One significant tool for addressing the concerns associated with the use of one of the applications in computer science is the law. Numerous laws and rules governing the use of computer science are designed to safeguard users, customers, and society at large. Law uses norms created by governmental and social institutions to control behavior. Programming is used to explore digital information in computer science. Computers got more potent and smaller as they evolved through generations, utilizing various technologies such as integrated circuits. Cyber law regulates online behavior and deals with matters pertaining to intellectual property, privacy, domain names, and other legal concerns. A few of the many concerns that the law must address in order to mitigate the electronic crimes are protecting privacy and security, upholding justice, limiting civil and criminal liability, ensuring safety, and controlling the application of AI in the workplace. Guidelines that people and organizations have to follow when utilizing computer science applications, making sure that these requirements are met in full. Additionally, as companies must commit to recording AI usage procedures and making clear the use of data and algorithms, the regulation fosters accountability and openness. By doing this, the possibility of prejudice and mistakes when utilizing AI is decreased. This survey provides a self-contained introduction to cybercrimes and types of cybercrimes. We also present ways to combat cybercrime and limit its spread.
Published in | Social Sciences (Volume 13, Issue 5) |
DOI | 10.11648/j.ss.20241305.17 |
Page(s) | 192-196 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Cybercrimes, Threatening Individuals, Blackmail
LES | Legal Expert Systems |
EC | Electronic Crimes |
[1] | Jones, A. J., & Sergot, M. (1993). On the characterisation of law and computer systems: The normative systems perspective. Deontic logic in computer science: normative system specification, 275-307. |
[2] | Cvetković, D., & Simić, S. (2011). Graph spectra in computer science. Linear Algebra and its Applications, 434(6), 1545-1562, |
[3] | Sinaga, N. P. (2021). Perlindungan hukum bagi konsumen yang data pribadinya diperjualbelikan di aplikasi fintech peer-to-peer lending, Nusantara Law and Opinion Journal, 2(2). |
[4] | Stevani, W., & Sudirman, L. (2021). Urgensi Perlindungan Data Pengguna Financial Technology terhadap Aksi Kejahatan Online di Indonesia. Journal of Judicial Review, 23(2), 197-216, |
[5] | Dorfleitner, G., Hornuf, L., & Kreppmeier, J. (2023). Promise not fulfilled: FinTech, data privacy, and the GDPR. Electronic Markets, 33(1), 33, |
[6] | Oyewole, A. T., Oguejiofor, B. B., Eneh, N. E., Akpuokwe, C. U., & Bakare, S. S. (2024). Data privacy laws and their impact on financial technology companies: a review. Computer Science & IT Research Journal, 5(3), 628-650, |
[7] | Li, J. H. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474, |
[8] | Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J.,. & Choo, K. K. R. (2022). Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artificial Intelligence Review, 1-25, |
[9] | Mijwil M. M., “Implementation of Machine Learning Techniques for the Classification of Lung X-Ray Images Used to Detect COVID-19 in Humans,” Iraqi Journal of Science, vol.62, no. 6., pp: 2099-2109, July 2021. |
[10] | Cáceres-Hidalgo, J., & Avila-Pesantez, D. (2021, October). Cybersecurity study in 5g network slicing technology: A systematic mapping review. In 2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM) (pp. 1-6). IEEE, |
[11] | Ghosh, T., Al Banna, M. H., Rahman, M. S., Kaiser, M. S., Mahmud, M., Hosen, A. S., & Cho, G. H. (2021). Artificial intelligence and internet of things in screening and management of autism spectrum disorder. Sustainable Cities and Society, 74, 103189, |
[12] | Adadi, A., Lahmer, M., & Nasiri, S. (2022). Artificial Intelligence and COVID-19: A Systematic umbrella review and roads ahead. Journal of King Saud University-Computer and Information Sciences, 34(8), 5898-5920, |
[13] | Malby, S., Jesrani, T., Bañuelos, T., Holterhof, A., & Hahn, M. (2015). Study on the effects of new information technologies on the abuse and exploitation of children. United Nations Office on Drugs and Crime: Vienna, Austria. |
[14] | Mekkawi, M. (2022). Cyber Blackmail between Threats and Protection: A study in Egyptian and American legislations. Journal of Law and Emerging Technologies, 2(2), 53-116, |
[15] | Sarkar, G., & Shukla, S. K. (2023). Behavioral analysis of cybercrime: Paving the way for effective policing strategies. Journal of Economic Criminology, 100034, |
[16] | Umejiaku, N. O., & Uzoka, N. C. (2021). An Overview of Social Media Related Cybercrimes and Its Legal Remedy. LASJURE, 2, 50. |
[17] | Joshi, S., Singh, S. K., & Sharma, M. (2023). Cybercrime by Minors. In Cybercrime in Social Media (pp. 143-166). Chapman and Hall/CRC. |
[18] | Lakshmanan, A. (2019). Literature review on Cyber Crimes and its Prevention Mechanisms. no. February. pp, 1-5, |
