版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、 Procedia Economics and Finance 32 ( 2015 ) 618 – 621 2212-5671 © 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/license
2、s/by-nc-nd/4.0/). Selection and peer-review under responsibility of Asociatia Grupul Roman de Cercetari in Finante Corporatiste doi: 10.1016/S2212-5671(15)01440-9 ScienceDirectAvailable online at www.sciencedirect.comEm
3、erging Markets Queries in Finance and Business Financial and non-financial implications of cybercrimes in emerging countries Mihail Antonescua, Ramona Bir?ub * a Spiru Haret University, Faculty of Accounting and Financ
4、ial Management, Craiova, Romania bConstantin Brâncu?i University of Târgu Jiu, Faculty of Economics and Business Administration, Romania Abstract This article aims to investigate financial and non-financial im
5、plications of cybercrimes in emerging countries. In a globalized world, is very difficult to quantify in a precise manner the economic impact of cybercrimes. Nevertheless, there are significant differences among financ
6、ial and non-financial implications of cybercrime attacks. Despite widespread awareness, the vulnerability of emerging countries regarding cybersecurity surveys is still very high. © 2015 Authors. Published by Elsev
7、ier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and peer-review under responsibility of the Emerging Markets Queries in Finance and
8、Business local organization. Keywords: cybercrimes; intellectual property; business confidential information; identity theft; financial fraud; cybersecurity; 1. Introduction In a globalized economy, the risk of cybercri
9、me attacks is highly significant and for this particular reason it should not be ignored. A current feature of cyber crimes is their accelerated spread in emerging economies. Moreover, financial and non-financial impli
10、cations of cybercrimes in emerging countries provide a research framework of great current interest in order to identify potential implications for business environment. Technically, the essential idea suggests that ce
11、rtain system vulnerabilities are fraudulently exploited despite the implementation of cyber-security measures. * Corresponding author.: Tel. +40-767-970-777 E-mail address: birauramona@yahoo.com. © 2015 The Autho
12、rs. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Selection and peer-review under responsibility of Asociatia Grupul Roman d
13、e Cercetari in Finante Corporatiste620 Mihail Antonescu and Ramona Bir?u / Procedia Economics and Finance 32 ( 2015 ) 618 – 621 3. Dissemination research The World Bank provides the following classification of
14、countries for the current fiscal year (2015) based on the World Bank Atlas method, using as a criterion the GNI per capita level (2013) : low-income economies ($1,045 or less), middle-income economies (more than $1,045
15、 but less than $12,746), and high-income economies ($12,746 or more). Moreover, lower-middle-income and upper-middle-income economies are differentiated at a GNI per capita of $4,125. In addition, the concept of devel
16、oping (emerging) countries includes low- and middle-income countries noting that not every country in this category have the same level of development. According to Standard & Poor's Financial Services approac
17、h, the global classification of markets includes the following subcategories : developed, emerging and frontier. Likewise, MSCI Country Classification based on the Annual Market Classification Review provides a similar
