CYBERCRIME IN RELATION TO BUSINESS

Document Type:Thesis

Subject Area:Technology

Document 1

When an individual commits the crime of identity theft, there are several methods of obtaining a target’s personal information. Many of the techniques involve use of a computer or a network. However, many of the techniques have nothing to do with computers other than the information stored in text files on a computer’s hard drive. Therefore, this paper shall focus on the pertinent issues related to cybercriminal that organizations face, the ethical issues surrounding it and the solutions related to combating this crime on global scale. Background of Cybercrime The introduction of the digital computing age has led to the development of modern day concepts of Information society. These offenses include criminal activity against data, infringement of content and copyright, fraud, unauthorized access, child pornography and cyber-stalking.

Sign up to view the full document!

There are two main categories of cybercrime namely, those that target computer networks or devices such as viruses, malware, or denial of service attacks. The other one relates to crimes that are facilitated by computer networks or devices like cyber-stalking, fraud, identity theft, extortion, phishing and theft of classified information. In most instances, financial organizations were they key targets by cyber-criminal with the intentions of extorting money from potential customers. The criminals targeted key financial information of individuals, organizations or entities in order to gain access to the systems and defraud them. This is a kind of online harassment wherein the victim is subjected to barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the internet to stalk.

Sign up to view the full document!

Identity theft also, falls in this category. This affects most people using the internet for cash transactions and banking services. This is the most common of all the cybercrimes. For instance, a security consultant professional that works for several firms offering the same service might be in such dilemma while offering the same service to all his or her customers. According the (International Journal of cyber criminology, 2017, 17), IT managers or security professionals working for organizations always find themselves in situations deemed unethical hence making it difficult for them to make independent decisions. In this case, they might end up being the victims of cybercrime in one way or the other. For instance, knowledge, skills, and information are developed over a particular period of time by an individual working on a certain project within a certain firm or organization.

Sign up to view the full document!

As an IT manager or security professionals, the individual might be tasked to reengineer the marketing operations of a particular organization. However, the manger might find himself or herself in a fix when a decision has been made only to realize that it was fraudulent. Further, as managers, there is a lot of communication that happens within the organization with their input involved. In this regard, they are exposed to many emails for instance that they are supposed to respond to. However, unsuspectingly, the manager might open a spam email that might cripple the entire organizations activities leading to massive losses. Case Scenario For most managers or individuals working within a bank sector, confidentiality of customer information possess as a big challenge to them.

Sign up to view the full document!

For instance, many organizations are in the process of introducing anti-spam software into the delivery process. This helps in contravening the long-standing end-to-end principle of the internet that is freedom of movement across the network to its nodes while leaving receipt to the end user. In addition, most technologically savvy institutions are using software devices that identify and track the appropriation of various types of electronically conveyed intellectual property with increasing levels of efficiency. This helps in curbing activities related to cybercrimes to the targeted groups. Similarly, in order to avert the threat caused by cybercrime, there is need to continue to develop insight into the behavior of the contemporary cybercriminal by all means of criminal research, intelligence analysis, and the profiling techniques.

Sign up to view the full document!

In addition, organizations should design vulnerabilities out of technologies and environments that are in development. Further, law enforcement must work closely in partnership with those that influence the future business and operating environment. This will make all the concerned to anticipate changes in criminal behaviors and technological misuse. Further, personal information of employees such as their background and compensation in case of peril should be secured by authorized personnel. Regulations concerning the handling of data should be stipulated to the entire workers to avoid leaking of confidential information. Within the investigations of cybercrime, close monitoring and cooperation between countries is important. The available mutual legal assistance agreements that rely on formal, complex and often time-consuming procedures do not cover the prerequisite computer specific investigations.

Sign up to view the full document!

Therefore, it is vital to set up quick response to incidents as well as cooperate internationally to cybercrime related activities. The technological savvy individuals are always embraced with new technological innovations making it hard to curb this menace as they invent new techniques of accessing and acquiring vital information from such entities. However, in order to mitigate some of the risks emanating from these malicious activities by cyber criminals in future, there should be a multi-disciplinary approach in tackling.  Cybercrime: the transformation of crime in the information age. Cambridge, UK, Polity. Ford, R. C. , & Richardson, W. Volume: 11 Issue: 2. Available at: http://www. cybercrimejournal. com [Accessed 1 April. 2018] Gercke, M. uk/jilt/2009_l/olowu [Accesses 1 April. 2018] Leyden, J. Booming Cybercrime Economy Sucks in Recruits’ Crime.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable