Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace

Authors

DOI:

https://doi.org/10.70715/jitcai.2024.v1.i1.003

Keywords:

Digital, Crimes, Terrorism, Cyberspace

Abstract

This paper explores the rise of digital crimes and digital terrorism as emerging threats that exploit cyberspace to conduct illegal activities, impact society, and compromise individuals’ privacy and security. With a growing dependency on digital platforms, these crimes have become more complex, highlighting the need for strengthened security measures, regulatory frameworks, and coordinated global efforts to address these issues.

Author Biography

  • Ahmed Al Zaidy

    Dr. Ahmed Al Zaidy is an academic and information technology professional with a Ph.D. in Business Administration, specializing in Information Security, from Northcentral University, earned in December 2020. He also holds a Master of Science in Information Systems focusing on Computer Security from Strayer University (2014) and a BacheBachelor'see in Mass Communication from the University of Baghdad (2006), specializing in TV and Radio Broadcasting.

    With over 15 years of experience in Information Technology, Dr. Al Zaidy has honed managerial and technical skills, including programming, database management, and cybersecurity expertise. He has worked extensively with various software tools such as MS SQL Server, MySQL, PHP, HTML, CSS, and Linux Administration.

    Dr. Al ZaidyZaidy's academic career spans over ten years, during which he has served in various teaching and administrative capacities. His professional certifications include CompTIA Security+ (2020-2023) and Certified Ethical Hacker (2021-2024), highlighting his commitment to continuous learning and maintaining industry-recognized credentials. Dr. Al Zaidy is also an active researcher and presenter, contributing to academic publications and speaking at conferences, including the National Association of African American Studies & Affiliates and local cybersecurity workshops.

    His approach to teaching integrates real-world applications, fostering critical thinking and hands-on learning experiences for students. Dr. Al Zaidy is recognized for his innovative curriculum design, strong leadership, and dedication to student success in cybersecurity and information technology.

References

[1] CyberSponse. (2015). Don't Be a Statistic. These Numbers Are Scary!

[2] Dennis, M. (2016). Cybercrime. In Encyclopædia Britannica.

[3] Federal Bureau of Investigation (FBI). (n.d.). Cyber Crime. Available at: https://www.fbi.gov/investigate/cyber

[4] Goel, S. (2011). The publicly reported losses incurred due to cybercrime in the U.S. Department of Homeland Security.

[5] Gregory, P. (2010). CISSP Guide to Security Essentials. Boston, MA: Cengage Learning.

[6] Kim, D., & Solomon, M. G. (2014). Fundamentals of Information Systems Security. Burlington, MA: Jones & Bartlett Learning.

[7] May, M. (2004). Federal Computer Crime Laws. In The Computer Fraud and Abuse Act (CFAA).

[8] Privacy Rights Clearinghouse. (2016). Online Harassment & Cyberstalking. Retrieved from https://privacyrights.org

[9] Rouse, M. (2016). Intellectual Property (IP).

[10] Singleton, T. (2013). The top five cybercrimes that are related to CPA. American Institute of Certified Public Accountants (AICPA).

[11] Stults, B. (2004). Sarbanes-Oxley compliance: New opportunities for information technology professionals. Academy of Information and Management Sciences Journal, 7(9).

[12] Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital Crime and Digital Terrorism. (3rd Edition). Upper Saddle River, NJ: Pearson.

[13] Volonino, L., Anzaldua, R., & Godwin, C. J. (2007). Computer Forensics: Principles and Practices. Boston, MA: Pearson.

Downloads

Published

11/01/2024

How to Cite

Al Zaidy, A. (2024). Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace. Journal of Information Technology, Cybersecurity, and Artificial Intelligence, 1(1), 18-29. https://doi.org/10.70715/jitcai.2024.v1.i1.003

Share