Annotated Bibliography – 3 Cybercrimes in 2020
An Annotated Bibliography is a working list of referencesbooks, journal article, Online documents, websites, etc. that you will use for an essay, research paper, or project. However, each reference citation is followed by a short summation and/or evaluative paragraph, which is called an annotation.
Identify the top 3cybercrimesin 2020
Find 3 articlesthatcover how to minimized eachcybercrime (1 page per article)
Format Paper following the clear guidance provided.
You paper must be in correct APA format, use correct grammar, and will need to include at least FIVE (5) resources (articles) covering how to mitigate the top 3 Cybercrimesin 2020_Remembereach article must havetheir respective short summary.
ALL of which must:
1) Be current. Published within the last 5 years.
2)Must be from Peer-Reviewed-Articles.
9/19/20, 8:48 AMPotensi Kriminal Cyber Crime pada Meme: Sebuah Kajian Linguistik Forensik: UC MegaSearch
Page 1 of 2http://eds.b.ebscohost.com/eds/detail/detail?vid=11&sid=893b0f6bGl2ZQ%3d%3d#AN=edsdoj.62df24290a466aa26ee976cdac66e2&db=edsdoj
Authors:
Source:
Publisher
Information:
Publication Year:
Collection:
Subject Terms:
Description:
Potensi Kriminal Cyber Crime pada Meme:
Sebuah Kajian Linguistik Forensik
Sri Sugiarto
Rini Qurratulaini
Deiksis: Jurnal Pendidikan Bahasa dan Sastra Indonesia, Vol 7, Iss 1, Pp 46-57 (2020)
FKIP Unswagati Press, 2020.
2020
LCC:Education (General)
LCC:Language and Literature
Education (General)
L7-991
Language and Literature
Abstrak. Tulisan ini bertujuan untuk mendeskripsikan hasil analisis ekpresi bahasa pada
meme yang berpotensi sebagai pelangaran kriminal cyber crime. Untuk mengganalisis
potensi kriminal tersebut, digunakan metode penelitian kualitatif dengan pedekatan
linguistik forensik. Data yang digunakan berupa bentuk lingual (kata,frasa,klausa) yang
terdapat pada meme. Meme yang diambil adalah empat buah meme dengan tema isu-isu
politik. Sumber data berupa media online (media masa). Data-data yang terkumpul
kemudian dianalisis berdasarkan dimensi sintaksis, semantik, pragmatik, dan forensik.
Hasil analisis menggunakan pendekatan linguistik forensik menunjukkan keempat meme
berpotensi melanggar pelanggaran kriminal cyber crime. Potensi pelanggaran ini
ditunjukkan dengan adanya muatan konten tindak tutur ilokusi persuasif dan ekspresif
yang bersifat penghinaan. Bentuk penghinaan adanya penggunaan bentuk lingual seperti
gila, idiot, presiden tidak berguna, dan penipu. Tujuan penghinaan secara jelas
ditujukkan kepada penyerangan pribadi baik ditujukan kepada Jokowi maupun Prabowo.
https://www.ucumberlands.edu/library
javascript:__doLinkPostBack(”,’ss~~AR%20%22Sri%20Sugiarto%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Rini%20Qurratulaini%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Education%20(General)%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22L7-991%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Language%20and%20Literature%22%7C%7Csl~~rl’,”);
9/19/20, 8:48 AMPotensi Kriminal Cyber Crime pada Meme: Sebuah Kajian Linguistik Forensik: UC MegaSearch
Page 2 of 2http://eds.b.ebscohost.com/eds/detail/detail?vid=11&sid=893b0f6bGl2ZQ%3d%3d#AN=edsdoj.62df24290a466aa26ee976cdac66e2&db=edsdoj
Document Type:
File Description:
Language:
ISSN:
Relation:
DOI:
Access URL:
Rights:
Accession Number:
Database:
Keempat meme ini masih dapat diakeses secara bebas pada alamat situs masing-masing.
