TY - JOUR
T1 - Cybercrime investigation challenges
T2 - Middle east and North Africa
AU - Sarrab, Mohamed
AU - Alalwan, Nasser
AU - Alzahrani, Ahmed
AU - Kordestani, Mahdi
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2014.
PY - 2014
Y1 - 2014
N2 - Cybercrime is the use ofIT in any suspicious criminal activities.Currently, our life becomes increasingly depending on modern information technology; however, it has become very necessary to improve the cybercrime investigation techniques especially in when processing very secret and sensitive information such as government and military intelligence, financial or personal private information. Cybercrime investigation attempts to detect unauthorized access to information in digital source with the intent to steal, modify or destroy that digital information. Such suspicious activities can cause financial damages or government information disseminates; moreover, it might destroy military high secret and confidential information. Therefore, this chapter focuses mainly on highlighting the main challenges of Middle East's and North Africa's countries in cybercrime investigation system by considering the recent developments in the continents Internet infrastructure and the need of information security laws in these particular countries. This chapter mainly focuses on Internet infrastructure development in these particular to show how they might become vulnerable to cybercrime attacks.
AB - Cybercrime is the use ofIT in any suspicious criminal activities.Currently, our life becomes increasingly depending on modern information technology; however, it has become very necessary to improve the cybercrime investigation techniques especially in when processing very secret and sensitive information such as government and military intelligence, financial or personal private information. Cybercrime investigation attempts to detect unauthorized access to information in digital source with the intent to steal, modify or destroy that digital information. Such suspicious activities can cause financial damages or government information disseminates; moreover, it might destroy military high secret and confidential information. Therefore, this chapter focuses mainly on highlighting the main challenges of Middle East's and North Africa's countries in cybercrime investigation system by considering the recent developments in the continents Internet infrastructure and the need of information security laws in these particular countries. This chapter mainly focuses on Internet infrastructure development in these particular to show how they might become vulnerable to cybercrime attacks.
UR - http://www.scopus.com/inward/record.url?scp=84927656698&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84927656698&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-43616-5_8
DO - 10.1007/978-3-662-43616-5_8
M3 - Article
AN - SCOPUS:84927656698
SN - 1868-4394
VL - 70
SP - 203
EP - 223
JO - Intelligent Systems Reference Library
JF - Intelligent Systems Reference Library
ER -