Preview

C Nachelle Digital Media And Cyber Crimes

Powerful Essays
Open Document
Open Document
3110 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
C Nachelle Digital Media And Cyber Crimes
Digital Media and Cyber-Crimes
Cletus Subetiq Nachelle
Instructor: Stephen Newsome
CMST 301 6981 Digital Media and Society (2152)
University of Maryland University College

March 22, 2015

Abstract
Technological devices and infrastructures such as the internet have led to their pervasive use across socioeconomic factors such as gender and age as well as geographical boundaries. The proliferation has led to a perfection of cyber-crime activities, which have threatened global economy. Cyber-crimes have increased so dramatically over the last few years, seemingly replacing the contemporary forms of organized crimes. Cyber-crimes are the intentional actions involving the use of computers, internet infrastructures and other technologies to promote criminal activities with adverse economic impacts on a third party. All cyber-crimes involve the use tools and techniques to perpetrate crime. The perpetrators execute a criminal plan referred to as the vector, to carry out a cyber-crime.
Introduction
Cyber-crimes can be divided into two broad categories; the first category involves attacks on computer hardware and software tools, such as botnets, network intrusions, and malware. The category involves cybercrimes of financial nature such as online fraud and penetration of online financial services (Brenner, 2010). Others include phishing, corporate account takeover and theft of intellectual properties. Cyber-crimes are committed across geographical boundaries, with the perpetrators taking advantage of the internet to propel their criminal activities. The convenience, anonymity and increased profitability of cyber-crimes have increased the proliferation of cyber-crimes in recent years. Eighty percent of modern cyber-crimes are estimated to originate from organized criminal activities. Prevalence of the crime can be attributed to the establishment of fraud-as-service, increased profitability and increasing diversification of the digital media platforms (ITU,



References: Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif: Praeger. David Elms, (2010) Media consumption on the increase. “The Guardian” 19 April. Retrieved from http://www.theguardian.com/business/2010/apr/19/media-consumption-survey ESET Research (2015). Cybercrime Trends & Predictions for 2015.Retrieved from http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/ Ghosh, S., & Turrini, E. (2010). Cybercrimes: A multidisciplinary analysis. Berlin: Springer. Information Resources Management Association. (2012). Cyber crime: Concepts, methodologies, tools and applications. Hershey, PA: Information Science Reference. ITU (2012).Understanding cybercrime: Phenomena, challenges and legal response. Retrieved From www.itu.int/ITU-D/cyb/cybersecurity/legislation.html Kshetri, N. (2010). The global cybercrime industry: Economic, institutional and strategic perspectives. Heidelberg: Springer. National Crime prevention Council (2012). Cybercrimes. Retrieved from http://www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity. Yan, Z. (2012). Encyclopedia of cyber behavior. Hershey, PA: Information Science Reference.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Cybercrime is defined as any crime that is conducted via the Internet or another computer network. When it comes to cybercrime it is very easy for someone to fall victim to it. We use computers for everything; searching the internet, shopping, accessing our bank accounts, email, and online gaming are some examples. Communication is faster and much more reliable than in the past which has allowed more to be accomplished in any given day. The problem is just like anything else; vulnerability. There are individuals that hack into computers as well as networks of businesses and government agencies. The problem is that sensitive data can be stolen and/or destroyed. There needs to be more focus on the security of computers and the internet.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    This paper was prepared and submitted for CJ360 Cybercrime Fall 2014, taught by Professor Alecia Schmidt.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    How to Report Internet-related Crime. (2005). Computer Crime and Intellectual Property Section of the Criminal Division of the Department of Justice website. Retrieved November 12, 2005 from, www.cybercrime.gov/reporting.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    References: Cybercrime. (2013). In C. Bates et al. (Eds.), Global social issues: An encyclopedia. London, United Kingdom: Routledge. Retrieved from http://ezproxy.apus.edu/login?url=http://search.credoreference.com.ezproxy2.apus.edu/content/entry/sharpesi/cybercrime/0…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    References: Taylor, R. W. et al. (2011). Digital Crime and Digital Terrorism, 2nd Edition. Boston, MA: Prentice Hall Publishing…

    • 611 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Crime Patterns

    • 382 Words
    • 2 Pages

    Now a day in this world cyber crime is on the rise. Everywhere you look everyone uses a computer for messaging, banking, keeping in contact with families, gaming, and many other things. Cyber crime is presenting big problems for criminologists nowadays, 1.) it is rapidly evolving, new things being built every day. 2.) It is difficult to detect through law enforcement channels, 3.) planning or coordinating its control demands technical skills that match those of the perpetrators.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cyber crimes here in the United States are becoming very dangerous and serious, this could include online scams, also here in the United States we are the highest target for cyber crimes. And sometimes, it is very hard to measure the extent of cyber-crime in the US, due to the fact that when authorities record cyber-crime, they don't necessarily record it as a computer-related offense. It is most often recorded as fraud or some other conventional crime. The people who hack alone cost the US billions of dollars every year.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I have been asked to write a paper concerning cybercrime in the world today. I will go over what cybercrime is, how much it is affecting the United States, possible ways of enforcement and why or why not enforcement would be effective.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Since the society has become progressively dependent on networks for business, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides information for decision-making and accountability to internal and external stakeholders providing the right conditions for decision making and ensures that no assets illegitimately exit the organisation. In terms of practice of business by networks, the security of information is important. This essay will first describe a related News story. Then, several ways of illegally getting access to essential information by hackers will be provided. Moreover, considering the formation and reality of network business, the essay will analyse how to guarantee the security of a company from two aspects, externally and internally. Finally, a brief conclusion will be provided.…

    • 1586 Words
    • 7 Pages
    Better Essays