18、 market classification, ie : developed, emerging and frontier. In the following table is presented the nominal classification of emerging markets, such as : Table 1 Emerging markets classification Americas Europe, Midd
19、le East and Africa Asia Brazil Czech Republic China Chile Egypt India Colombia Greece Indonesia Mexico Hungary Korea Peru Quatar Malaysia - Russia Philippines - South Africa Taiwan - Turkey Thailand - U
20、nited Arab Emirates - Source : MSCI Country Classification, Annual Market Classification Review Generally, cybercrime includes a wide range of illegal activities such as : cyber bullying, cyber terrorism, identity thef
21、t, cyber stalking, virtual pornography (via the Internet), cyber espionage (illegally obtaining confidential data), computer hacking, computer fraud, online harassment, phishing, online piracy, blackmailing proceeding,
22、 cyber extortion, spam attacks, copyright infringement, computer virus programs (installing malicious software programs such as Trojan horse viruses). Beyond inherent advantages, global liberalization and international
23、 integration provide a conducive environment for obtaining reprehensible illegal benefits based on complex activities related to cyber crimes, especially in terms of emerging countries. In the last decade, cybercrimina
24、ls became increasingly perfectionists due to modern technology and the capacity of computer applications. Moreover, the methods used by cyber criminals are very sophisticated and ingenious, depending on particular skil
25、ls and final purpose. The major vulnerability is represented by computer or computer system as a whole. Nevertheless, one of the most dangerous scenario involves ignoring the destructive potential of cyber attacks. The
26、oretically, panic is non-productive but it is quite necessary to treat seriously the impending cybercrime risks in order to avoid potential major losses. The prospective victims often neglect the idea of cyber crime an
27、d its extremely varied negative implications. The transmission channels of cyber crimes include certain components of the Internet, ie : e-mails, websites (in particular e-commerce sites), chat rooms, discussion groups
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- [雙語翻譯]網(wǎng)絡(luò)犯罪外文翻譯--新興國家網(wǎng)絡(luò)犯罪的財務(wù)和非財務(wù)影響
- [雙語翻譯]網(wǎng)絡(luò)犯罪外文翻譯--新興國家網(wǎng)絡(luò)犯罪的財務(wù)和非財務(wù)影響中英全
- 2015年網(wǎng)絡(luò)犯罪外文翻譯--新興國家網(wǎng)絡(luò)犯罪的財務(wù)和非財務(wù)影響
- 2015年網(wǎng)絡(luò)犯罪外文翻譯--新興國家網(wǎng)絡(luò)犯罪的財務(wù)和非財務(wù)影響(英文).PDF
- 2015年網(wǎng)絡(luò)犯罪外文翻譯--新興國家網(wǎng)絡(luò)犯罪的財務(wù)和非財務(wù)影響.DOCX
- [雙語翻譯]外文翻譯—虛擬世界中的青少年犯罪荷蘭使用網(wǎng)絡(luò)犯罪、依賴網(wǎng)絡(luò)犯罪和線下犯罪的異同(原文)
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌:具有真實后果的虛擬犯罪
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌具有真實后果的虛擬犯罪
- [雙語翻譯]文翻譯—虛擬世界中的青少年犯罪:荷蘭使用網(wǎng)絡(luò)犯罪、依賴網(wǎng)絡(luò)犯罪和線下犯罪的異同(節(jié)選)
- [雙語翻譯]文翻譯—虛擬世界中的青少年犯罪荷蘭使用網(wǎng)絡(luò)犯罪、依賴網(wǎng)絡(luò)犯罪和線下犯罪的異同(節(jié)選)
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌具有真實后果的虛擬犯罪(原文)
- [雙語翻譯]計算機犯罪外文翻譯--計算機科學(xué)專業(yè)學(xué)生對網(wǎng)絡(luò)犯罪的感知分析(英文)
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌具有真實后果的虛擬犯罪.DOCX
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌:具有真實后果的虛擬犯罪.DOCX
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌具有真實后果的虛擬犯罪中英全
- [雙語翻譯]網(wǎng)絡(luò)暴力外文翻譯—網(wǎng)絡(luò)欺凌具有真實后果的虛擬犯罪(原文).PDF
- [雙語翻譯]法學(xué)外文翻譯--犯罪和非犯罪未成年人的比較分析
- [雙語翻譯]法學(xué)外文翻譯--犯罪和非犯罪未成年人的比較分析(原文)
- [雙語翻譯]計算機犯罪外文翻譯--計算機科學(xué)專業(yè)學(xué)生對網(wǎng)絡(luò)犯罪的感知分析
- 2018年外文翻譯—虛擬世界中的青少年犯罪荷蘭使用網(wǎng)絡(luò)犯罪、依賴網(wǎng)絡(luò)犯罪和線下犯罪的異同
評論
0/150
提交評論