Annotated Bibliography – 3 Cybercrimes in 2020 An Annotated Bibliography is a working list of referencesbooks, journal article, Online documents, web

Annotated Bibliography – 3 Cybercrimes in 2020
An Annotated Bibliography is a working list of referencesbooks, journal article, Online documents, websites, etc. that you will use for an essay, research paper, or project. However, each reference citation is followed by a short summation and/or evaluative paragraph, which is called an annotation.

Identify the top 3cybercrimesin 2020
Find 3 articlesthatcover how to minimized eachcybercrime (1 page per article)
Format Paper following the clear guidance provided.

Don't use plagiarized sources. Get Your Custom Assignment on
Annotated Bibliography – 3 Cybercrimes in 2020 An Annotated Bibliography is a working list of referencesbooks, journal article, Online documents, web
From as Little as $13/Page

You paper must be in correct APA format, use correct grammar, and will need to include at least FIVE (5) resources (articles) covering how to mitigate the top 3 Cybercrimesin 2020_Remembereach article must havetheir respective short summary.

ALL of which must:
1) Be current. Published within the last 5 years.
2)Must be from Peer-Reviewed-Articles.

9/19/20, 8:48 AMPotensi Kriminal Cyber Crime pada Meme: Sebuah Kajian Linguistik Forensik: UC MegaSearch

Page 1 of 2http://eds.b.ebscohost.com/eds/detail/detail?vid=11&sid=893b0f6bGl2ZQ%3d%3d#AN=edsdoj.62df24290a466aa26ee976cdac66e2&db=edsdoj

Authors:

Source:

Publisher
Information:

Publication Year:

Collection:

Subject Terms:

Description:

Potensi Kriminal Cyber Crime pada Meme:
Sebuah Kajian Linguistik Forensik

Sri Sugiarto
Rini Qurratulaini

Deiksis: Jurnal Pendidikan Bahasa dan Sastra Indonesia, Vol 7, Iss 1, Pp 46-57 (2020)

FKIP Unswagati Press, 2020.

2020

LCC:Education (General)
LCC:Language and Literature

Education (General)
L7-991
Language and Literature

Abstrak. Tulisan ini bertujuan untuk mendeskripsikan hasil analisis ekpresi bahasa pada
meme yang berpotensi sebagai pelangaran kriminal cyber crime. Untuk mengganalisis
potensi kriminal tersebut, digunakan metode penelitian kualitatif dengan pedekatan
linguistik forensik. Data yang digunakan berupa bentuk lingual (kata,frasa,klausa) yang
terdapat pada meme. Meme yang diambil adalah empat buah meme dengan tema isu-isu
politik. Sumber data berupa media online (media masa). Data-data yang terkumpul
kemudian dianalisis berdasarkan dimensi sintaksis, semantik, pragmatik, dan forensik.
Hasil analisis menggunakan pendekatan linguistik forensik menunjukkan keempat meme
berpotensi melanggar pelanggaran kriminal cyber crime. Potensi pelanggaran ini
ditunjukkan dengan adanya muatan konten tindak tutur ilokusi persuasif dan ekspresif
yang bersifat penghinaan. Bentuk penghinaan adanya penggunaan bentuk lingual seperti
gila, idiot, presiden tidak berguna, dan penipu. Tujuan penghinaan secara jelas
ditujukkan kepada penyerangan pribadi baik ditujukan kepada Jokowi maupun Prabowo.

https://www.ucumberlands.edu/library

javascript:__doLinkPostBack(”,’ss~~AR%20%22Sri%20Sugiarto%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Rini%20Qurratulaini%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Education%20(General)%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22L7-991%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Language%20and%20Literature%22%7C%7Csl~~rl’,”);

9/19/20, 8:48 AMPotensi Kriminal Cyber Crime pada Meme: Sebuah Kajian Linguistik Forensik: UC MegaSearch

Page 2 of 2http://eds.b.ebscohost.com/eds/detail/detail?vid=11&sid=893b0f6bGl2ZQ%3d%3d#AN=edsdoj.62df24290a466aa26ee976cdac66e2&db=edsdoj

Document Type:

File Description:

Language:

ISSN:

Relation:

DOI:

Access URL:

Rights:

Accession Number:

Database:

