INTERNET AND MODERN INFORMATION TECHNOLOGY IN THE FUNCTION OF SOCIETY DEVELOPMENT
Keywords:
Internet, Smart Electronics, Machine Learning, CybercrimeAbstract
The development of modern information technology has changed the world around us, but also the world within us. The Internet has begun to shape our development, behavior, and social norms that can be interpreted through phenomena related to technology and human behavior in virtual reality taking place on the Internet. This means that technology has a huge impact on everyday human life. When we talk about modern technologies, we often think only of smartphones, the Internet and social media as the main factors that have significantly changed our lives, social relations, but also health. And often they pay attention only to their negative sides. With good reason, because negative side effects are not uncommon.Downloads
References
1. Bosch, J.; Olsson, H. H.; Crnkovic, I. (2021). Engineering AI Systems: A Research Agenda in Luhach, A. K.; Elçi, A. (eds) Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, IGI Global, Hershey, USA, pp. 1. - 2.
2. Bosworth, S.; Jacobson, R. V. (2014). Brief History and Mission of Information System Security in Bosworth, S.; Kabay, M. E.; Whyne, E. (eds) Computer Security Handbook, Sixth Edition, John Wiley & Sons, Inc., Hoboken, USA, pp. 1*1. - 1*2.
3. Calder, A. (2005). A Business Guide to Information Security - How to Protect Your Company's IT Assets, Reduce Risks and Under-stand the Law, Kogan Page Limited, London, UK, pp. 1.; 16. - 17.
4. Franjic, S. (2021). Biometrics in Criminalistics and Forensics. Int J Forensic Sci. 3: 10-16.
5. Franjić, S. (2020). Cybercrime is Very Dangerous Form of Criminal Behavior and Cybersecurity, Emerging Science Journal, Vol. 4., Special Issue "Internet of Things, Internet of Vehicles,, and Blockchain", Reggio Calabria, Italy, pp. 18. – 26., DOI: http://dx.doi.org/10.28991/esj-2020-SP1-02
6. Kaplan, J. M.; Bauley, T.; Rezek, C.; O'Halloran, D.; Marcus, A. (2015). Beyond Cybersecurity - Protecting Your Digital Business, John Wiley & Sons, Inc., Hoboken, USA, pp. 1. - 2.
7. Katz, A.; MacDonald, M.; Astley, T.; Guness, U.; Svorc, J.; McCormick, C. (2020). Data Protection in Practice in Holt, J.; Newton, J. (eds) A Practical Guide to IT Law, Third Edition, BCS Learning and Development Ltd, Swindon, UK, pp. 116. - 117.
8. Kizza, J. M. (2014). Computer Network Security and Cyber Ethics, Fourth Edition, McFarland & Company, Inc., Publishers, Jeffer-son, USA, pp. 3.
9. Kosiński, J.; Krasnodębski, G. (2021). Cybercrime Predicting in the Light of Police Statistics in Jahankhani, H.; Jamal, A.; Lawson, S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021, Springer Nature Switzerland AG, Cham, Switzerland, pp. 55. - 56
10. Miehling, E.; Rasouli, M.; Teneketzis, D. (2019). ControlTheoretic Approaches to Cyber-Security in Jajodia, S.; Cybenko, G.; Liu, P.; Wang, C.; Wellman, M. (eds) Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, Springer Nature Switzerland AG, Cham, Switzerland, pp. 12. - 14.
11. Monteiro, A. C. B.; França, R. P.; Arthur, R.; Iano, Y. (2022). The Fundamentals and Potential for Cyber Security of Machine Learning in the Modern World in Kaushik, K.; Tayal, S.; Bhardwaj, A.; Kumar, M. (eds) Advanced Smart Computing Technologies in Cybersecurity and Forensics, CRC Press, Taylor & Francis Group, LLC, Boca Raton, USA, pp. 120. - 121.
12. Muñoz-González, L.; Lupu, E. C. (2019). The Security of Machine Learning Systems in Sikos, L. F. (ed) AI in Cybersecurity, Springer Nature Switzerland AG, Cham, Switzerland, pp. 47. - 48.
13. Raj, P.; Raman, A. C. (2017). Abusing the Internet of Things - Enabling Technologies, Platforms, and Use Cases, CRC Press, Taylor & Francis Group, Boca Raton, USA, pp. 1. - 3.
14. Shema, M. (2014) Anti-Hacker Tool Kit, Fourth Edition, McGraw-Hill Education, New York, USA, pp. 534.
15. Smyth, S. M. (2019). Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control, Routledge, Taylor & Francis Group, Abingdon, UK, pp. 21. - 23.
16. Wenger, A.; Cavelty, M. D. (2022) Conclusion: The Ambiguity of Cyber Security Politics in the Context of Multidimensional Uncertainty in Cavelty, M. D.; Wenger, A. (eds) Cyber Security Politics - Socio-Technological Transformations and Political Fragmentation, Routledge, Taylor & Francis Group, Abingdon, UK, pp. 239.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Siniša Franjić (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
