StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cybercrime - Research Paper Example

Cite this document
Summary
Cybercrime Cybercrime, or computer crime is an issue of growing importance today. With the growing use of technology, new issues and problems are developing. Cybercrime, as the name suggests, is an illegal or immoral act that involves a computer or a network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Cybercrime
Read Text Preview

Extract of sample "Cybercrime"

Download file to see previous pages

People want their personal information to remain that way, personal. But can this really be achieved? Daily there are headlines telling us of yet another story of information being stolen by a criminal or looked upon by the government. There’s also the issue of wiretapping phones and having hidden security cameras. Some time ago, AT&T mentioned, “While account information may be personal to you, these records…are owned by AT&T and it may disclose such records to protect its legitimate business records, safeguard others or respond to legal process.

” (Lamb, 2011) As history shows, there are truly malicious people among us, and even the most meticulous people can make mistakes, and security experts are becoming very wary of the privacy future for America (Marks, 2008). With such statements, it’s easy to feel that privacy may as well become a thing of the past. Cybercrime can be done in different ways and can occur anywhere. There are two categories of cybercrime. The first type involves crimes in which information and communications technologies are the target of offenses.

Examples of this are computer vandalism, viruses, and the like. The other type involves crimes where technologies are used as tools to commit an offense, such as computer hacking. These two types are the umbrella categories, but there are many other subcategories involved in cybercrime. The computer may be the agent of the crime, the facilitator of the crime, or the target of the crime. The crime may take place in one location or sometimes in a network of locations. The end results of this type of crime include, to name a few, cyber drug trafficking, child pornography, identity theft, and phishing.

But exactly what is being done to fight this? One may ask. The President’s Critical Infrastructure Protection Board (PCIPB) has come up with a draft plan for upgrading the nation’s cyberspace infrastructure. This strategy calls for the cooperation of home computer users, business users, state and local governments, with the overall goal being empowering all Americans to secure their portions of cyberspace. The executing of the plan requires six steps, they being: educating and creating awareness among users of cyberspace, producing more secure technologies, developing a large and well-qualified cyber security workforce, fostering responsibility among individuals for security at all levels, increasing accountability and updating security practices, and finally developing early warning and sharing of information that will help with early detection of attacks and leading to the appropriate response.

The US also seeks to ask for the participation of foreign counterparts as well in a peer-to-peer dialogue that aims to make an effective business case for cyber security and attain successful means for partnering with governments on cyber security. (Washington File, 2002) Other states have enacted what is known as a “security freeze” legislation which allows its citizens to lock their credit files against anyone who tries to open a new account or gain new credit, and they’re hoping this will keep thieves from exploiting stole Social Security numbers.

(Lamb, 2006) There are also propositions of making of a “new internet”. “The whole notion of privacy and security has become so elusive that the

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybercrime Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1422489-cybercrime
(Cybercrime Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/family-consumer-science/1422489-cybercrime.
“Cybercrime Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/family-consumer-science/1422489-cybercrime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybercrime

Cybercrime and Digital Evidence

Date Computer Forensic Analysis: cybercrime and Digital Evidence The computer forensic analysis is a computer science field that deals with investigation of computer related acts.... Extraction of such data and files are avenues that cybercrime investigators should deploy to prosecute the criminals.... Therefore, the public or persons who have experienced cybercrime related activities must not serge on the pretext that the suspected criminal has deleted the information they used against them, but they should report the same since such information could be retrieved for further actions....
3 Pages (750 words) Assignment

Bank Call Center Cybercrime

There has been the tendency by human being to engage in certain criminal operations which have high rate of return and low risks.... Criminal activities which involve the use of computers are referred to as cyber crime.... Cyber criminals see such operations as stealing of financials information and hacking into other networks as profitable business....
5 Pages (1250 words) Essay

Resolving Issues Related to Cybercrime

In order to combat cybercrime, international cooperation is necessary.... Authentication mechanisms are also instrumental in preventing various forms of cybercrime.... hellip; cybercrime takes the form of defrauding bank accounts that are online and the illegal downloading of music files.... The creation and distribution of viruses on computers and exposure of confidential information pertaining to businesses amount to cybercrime....
10 Pages (2500 words) Research Paper

Cybercrime and Strategic Decision Making

This essay cybercrime and Strategic Decision Making discusses the unabated technological advancements in computer systems along with rapid changes in the internet and electronic communication which has been playing ever-increasing role in the recent phenomena.... The discussion focuses on producing a comprehensive report on cybercrime and hacking in terms of enterprise-wide strategic decision making.... The digitalization of the world has lead towards the emergence of new and potential threat of cybercrime....
6 Pages (1500 words) Term Paper

Effects of Cybercrime

According to Brenner, cybercrime, commonly known as e-crime/computer crime, is a criminal act whereby computer or computer networks serves as a target, location, means or as the source of the activity.... Some of the effects of cybercrimes are: The greatest effect of cybercrime is the loss of intellectual property as well as confidential information of the business.... Partially, cybercrime is not a zero-game because the stolen information is not fully gone....
5 Pages (1250 words) Essay

Cybercrime and Privacy

This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole.... Additionally, the writer of the paper will debunk some of the myths related to cybercrime.... However, adjustments need to be made to stop cybercrime, but they also need to be reasonable in terms of the rights of internet users.... This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole....
5 Pages (1250 words) Term Paper

Tracking the Cybercrime Trail

cybercrime is one security risk that has been… This fraud occurs as a result of increased usage computers and internet.... In this assignment will tackle a number of questions with regard to an article by Sartin, Bryan about Tracking the cybercrime Trail: In Addition to Knowing How to Follow the Bits of Evidence, The paper "Tracking the cybercrime Trail by Bryan Sartin" is a good example of an article on law.... cybercrime is one security risk that has been discovered....
3 Pages (750 words) Case Study

Cybercrime Security Threat

This review is about the cybercrime known as computer crime involves misuse of the internet through a computer on the network.... Due to loss accrued in cybercrime, companies must use hi-tech means to combat the crime.... The crime is commissioned in different ways like; hacking, identity theft, and confidential information theft....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us