Keempat meme ini masih dapat diakeses secara bebas pada alamat situs masing-masing.
Potensi pelanggaran terhadap keempat meme ini dapat memungkinkan pelaku
penyebarnya terjerat UU ITE pasal 45 ayat 3 dan pasal 27 ayat 3. Selanjutnya
pelanggaran penghinaan dapat juga ditinjau dengan KUHP Bab XVI pasal 310 sampai
dengan pasal pasal 321 tentang pidana pelanggaran penghinaan. Kata kunci: Kriminal,
Cyber Crime, Linguistik Forensik

article

electronic resource

Indonesian

2355-6633
2548-5490

http://jurnal.unswagati.ac.id/index.php/Deiksis/article/view/2495; https://doaj.org/toc/2355-
6633; https://doaj.org/toc/2548-5490

10.33603/deiksis.v7i1.2495

https://doaj.org/article/de62df24290a466aa26ee976cdac66e2

Journal Licence: CC BY-SA

edsdoj.62df24290a466aa26ee976cdac66e2

Directory of Open Access Journals

EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us

powered by EBSCOhost

2020 EBSCO Industries, Inc. All rights reserved.

https://doaj.org/article/de62df24290a466aa26ee976cdac66e2

https://connect.ebsco.com/

https://www.ebsco.com/company/privacy-policy

https://www.ebsco.com/conversion-testing-statement

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/cookie-policy

https://support.ebscohost.com/contact/index.php 9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch

Page 1 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee

Authors:

Source:

Publisher
Information:

Publication Year:

Subject Terms:

Description:

A Technical Review Report on Cyber Crimes
in India

Datta, Priyanka
Panda, Surya Narayan
Tanwar, Sarvesh
Kaushal, Rajesh Kumar

2020 International Conference on Emerging Smart Computing and Informatics (ESCI)
Emerging Smart Computing and Informatics (ESCI), 2020 International Conference on.
:269-275 Mar, 2020

IEEE

2020

Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Fields, Waves and Electromagnetics
Signal Processing and Analysis
Computer crime
Electronic mail
Online banking
Internet
Cyber Crime
Cyber Security
Online Scams

In modern society the role of Internet and computer system is well recognized. People
are greatly benefited with the development of networking and cyber space but some
people are using this development in unethical way to have some illegal benefits.

https://www.ucumberlands.edu/library

javascript:__doLinkPostBack(”,’ss~~AR%20%22Datta,%20Priyanka%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Panda,%20Surya%20Narayan%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Tanwar,%20Sarvesh%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Kaushal,%20Rajesh%20Kumar%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Communication,%20Networking%20and%20Broadcast%20Technologies%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Components,%20Circuits,%20Devices%20and%20Systems%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Computing%20and%20Processing%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Fields,%20Waves%20and%20Electromagnetics%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Signal%20Processing%20and%20Analysis%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Computer%20crime%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Electronic%20mail%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Online%20banking%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Internet%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Cyber%20Crime%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Cyber%20Security%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Online%20Scams%22%7C%7Csl~~rl’,”);

9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch

Page 2 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee

Contents Note:

Document Type:

Language:

Author Affiliations:

ISBN:

Relation:

DOI:

Rights:

AMSID:

Conference
Acronym:

Date of Current
Version:

Document Subtype:

Notes:

Recently different types of Social-networking attacks are witnessed by social networking
sites user. Internal Revenue Service (IRS) impersonation scams, along with technical
support scams are the most common type of tricks used by the attackers on unsuspecting
victims in order to achieve financial benefits. The ratio of cyber-crime in India is
constantly rising due to various reasons. Cyber-crlminals are very difficult to trace and
this advantage is fully utilize by scammers. In this paper an intensive review has been
done on cyber-crime in India. The studies shows that fraud cases are increasing and the
victims are mostly in the age group of 20 29 years. Mostly children and women are
affected. Thus, awareness programs are required for preventing or avoiding cyber-crime
in India.

