.
Mirkovic, J., Dietrich, S., Dittrich, D., & Reiher, P. (2004). “Internet Denial of Service Attack and Defense Mechanisms”. Pearson Education: The Radia Pertman Series in Computer Networking and Security. Retrieved from January 13, 2017, https://books.google.com/books?isbn=0132704544.
Ndeda, L. A., & Odoyo, C. O. (2019). CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT. GSJ, 7(9).
Nwekpa, K. C., Ezezue, B. O., & Ibeme, C. C. N. P. N. Effect of Cybercrime on Performance of e-business in konga. com.
Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Computer Law & Security Review, 21(5), 408-414.
Ponemon Institute. (2012). The Impact of Cybercrime on Business. Studies of IT Practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved January 7, 2017, from https://www.ponemon.org/local/.../Impact_of_Cybercrime_on_Business_FINAL.pdf
Renu, P. (2019). Impact of Cyber Crime: Issues and Challenges.
Sakban, A., Kasmawati, A., & Tahir, H. (2020). The role of Indonesian National Cyber Bureau in monitoring mining business companies. In IOP Conference Series: Earth and Environmental Science (Vol. 413, No. 1, p. 012032). IOP Publishing.
Schiller, C., & Binkley, J. R. (2011). Botnets: The killer web applications. Syngress.
Shar, L. K., & Tan, H. B. K. (2013). Defeating SQL injection. Computer, 46(3), 69-77.
Shui, Y. (2013). “Distributed Denial of Service Attack and Defense.” Chapter 1, p. 1-5. Springer Brief in Computer Science. Springer.com: Google Books Online. Retrieved from January 10, 2017, https://books.google.com.tr/books?isbn=1461494915.
Sofaer, A. D., & Goodman, S. E. (2001). Cyber crime and security. The transnational dimension. The transnational dimension of cyber crime and terrorism, 1-34.
Stallings, W. (2014). Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice. Pearson Higher Ed.
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE transactions on parallel and distributed systems, 25(2), 447-456.
Putte, V. D., & Verhelst, M. (2014). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers?. Journal of business continuity & emergency planning, 7(2), 126-137.

In-Text Citation: (Mostafa, 2022)
To Cite this Article: Mostafa, A. A. N. (2022). Cyber Crime in Business: Review Paper. International Journal of Academic Research in Business and Social Sciences. 12(6), 962– 972.