slugA Study on Level of Knowledge Regarding Cybercrime Among Elderly Residing in Homes and Old Age HOMES
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
As the Internet, mobile phones, and other computer technologies have flourished, criminals have found ways to use them for old-fashioned goals such as theft, fraud, intimidation, and harassment. Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. Cybercrime includes any type of illegal scheme that uses one or more components of the Internet (chat rooms, email, message boards, websites, and auctions) to conduct fraudulent transactions or transmit the proceeds of fraud to financial institutions or to others connected with the scheme. The more and more use of internet by elderly has enabled them to make active role especially in health care, while the internet has contributed to the societal change and provided opportunities to revolutionized health care. For elderly, use of internet is more of an evolution than revolution. Elderly are found to be disproportionately affected by the cyber crime, and as they have more free time to spend on internet they are likely to have more chances of falling victims to cyber crime The finding of the study indicates that level of knowledge of cybercrime is medium among elderly residing in their homes whereas there is low level of knowledge among elderly residing in Old Age homes because of lack of availability of internet facilities. The aim of the study was to assess the level of knowledge of cyber crime among elderly residing in their homes and old age homes. A cross sectional study was used for data collection. 60 elderly residing in their homes and 60 elderly residing in old age homes were selected from different areas of Lucknow city. Total sample size was 120. The purposive random sampling technique was used to collect the data. After the collection of data, it was analyzed with SPSS (version 20) for Mean, Standard Deviation, and chi- square test. The study revealed that there is highly significant difference between level of knowledge and place of residence of respondents (the chi-square value for elderly residing in homes is 38.400 and Elderly residing in Old Age homes is 6.667 ) and df =1 at 5% level of significance.
Authors and Affiliations
Nabat Arfi, Dr. Shalini Agarwal
Big Data – Literature Survey
In the past few years, tremendous changes are happening in Cloud Computing, Big Data, Communication technology and Internet of things. Shift to the latest technology is envisaging new upcoming challenges. Big Data is b...
Comparison of Various Transformerless Full-bridge Topologies for Photovoltaic Grid -Tied Inverters
If there is no transformer is used in the single phase grid tied photovoltaic system, then the electrical connection live between the grid and the PV array. In this condition, the generated common mode voltage largely d...
Fuzzy Logic Controller Based Speed Analysis and Control of DC Shunt Motor
In this paper, various speed control techniques for a dc shunt motor namely conventional PID controller and fuzzy logic controller, using a PID controller and Fuzzy Logic Controller have been discussed and a comparative...
Development of Automobile Catalytic Converter during Last Four Decades --A Review
Awareness regarding atmospheric pollution effects on the environment and the health of humans, plants, animals and other living organisms and flora and fauna World over has inspired many researchers. Extensive research...
slugDetection of Cosmic Dust Attack in MANET under AODV Routing Protocol
The cosmic dust attack problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We show two feasible solutions. The main is to find more than one route to the destination. The another is to...