Conference Acronym: ESCI

Conference

English

Chitkara University Institute of Engineering and Technology, Chitkara
University,Punjab,India
Amity Institute of Information Technology, Amity University Uttar Pradesh,Noida,India

978-1-7281-5262-2
978-1-7281-5263-9

2020 International Conference on Emerging Smart Computing and Informatics (ESCI)

10.1109/ESCI48226.2020.9167567

Copyright 2020, IEEE

9167567

ESCI

2020

IEEE Conference

Conference Location: Pune, India, India

Conference Start Date: 12 March 2020

Conference End Date: 14 March 2020

9/19/20, 8:50 AMA Technical Review Report on Cyber Crimes in India: UC MegaSearch

Page 3 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=13&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9167567&db=edseee

Accession Number:

Database:

edseee.9167567

IEEE Xplore Digital Library

EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us

powered by EBSCOhost

2020 EBSCO Industries, Inc. All rights reserved.

https://connect.ebsco.com/

https://www.ebsco.com/company/privacy-policy

https://www.ebsco.com/conversion-testing-statement

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/cookie-policy

https://support.ebscohost.com/contact/index.php 9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch

Page 1 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee

Authors:

Source:

Publisher
Information:

Publication Year:

Subject Terms:

Description:

Location Wise Opinion Mining of Real Time
Twitter Data Using Hadoop to reduce Cyber
Crimes

Mishra, Shubha
Shukla, Piyush Kumar
Agarwal, Ratish

2nd International Conference on Data, Engineering and Applications (IDEA) Data,
Engineering and Applications (IDEA), 2020 2nd International Conference on. :1-6 Feb,
2020

IEEE

2020

Communication, Networking and Broadcast Technologies
Computing and Processing
sentiment analysis
Hadoop
Apache flume
pig
location-based
big data

The opinions of others is very important in our decision making. Twitter plays an
important role on sharing user’s opinion on a variety of topics, wo mining these twitter
data is a very difficult task because its unstructured nature. Location plays an important
role in finding opinions towards any topic because the opinions of users may vary from
location to location so its very important to find opinion based on location which give in-
depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals

https://www.ucumberlands.edu/library

javascript:__doLinkPostBack(”,’ss~~AR%20%22Mishra,%20Shubha%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Shukla,%20Piyush%20Kumar%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~AR%20%22Agarwal,%20Ratish%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Communication,%20Networking%20and%20Broadcast%20Technologies%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Computing%20and%20Processing%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22sentiment%20analysis%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Hadoop%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22Apache%20flume%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22pig%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22location-based%22%7C%7Csl~~rl’,”);

javascript:__doLinkPostBack(”,’ss~~DE%20%22big%20data%22%7C%7Csl~~rl’,”);

9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch

Page 2 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee

Contents Note:

Document Type:

Language:

ISBN:

Relation:

DOI:

Rights:

AMSID:

Conference
Acronym:

Date of Current
Version:

Document Subtype:

Notes:

Accession Number:

Database:

with opinions or emotions of subjective elements in the textual documents. In this paper,
we can take twitter data because on twitter a huge opinions are shared. In these, we can
fetching a realtime data from Twitter by using flume and store these data into HDFS
which is a storage component of Hadoop. Hadoop is an best open source solution for
storing and processing a large amount of data. We can integrate Apache pig and hive
with Hadoop and analyze the opinion on the basis of location because opinions are
changes from location to location.

Conference Acronym: IDEA

Conference

English

978-1-7281-5718-4
978-1-7281-5717-7

2020 2nd International Conference on Data, Engineering and Applications (IDEA)

10.1109/IDEA49133.2020.9170700

Copyright 2020, IEEE

9170700

IDEA

2020

IEEE Conference

Conference Location: Bhopal, India, India

Conference Start Date: 28 Feb. 2020

Conference End Date: 29 Feb. 2020

edseee.9170700

IEEE Xplore Digital Library

9/19/20, 8:50 AMLocation Wise Opinion Mining of Real Time Twitter Data Using Hadoop to redu…: UC MegaSearch

Page 3 of 3http://eds.b.ebscohost.com/eds/detail/detail?vid=14&sid=893b0f6BlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.9170700&db=edseee

EBSCO Connect Privacy Policy A/B Testing Terms of Use Copyright Cookie Policy Contact Us

powered by EBSCOhost

2020 EBSCO Industries, Inc. All rights reserved.

https://connect.ebsco.com/

https://www.ebsco.com/company/privacy-policy

https://www.ebsco.com/conversion-testing-statement

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/terms-of-use

https://www.ebsco.com/cookie-policy

https://support.ebscohost.com/contact/index.php

Leave a Comment

Your email address will not be published. Required fields are marked *