{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T15:55:18Z","timestamp":1765382118957},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323800","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T21:11:35Z","timestamp":1523481095000},"page":"474-480","source":"Crossref","is-referenced-by-count":5,"title":["Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat"],"prefix":"10.23919","author":[{"given":"Shusmoy","family":"Kundu","sequence":"first","affiliation":[]},{"given":"Khandaker Annatoma","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Tania Tahmina","family":"Jui","sequence":"additional","affiliation":[]},{"given":"Suzzana","family":"Rafi","sequence":"additional","affiliation":[]},{"given":"Md. Afzal","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Ishraq Haider","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SCADA","year":"0","key":"ref10"},{"journal-title":"Bangladesh bank heist swift software was compromised","year":"0","key":"ref11"},{"journal-title":"Cyber security companies","year":"0","key":"ref12"},{"journal-title":"Cyber security market report","year":"0","key":"ref13"},{"journal-title":"Capital Market","year":"0","key":"ref14"},{"journal-title":"Cyber security market report","year":"0","key":"ref15"},{"journal-title":"Ict ministry news","year":"0","key":"ref16"},{"journal-title":"Dhaka tribune news","year":"0","key":"ref17"},{"journal-title":"Bangladesh bank heist swift software was compromised","year":"0","key":"ref18"},{"journal-title":"Cyber crime scenario in bangladesh","year":"0","key":"ref19"},{"journal-title":"Cyber security market report","year":"0","key":"ref28"},{"journal-title":"Cyber crime problem areas legal areas and the cyber crime law","year":"2017","author":"azad","key":"ref4"},{"journal-title":"Cyber security market report","year":"0","key":"ref27"},{"key":"ref3","first-page":"1","article-title":"A decision support system for corporations cybersecurity management","author":"rold\u00e3?n-molina","year":"2017","journal-title":"2017 12th Iberian Conference on Information Systems and Technologies (CISTI)"},{"journal-title":"Wannacry cyber attack","year":"0","key":"ref6"},{"journal-title":"ACM Code of Ethics","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2017.8002519"},{"journal-title":"Petya virus new analysis","year":"0","key":"ref8"},{"journal-title":"Bangladesh Bank Attackers Used Custom Malware","year":"0","key":"ref7"},{"key":"ref2","first-page":"1309","article-title":"International cyber security challenges","author":"dui?","year":"2017","journal-title":"2017 40th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO)"},{"journal-title":"Countries which are most vulnerable to cyber attacks","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.55"},{"journal-title":"Ict amendment 2013","year":"0","key":"ref20"},{"journal-title":"Ict act 2006","year":"0","key":"ref22"},{"journal-title":"Anti pornography act 2012","year":"0","key":"ref21"},{"journal-title":"Cyber security market report","year":"0","key":"ref24"},{"journal-title":"National ICT Policy 2009","year":"0","key":"ref23"},{"journal-title":"Ict act 2009 bangladesh","year":"0","key":"ref26"},{"journal-title":"Ict act 2006 bangladesh","year":"0","key":"ref25"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323800.pdf?arnumber=8323800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:11:35Z","timestamp":1598249495000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323800","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}