About the Journal

Information technology (IT) is the use of computers, storage, networking and other physical devices, infrastructure and processes to create, secure, exchange, or access digital data.

Cyber Crime, the fastest growing criminal activities across the world is carried out online, using the internet through computers. Cyber-enacted crimes steals confidential information that is stored online. Ccybercriminals use a number of methods to hack into a computer system or network. The common types of cybercrime include hacking, spread troublesome viruses and malicious online content, online scams and fraud, identity theft, attacks on computer systems and illegal or prohibited online content. In order to protect the privacy and rights of the victims, the legal community has devised laws against cyber criminals.

Cyber Crime and Information Technology is a peer- reviewed, open access publication that includes applied, theoretical, analytical, operational, subjective, prospective research work. The journal helps its readers to frame the strong understanding of the cyber security, cybercrime, digital evidences, law enforcement challenges which are growing in scope and urgency as countries around the world are becoming increasingly dependent on digital information and networks and also managing and processing electronic information in the business world. The journal is committed to provide quality empirical research and scholarly review articles.

Aims and Scope

Cyber Crime and Information Technology aim to focus on all aspects of cyber crime, internet frauds, identity theft, etc. in order to contribute to better understanding of the Internet frauds and cyber crime and the use of information systems in storage, protection and sharing of digital information.

Subjects covered by the Cyber Crime and Information Technology

  • Hacking
  • Phishing Scams
  • SPAM
  • Information warfare
  • Computer security
  • Webcam manager
  • Identity Theft and Credit Card Fraud
  • File hijacker
  • Keylogging
  • Cyberextortion
  • Screenshot manager
  • Ad clicker
  • Cyber Terrorism
  • SQL Injections
  • Virus dissemination
  • Fraud
  • Logic bombs
  • Cyber stalking
  • Data diddling
  • Malicious Software
  • Copyright infringement
  • Unwarranted mass-surveillance
  • Sextortion
  • Cyberwarfare
  • Internet Pornograph
  • Child Grooming
  • Espionage or spying
  • Awareness
  • Intelligence
  • Computer trespass
  • Internet homicide
  • Cyber Law
  • Data storage
  • Data retrieval
  • Data transmission
  • Data manipulation
  • Computing
  • Computer Systems Analyst
  • Computer Forensic Investigator
  • Remote / Distributed Working
  • Digital Systems Technology
  • Embedded Systems
  • Management Information Systems
  • Networking
  • Information and Communications Technology
  • Software Development
  • Systems Analysis
  • Network Security
  • IT Entrepreneurship and Management
  • Forensics