Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Effects of cyber crime
Effects of cyber crime
Effects of cyber crime
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Effects of cyber crime
Introduction
“Whoever commits a fraud is guilty not only of the particular injury to him who he deceives, but of the diminution of that confidence which constitutes not only the ease but the existence of society” -Samuel Johnson
In our ever changing world, technological advances over the past twenty years have paved the way for and deepened our reliance on the digital and computerized lifestyle; electronic mailing, online social networking, computer gaming, e-book reading, mobile phoning, etc... Technology has modified almost every aspect of the human interaction, even our money has changed to bits and bytes that can be transferred around the world or to another bank account with a few taps on a key board and clicks of a mouse; you don’t even have to get your wallet out. With such advances in the way the business is conducted, so too have the methods of which criminals and fraudsters alike who have adapted their methods to scam, con and swindle the unsuspecting and vulnerable.
Digital fraud can be considered as any type of deceitful and often illegal action that is performed by way of the internet, software and hardware that uses someone or the personal information they have for financial or material gain. In today’s society, digital crime is a very real threat and has incredible consequences for government, businesses and the general public at large. Hacking, skimming, and phishing have become terms that are all too familiar to anyone with a computer, debit or credit card, and even an email account. But, what do these terms all have in common? And, who is on the other side of your computer screen, ATM line, or sending those annoying spam messages?
The technology intensive society that we live in demands that we keep ou...
... middle of paper ...
...activities and attacks are initiated in foreign countries, but the anonymity of the internet allows fraud to be masked and less traceable. Fortunately, there are security measures that can be taken by the public and organizations to prevent, protect and pursue fraud.
Works Cited
1. Adams, Robin. Prevent, protect, pursue – a paradigm for fighting fraud. Computer Fraud & Security. July 2010. pp 11.
2. Alta. health files hacked, maybe stolen. Anonymous. Dawson Creek Daily News. July 9 2009. pp A.3
3. Marck, Paul. A crime that does pay. National Post. Mar 12, 2009. pp FP.12
4. Schmidt, Sarah. Identity theft victims total 1.7 million:survey. Star - Phoenix. Nov 18, 2008. pp. C.4
5. Thompson, Tim. Adding up the real cost of fraud. Computer Fraud & Security. April 2009. pp12.
6. Wagner, Cynthia. Internet fraud on the rise. The Futurist. July/August 2009. Pp 15.
Fraud is one of Canada's most severe acts of financial criminality as the economic impact of this crime could potentially handicap an entire society. According to the Canadian Anti-Fraud Centre Annual Statistic Report (CAFC), a report established to monitor fraud with the aid of the Royal Canadian Mounted Police (RCMP), and Competition Bureau of Canada, it reported an annual loss of 74 million dollars affecting over 14,472 victims (Canadian Anti-Fraud Centre, 2014). Given this alarming statistic, it is worrisome that we as a society still ignore or turn a blind eye towards those who commit fraud as seen in the low conviction (Canada Revenue Agency, 2014), and focus our efforts on petty thefts as seen with the high rate of convictions
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
Identity theft is a term used for describing criminal that uses individual’s identity without consent. A common crime of identity theft would be identity fraud. Many of the crimes are regularly connected with money-related issues (Reyns, 2013). With technology being commonly used nowadays we are getting more dependent on it for business, financial, medical, and other forms. As a result this became a target for identity thieves as well. The Internet provides us information and accessibility, but information being stored on the Internet eas...
Harrell, E., & Langton, L. Bureau of Justice Statistics, Programs. (2013). Victims of identity theft, 2012 (NCJ 243779). Retrieved from website: http://www.bjs.gov/index.cfm?ty=pbdetail&iid=4821
Hanson, J. R. (n.d.). Fraud or confusion? RDH Magazine, 19(4). Retrieved 3 15, 2014, from http://www.rdhmag.com/articles/print/volume-19/issue-4/feature/fraud-or-confusion.html
The Internet plays the biggest role in identity theft. On the Internet, a thief can hide from detection while stealing peoples’ identities from their homes, being able to steal peoples’ information one by one “then disappearing into another identity,” (Vacca 60). Internet fraud consists of two phases. The first being spoofing where a fake site is set up made to look like the real thing. Once that is completed the second phase, phishing, begins. This usually starts with an email that uses the
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Journal of Internet Banking & Commerce, 18(2), 1-11. Retrieved from http://www.arraydev.com/commerce/jibc/. Sullivan, C. (2009). The 'Standard'. Is identity theft really a theft? International Review of Law, Computers & Technology, 23(1/2), 77-87.
Attention Getter: 7% of people 16 years or older were victims of identity theft in the year 2012 approximately 16.6 million people.
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
Every day, citizens are constantly losing money and being victimized due to these fraudulent activities. Cyber crime, including fraud, identity theft, stalking, and hacking, is a growing problem that can be prevented by taking the proper precautions. The biggest cases of cyber crimes are cases of fraud. Online fraud comes in many forms. It ranges from viruses that attack computers with the goal of retrieving personal information, to email schemes that lure victims into wiring money to fraudulent sources” (What is “online fraud”).
Wee, H. (2014). How The Threat of Cyber Crime is Heightened for Mainstreet . CNBC .
These types of crimes have become a matter of importance for the consumers as well the business firms because it involves large eviction of the amount in terms of money. In these types of crimes, computer and Internet are the primary factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008).
...ng to many individuals who have suffered from hacking, phishing, scams, identity theft, fraud etc. Computer crime describes a very broad category of offenses, which include anything that requires an electronic device or the Internet. Cybercrime is now a global issue and it has a major impact on every individual or business that interacts with technology and the World Wide Web. When important information is stolen, not only are individuals at risk of becoming part of greater crimes but it can also affect an entire country when its national secrets are stolen. In the end I may conclude that computer crime is a dangerous crime that all individuals should be aware of due to the many devastating results it can cause. Cybercrime cannot be stopped due to the high levels it has reached, but immunity can be used to keep safe from it or at least keep individuals less at risk.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.