Potensi pelanggaran terhadap keempat meme ini dapat memungkinkan pelaku
penyebarnya terjerat UU ITE pasal 45 ayat 3 dan pasal 27 ayat 3. Selanjutnya
pelanggaran penghinaan dapat juga ditinjau dengan KUHP Bab XVI pasal 310 sampai
dengan pasal pasal 321 tentang pidana pelanggaran penghinaan. Kata kunci: Kriminal,
Cyber Crime, Linguistik Forensik
article
electronic resource
Indonesian
2355-6633
2548-5490
http://jurnal.unswagati.ac.id/index.php/Deiksis/article/view/2495; https://doaj.org/toc/2355-
6633; https://doaj.org/toc/2548-5490
10.33603/deiksis.v7i1.2495
https://doaj.org/article/de62df24290a466aa26ee976cdac66e2
Journal Licence: CC BY-SA
edsdoj.62df24290a466aa26ee976cdac66e2
Directory of Open Access Journals
EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us
powered by EBSCOhost
2020 EBSCO Industries, Inc. All rights reserved.
https://doaj.org/article/de62df24290a466aa26ee976cdac66e2
https://connect.ebsco.com/
https://www.ebsco.com/company/privacy-policy
https://www.ebsco.com/conversion-testing-statement
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/cookie-policy
https://support.ebscohost.com/contact/index.php 9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch
Page 1 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee
Authors:
Source:
Publisher
Information:
Publication Year:
Subject Terms:
Description:
A Technical Review Report on Cyber Crimes
in India
Datta, Priyanka
Panda, Surya Narayan
Tanwar, Sarvesh
Kaushal, Rajesh Kumar
2020 International Conference on Emerging Smart Computing and Informatics (ESCI)
Emerging Smart Computing and Informatics (ESCI), 2020 International Conference on.
:269-275 Mar, 2020
IEEE
2020
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Fields, Waves and Electromagnetics
Signal Processing and Analysis
Computer crime
Electronic mail
Online banking
Internet
Cyber Crime
Cyber Security
Online Scams
In modern society the role of Internet and computer system is well recognized. People
are greatly benefited with the development of networking and cyber space but some
people are using this development in unethical way to have some illegal benefits.
https://www.ucumberlands.edu/library
javascript:__doLinkPostBack(”,’ss~~AR%20%22Datta,%20Priyanka%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Panda,%20Surya%20Narayan%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Tanwar,%20Sarvesh%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Kaushal,%20Rajesh%20Kumar%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Communication,%20Networking%20and%20Broadcast%20Technologies%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Components,%20Circuits,%20Devices%20and%20Systems%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Computing%20and%20Processing%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Fields,%20Waves%20and%20Electromagnetics%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Signal%20Processing%20and%20Analysis%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Computer%20crime%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Electronic%20mail%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Online%20banking%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Internet%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Cyber%20Crime%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Cyber%20Security%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Online%20Scams%22%7C%7Csl~~rl’,”);
9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch
Page 2 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee
Contents Note:
Document Type:
Language:
Author Affiliations:
ISBN:
Relation:
DOI:
Rights:
AMSID:
Conference
Acronym:
Date of Current
Version:
Document Subtype:
Notes:
Recently different types of Social-networking attacks are witnessed by social networking
sites user. Internal Revenue Service (IRS) impersonation scams, along with technical
support scams are the most common type of tricks used by the attackers on unsuspecting
victims in order to achieve financial benefits. The ratio of cyber-crime in India is
constantly rising due to various reasons. Cyber-crlminals are very difficult to trace and
this advantage is fully utilize by scammers. In this paper an intensive review has been
done on cyber-crime in India. The studies shows that fraud cases are increasing and the
victims are mostly in the age group of 20 29 years. Mostly children and women are
affected. Thus, awareness programs are required for preventing or avoiding cyber-crime
in India.
