About the Journal

Editorial Team

Information technology (IT) is the use of computers, storage, networking and other physical devices, infrastructure and processes to create, secure, exchange, or access digital data.

Cyber Crime, the fastest growing criminal activities across the world is carried out online, using the internet through computers. Cyber-enacted crimes steals confidential information that is stored online. Ccybercriminals use a number of methods to hack into a computer system or network. The common types of cybercrime include hacking, spread troublesome viruses and malicious online content, online scams and fraud, identity theft, attacks on computer systems and illegal or prohibited online content. In order to protect the privacy and rights of the victims, the legal community has devised laws against cyber criminals.

Cyber Crime and Information Technology is a peer- reviewed, open access publication that includes applied, theoretical, analytical, operational, subjective, prospective research work. The journal helps its readers to frame the strong understanding of the cyber security, cybercrime, digital evidences, law enforcement challenges which are growing in scope and urgency as countries around the world are becoming increasingly dependent on digital information and networks and also managing and processing electronic information in the business world. The journal is committed to provide quality empirical research and scholarly review articles.

Aims and Scope

Cyber Crime and Information Technology aim to focus on all aspects of cyber crime, internet frauds, identity theft, etc. in order to contribute to better understanding of the Internet frauds and cyber crime and the use of information systems in storage, protection and sharing of digital information.

Subjects covered by the Cyber Crime and Information Technology

  • Hacking
  • Phishing Scams
  • SPAM
  • Information warfare
  • Computer security
  • Webcam manager
  • Identity Theft and Credit Card Fraud
  • File hijacker
  • Keylogging
  • Cyberextortion
  • Screenshot manager
  • Ad clicker
  • Cyber Terrorism
  • SQL Injections
  • Virus dissemination
  • Fraud
  • Logic bombs
  • Cyber stalking
  • Data diddling
  • Malicious Software
  • Copyright infringement
  • Unwarranted mass-surveillance
  • Sextortion
  • Cyberwarfare
  • Internet Pornograph
  • Child Grooming
  • Espionage or spying
  • Awareness
  • Intelligence
  • Computer trespass
  • Internet homicide
  • Cyber Law
  • Data storage
  • Data retrieval
  • Data transmission
  • Data manipulation
  • Computing
  • Computer Systems Analyst
  • Computer Forensic Investigator
  • Remote / Distributed Working
  • Digital Systems Technology
  • Embedded Systems
  • Management Information Systems
  • Networking
  • Information and Communications Technology
  • Software Development
  • Systems Analysis
  • Network Security
  • IT Entrepreneurship and Management
  • Forensics

Open Access Journals

Recently Released Issues

Social Network

Loading ....
Loading ....
Loading ....

Abstracting and Indexing

Boffin Access use Crossref Similarity Check for averting plagiarism


Boffin Access Limited is committed to maintaining the integrity of the scholarly record to researchers. Therefore violation of professional ethical codes may lead to retract articles. Article(s) may be retracted if it is found to have serious flaws, reported misconduct research, constitute copyright infringement and plagiarism.
To help avoid the incorrect or misleading publications, please drop your message to

Send Information

Subscribe to our Newsletter

Enter your e-mail address to stay informed about published articles, issue releases and latest updates on journal activities.


We openly welcome feedback and constructive criticism. Your compliments, concerns and suggestions regarding our services will prove enormously helpful in making them even better.

Do you have an idea or suggestion that can influence the Open Access community? Send an email to: support@boffinaccess.org