google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0 google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0 Colombo Stock Market Financial Research google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0
google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0

Sunday, September 2, 2018

A Study of Reported Cyber-crime in Sri Lankan Police Station


In this paper we firstly focus on the definition of Cyber-crime and various kind of Cyber-crime such as hacking, E Fraud preparing the Fake accounts and etc. The main purpose of this study is to identify the relationship between the police department effectiveness and the reported Cyber-crimes. To successful the purpose of this study I used the both quantitative and qualitative approach such as questioner, interviews and etc. The supportive objectives of this study are the find out the most common types of cyber-crime in the Sri Lanka, how the Sri Lankan police handle the Cyber-crime cases and what are the mainly impacted ways or sources for increase the Cyber-crime in Sri Lanka. In addition to that we examine the nature of Cyber-crime based on the latest police records and various secondary data sources regarding the Cyber-crime within the Sri Lankan society. In Sri Lanka the effectively work institutions for prevent the cyber-crimes and cyber incidents are the CIDs and the CERT-CC. Then we will conclude that the mainly impacted ways for increase of internet usage, motivation of people do new things and due to the carelessness. And also we conclude that there so many cyber cases are reported to the CID Crime unit and also various incidents are reported to institute of CERT-CC. The CID is mainly impact to the resolve cyber-crimes by using the various legal actions and CERT-CC is give the technical support for reduce the cyber incidents. Due to the efficiency of these intuitions, in the Sri Lankan society most of cybercrimes and cyber incidents were less than the previous years. And also we found that there is a link between the CID and CERT-CC to resolve these crimes and to reduce the occurrence of these crimes in the future.

An Analysis of Cyberbullying Sensitivity Levels of University Students of Sri Lanka


While current communication technologies such as mobile phones, the internet and social network sites provide new opportunities for learning and interaction, they may also pose a threat to personal security. The rapid increase in access to information and communication technologies by young people can also cause those technologies to be used for bullying their peers leading to cyberbullying. The purpose of this study is to determine the cyberbullying sensitivity levels of university students and their perceived social supports levels, and analyze the variables that predict cyberbullying sensitivity. In addition, whether cyberbullying sensitivity levels and social support levels differed according to gender was also investigated.

The aggregate level of perceived social support of the university students were identified based on three main variables. They are family support, friends and support from the external environment. Data was collected through a questionnaire and the responses were scored on a five point Likert scale. The population of the study comprised of government university students of Sri Lanka. Among them 50 students voluntarily participated in this study. Thereafter the predicting factors that affect cyberbullying sensitivity were recognized through a stepwise regression.

The findings of this research show that the cyberbullying sensitivities of the students were high but their levels of the perceived social support were low. However the cyberbullying sensitivities of the female students are higher than the male students. Further the levels of social support did not differ according to the gender. Among the factors friends support was found to be the most impactful variable.

An analysis of the computer disaster patterns and its impact on the information management systems of businesses in Sri Lanka


With the popularization of the internet, cyber criminals use a wide range of computer disasters to attack businesses for various reasons such as financial gains, competitive gains, business disruption or political agendas. Cyber criminals often target the computer-based information management systems of businesses in order to achieve their unethical purposes, because it is the easiest and the most effective way to disrupt the overall business process of a particular organization. Furthermore, “Computer disasters” does not only cover the disasters which occur through the internet. There is a component of disasters which occurs without having any intervention of internet, including hardware faults, human negligence and natural disasters. Such kind of computer disasters is also capable in affecting the information management systems. After considering above facts, we can conclude that the computer-based information management systems are always in a risky position. Therefore the main objectives of this research are to identify the major types of computer disasters which can affect businesses, their adverse impacts on the information management practices of a business and their adverse impact on the overall capability of such information system to facilitate the entire business process.
In order to gain a sufficient understanding in this field, firstly, most common variables have been identified through analyzing the past literature stated by various researches. That foundation supported to develop an effective conceptual framework for this study. Thus, suitable hypothesis were developed in order to check whether there are relationships between the independent variables and the dependent variable. A sample was used to carry out the investigation in Sri Lankan context. The study was limited to small scale because of the limited time period and the assignment restricted objectives. The convenience sampling method has been used to generate the sample which consisted of 60 officers who were bearing a management position in their respective organizations. The study was executed by a survey carried out through a questionnaire. A wide range of significant findings could be obtained at the end of the analyzing process of primary data. Finally, better conclusions have been made based on those findings. 

JAT Holdings PLC

  ABSTRACT   This report presents a comprehensive analysis of five consecutive annual reports of JAT Holdings PLC, a leading company...