[19] | Biju, J. M., Gopal, N., & Prakash, A. J. (2019). Cyber attacks and its different types. International Research Journal of Engineering and Technology, 6(3), 4849-4852. |
[20] | Zhang, Z., Salerno, J. J., & Yu, P. S. (2003, August). Applying data mining in investigating money laundering crimes. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 747-752), |
[21] | Sviatun, O. V., Goncharuk, O. V., Roman, C., Kuzmenko, O., & Kozych, I. V. (2021). Combating cybercrime: economic and legal aspects. WSEAS Transactions on Business and Economics, 18, 751-762, |
APA Style
Mohamed, B., Fattah, K. E. A. M. A. (2024). A Comprehensive Survey on the Role of Law in Different Applications in Computer Science. Social Sciences, 13(5), 192-196. https://doi.org/10.11648/j.ss.20241305.17
ACS Style
Mohamed, B.; Fattah, K. E. A. M. A. A Comprehensive Survey on the Role of Law in Different Applications in Computer Science. Soc. Sci. 2024, 13(5), 192-196. doi: 10.11648/j.ss.20241305.17
AMA Style
Mohamed B, Fattah KEAMA. A Comprehensive Survey on the Role of Law in Different Applications in Computer Science. Soc Sci. 2024;13(5):192-196. doi: 10.11648/j.ss.20241305.17
@article{10.11648/j.ss.20241305.17, author = {Basma Mohamed and Khaled Eid Abdel Moneim Abdel Fattah}, title = {A Comprehensive Survey on the Role of Law in Different Applications in Computer Science}, journal = {Social Sciences}, volume = {13}, number = {5}, pages = {192-196}, doi = {10.11648/j.ss.20241305.17}, url = {https://doi.org/10.11648/j.ss.20241305.17}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ss.20241305.17}, abstract = {One significant tool for addressing the concerns associated with the use of one of the applications in computer science is the law. Numerous laws and rules governing the use of computer science are designed to safeguard users, customers, and society at large. Law uses norms created by governmental and social institutions to control behavior. Programming is used to explore digital information in computer science. Computers got more potent and smaller as they evolved through generations, utilizing various technologies such as integrated circuits. Cyber law regulates online behavior and deals with matters pertaining to intellectual property, privacy, domain names, and other legal concerns. A few of the many concerns that the law must address in order to mitigate the electronic crimes are protecting privacy and security, upholding justice, limiting civil and criminal liability, ensuring safety, and controlling the application of AI in the workplace. Guidelines that people and organizations have to follow when utilizing computer science applications, making sure that these requirements are met in full. Additionally, as companies must commit to recording AI usage procedures and making clear the use of data and algorithms, the regulation fosters accountability and openness. By doing this, the possibility of prejudice and mistakes when utilizing AI is decreased. This survey provides a self-contained introduction to cybercrimes and types of cybercrimes. We also present ways to combat cybercrime and limit its spread.}, year = {2024} }
TY - JOUR T1 - A Comprehensive Survey on the Role of Law in Different Applications in Computer Science AU - Basma Mohamed AU - Khaled Eid Abdel Moneim Abdel Fattah Y1 - 2024/10/10 PY - 2024 N1 - https://doi.org/10.11648/j.ss.20241305.17 DO - 10.11648/j.ss.20241305.17 T2 - Social Sciences JF - Social Sciences JO - Social Sciences SP - 192 EP - 196 PB - Science Publishing Group SN - 2326-988X UR - https://doi.org/10.11648/j.ss.20241305.17 AB - One significant tool for addressing the concerns associated with the use of one of the applications in computer science is the law. Numerous laws and rules governing the use of computer science are designed to safeguard users, customers, and society at large. Law uses norms created by governmental and social institutions to control behavior. Programming is used to explore digital information in computer science. Computers got more potent and smaller as they evolved through generations, utilizing various technologies such as integrated circuits. Cyber law regulates online behavior and deals with matters pertaining to intellectual property, privacy, domain names, and other legal concerns. A few of the many concerns that the law must address in order to mitigate the electronic crimes are protecting privacy and security, upholding justice, limiting civil and criminal liability, ensuring safety, and controlling the application of AI in the workplace. Guidelines that people and organizations have to follow when utilizing computer science applications, making sure that these requirements are met in full. Additionally, as companies must commit to recording AI usage procedures and making clear the use of data and algorithms, the regulation fosters accountability and openness. By doing this, the possibility of prejudice and mistakes when utilizing AI is decreased. This survey provides a self-contained introduction to cybercrimes and types of cybercrimes. We also present ways to combat cybercrime and limit its spread. VL - 13 IS - 5 ER -