What Is Cloning | IGI Global

IGI Global Scientific Publishing IGI Global Scientific Publishing Cart Sign In EN
  • English
  • 中文
Cart Sign In EN
  • English
  • 中文
  • Explore Our Content
    • Books
    • e-Book Collections
    • Open Access Journals
    • OnDemand
  • Who We Serve
    • Libraries
    • Researchers & Faculty
    • Healthcare & Medical
    • Corporate & Government
  • Resources
    • Sign-Up
    • Newsroom
    • Catalogs
    • Title List Downloads
    • Distribution Partners
  • About Us
  • Publish With Us

Shortly You Will Be Redirected to Our Partner eContent Pro's Website

IGI Global Scientific Publishing offers a range of editing services in partnership with eContent Pro, which specializes in English language copy editing. eContent Pro is pleased to offer all past and present authors and editors of IGI Global Scientific Publishing an exclusive 25% discount (automatically applied at checkout) on these services.

Learn More and Upload Your Manuscript

Search the World's Largest Database of Information Science & Technology Terms & Definitions InfInfoScipedia LogoScipedia A Free Service of IGI Global Scientific Publishing House Below please find a list of definitions for the term that you selected from multiple scholarly research resources. What is Cloning Chapter 69 Encyclopedia of Criminal Activities and the Deep Web Creating a replica of websites or cards with intent to defraud. Published in Chapter: Investigating Cybercrime in Nigeria Mufutau Temitayo Lamidi (University of Ibadan, Nigeria) Source Title: Encyclopedia of Criminal Activities and the Deep Web Copyright: © 2020 | Pages: 16 DOI: 10.4018/978-1-5225-9715-5.ch069 Abstract Advances in ICT have brought both joy and sadness to individuals and organizations. Cybercrime, a byproduct of advances in ICT, is a relatively new area where crime flourishes in Nigeria, and many such cases have been reported by victims at different social forums. This study investigates cybercrime as it affects individuals and the society at large with a view to exposing the tricks often used by fraudsters and offering possible solutions. Data were collected from personal experiences (phone calls and text messages), WhatsApp messages and stories posted on Facebook and Nairaland forums by victims. They were analysed descriptively. The article suggests that tougher legislative sanctions and strict law enforcement by government can curb this menace. Also, through grammatical competence, improved morality as dictated by culture, logical reasoning, and avoidance of greed, individuals can detect fraudulent proposals and escape cyberattacks. Full Text Chapter Download: US $37.50 Add to Cart

Related Books View All Books

Deepfakes, Smart Narratives, and Building Trust in the Age of AI View Title Demystifying the Darknet View Title Integrating AI and Six Sigma for Strategic Security View Title Cybersecurity Risks in Organizational Digital Transformation and AI Infrastructure View Title Innovating AI-Driven Security for Computing, Games, and Data Science View Title Enhancing Cybersecurity Risk Governance With Blockchain and AI View Title AI-Enhanced Biosurveillance View Title Advancing Cybersecurity at the Intersection of Parallel Computing and Blockchain View Title Organized Cybercrime View Title Cybersecurity, AI Collaboration, and Software Practice for Healthcare View Title

Related Journals View All Journals

International Journal of Cybersecurity and Risk Assessment (IJCRA) View Title International Journal of Security and Privacy in Pervasive Computing (IJSPPC) View Title International Journal of Cyber Research and Education (IJCRE) View Title International Journal of Blockchain Applications and Secure Computing (IJBASC) View Title eContent Pro Discount Banner InfoSci OnDemand ECP Editorial Services AGOSR Select Currency
  • United States Dollars
  • Australian Dollars
  • Canadian Dollars
  • Euro
  • Pound Sterling

Tag » What Is Cloning In Cyber Security