Conference Acronym: ESCI
Conference
English
Chitkara University Institute of Engineering and Technology, Chitkara
University,Punjab,India
Amity Institute of Information Technology, Amity University Uttar Pradesh,Noida,India
978-1-7281-5262-2
978-1-7281-5263-9
2020 International Conference on Emerging Smart Computing and Informatics (ESCI)
10.1109/ESCI48226.2020.9167567
Copyright 2020, IEEE
9167567
ESCI
2020
IEEE Conference
Conference Location: Pune, India, India
Conference Start Date: 12 March 2020
Conference End Date: 14 March 2020
9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch
Page 3 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee
Accession Number:
Database:
edseee.9167567
IEEE Xplore Digital Library
EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us
powered by EBSCOhost
2020 EBSCO Industries, Inc. All rights reserved.
https://connect.ebsco.com/
https://www.ebsco.com/company/privacy-policy
https://www.ebsco.com/conversion-testing-statement
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/cookie-policy
https://support.ebscohost.com/contact/index.php 9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch
Page 1 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee
Authors:
Source:
Publisher
Information:
Publication Year:
Subject Terms:
Description:
Location Wise Opinion Mining of Real Time
Twitter Data Using Hadoop to reduce Cyber
Crimes
Mishra, Shubha
Shukla, Piyush Kumar
Agarwal, Ratish
2nd International Conference on Data, Engineering and Applications (IDEA) Data,
Engineering and Applications (IDEA), 2020 2nd International Conference on. :1-6 Feb,
2020
IEEE
2020
Communication, Networking and Broadcast Technologies
Computing and Processing
sentiment analysis
Hadoop
Apache flume
pig
location-based
big data
The opinions of others is very important in our decision making. Twitter plays an
important role on sharing user’s opinion on a variety of topics, wo mining these twitter
data is a very difficult task because its unstructured nature. Location plays an important
role in finding opinions towards any topic because the opinions of users may vary from
location to location so its very important to find opinion based on location which give in-
depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals
https://www.ucumberlands.edu/library
javascript:__doLinkPostBack(”,’ss~~AR%20%22Mishra,%20Shubha%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Shukla,%20Piyush%20Kumar%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~AR%20%22Agarwal,%20Ratish%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Communication,%20Networking%20and%20Broadcast%20Technologies%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Computing%20and%20Processing%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22sentiment%20analysis%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Hadoop%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22Apache%20flume%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22pig%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22location-based%22%7C%7Csl~~rl’,”);
javascript:__doLinkPostBack(”,’ss~~DE%20%22big%20data%22%7C%7Csl~~rl’,”);
9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch
Page 2 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee
Contents Note:
Document Type:
Language:
ISBN:
Relation:
DOI:
Rights:
AMSID:
Conference
Acronym:
Date of Current
Version:
Document Subtype:
Notes:
Accession Number:
Database:
with opinions or emotions of subjective elements in the textual documents. In this paper,
we can take twitter data because on twitter a huge opinions are shared. In these, we can
fetching a realtime data from Twitter by using flume and store these data into HDFS
which is a storage component of Hadoop. Hadoop is an best open source solution for
storing and processing a large amount of data. We can integrate Apache pig and hive
with Hadoop and analyze the opinion on the basis of location because opinions are
changes from location to location.
Conference Acronym: IDEA
Conference
English
978-1-7281-5718-4
978-1-7281-5717-7
2020 2nd International Conference on Data, Engineering and Applications (IDEA)
10.1109/IDEA49133.2020.9170700
Copyright 2020, IEEE
9170700
IDEA
2020
IEEE Conference
Conference Location: Bhopal, India, India
Conference Start Date: 28 Feb. 2020
Conference End Date: 29 Feb. 2020
edseee.9170700
IEEE Xplore Digital Library
9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch
Page 3 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee
EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us
powered by EBSCOhost
2020 EBSCO Industries, Inc. All rights reserved.
https://connect.ebsco.com/
https://www.ebsco.com/company/privacy-policy
https://www.ebsco.com/conversion-testing-statement
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/terms-of-use
https://www.ebsco.com/cookie-policy
https://support.ebscohost.com/contact/index.php