Page 31 - index
P. 31







With this illustration, we plan to complete our overview how an organized crime hierarchy
appear and how cyber technologies could be used within each of the levels.


Instead of conclusions

The purpose of this article would be to suggest how the structure of an organized crime group
looks like in the practice and also provide some review on applications of cyber systems in a
modern criminal environment.


About The Author


Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications. She writes for Australian and
American security magazines. She is a volunteer with the American corner
of Subotica as well as a lecturer with the local engineering society.

































31 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   26   27   28   29   30   31   32   33   34   35   36