Studyspark Study Document

Cybercrime Is a Concept That Essay

Pages:10 (3003 words)

Sources:10

Subject:Crime

Topic:Cyber Crime

Document Type:Essay

Document:#73147129


Most of these systems should be programmed to prompt for username and password in order grant access.

This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard-

to- guess alpha numeric characters

Organizational techniques of prevention

In order to combat cyber crime, various governments and organizations should come up with special departments and units that target cybercrime. An example would be the setting up of Cybercrime Prevention and Fighting Center by the Taiwanese government so as to tackle cyber crime (Chung et al., 2004). Special cyber crime prevention units should be set up by various governments in order to deal with the menace. Organizations must take various necessary to protect their interests. The initial step is to understand the seriousness of the threats caused by cyber crimes to the organizational data, assets and processes. The second step is to shift their protection form a security-based approach to one that leans more towards a risk-based approach. They should therefore spend their budgets as well as apply their resources in the mitigation of the risks that face their business enterprises. The third step involves the knocking down of all the barriers that are associated with the non-effective approaches used in dealing with threats posed by cyber crime. The sharing as well as the combining of data throughout the entire organization structure like data on fraud, information security, human resources and loss prevention is crucial. This should be carried out while amalgamating the moves with various external sources in order to strengthen the capacity to perform certain crucial value-added organizational analysis. This juncture should be punctuated with the prioritization of the risks and then their incorporation into the business decision making mechanisms. This should be done while managing them appropriately with the affectively and efficiently allocated resources. Organizations must focus their efforts to data/information gathering as well as analysis with attention placed on the methods of identifying the cybercrimes and the real-time monitoring of the essential assets.

Collaborative efforts

In order to effectively combat cyber crime, it is essential that various principal groups be involved in the process. These include network infrastructure providers. This is because network Internet providers can effectively influence the online behavior via 'contractual governance'. The Internet Service Providers (ISPs) can aid in the prevention of cybercrime through the use of special terms on their contracts with their clients.The conditions of the market are what dictates the terms coupled with the law requirements.The Internet Service Providers (ISP) are the ones who have the responsibility of deterring the incidents of cybercrimes commited through their service via a contractual agreement with conditions that are laid down in the contracts by the telecommunication providers who host the various internet services. The ISP can also use their strategic role in the provision of communication services to deter cybercrime by employing a variety of software solution. These are through the use of effective security systems thatuse efficient spam filters. The various security organizations should also engage in governance (contractual) upon its member organization as well as non-members so as to protect their interest. through the use of criminal prosecution in instances of extreme transgression. The corporate security firms should deploy a wide range of software.

The non-governmental and other non-police organizations are the other group that is influential in the prevention of cyber crime. Internet Watch Foundation (IWF) is a perfect example of an organization that provides governance under the influence of the mandate that is given by the United Kingdom ISPs., the United Kingdom Government as well as the Law. This group works with the police in the police service through the processing and receiving of reports of various content-related offences such as child pornography as well as racist materials via a special online facility. If a certain act is deemed actionable as a result of a judgment by a an operative who is highly trained. The Internet Watch Foundation adopts the necessary action of passing the message to the offenders of the ISP or by issuing an alert to the appropriate hotline numbers who fall in the appropriate jurisdiction of the offender. The details of the offending site may also be reported to the police. The contributions of the IWF towards cyber crime are geared towards prevention as well as the creation of awareness.

The non-police (governmental) groups provide governance via use of laws, rules as well as threats of prosecution. They are never referred to as police per se. They include agencies like Postal Service, Customs as well as Trading Standard organizations. The public police organizations even though located in different states having different definitions of legal jurisdictions should nevertheless work together via the networked transnational police organizations like the Interpol and Europol to combat cybercrime. They can use a wide range of softwares in their protection, collection of evidence and the investigation of incidents as well as the proactive handling of cybercrime concerns.

Internet governance can provide an effective way of combating cyber crime. The detriment of this are however associated with lack of freedom and colonization of the cyber space by authorities. The concept of internet governance is known to possess a huge sense of order that emanates from the existence of a sophisticated arrangement of highly networked security nodes that are to be part of a continual process geared towards the shaping of virtual behavior as pointed out by Walker & Akdeniz (1998, p. 8). This is to transcend the usual state and non-state binary as well as state sovereignty. The networked relationship has to be between contributors who are heterogeneous to the governance process and they should function as a single entity but could have no unifying factor among them (Haggerty & Ericson, 2000).

It is worth pointing out that the relationship that exists between technology and police is a complex one. It is true that police were instituted in order take care of cases of social disorder and unrests resulting from the technologies that accompanies this age of industrial revolution. The major problem that the police face as evident from the complaints by law enforcement agencies is the lack of adequate facilities to enable them keeps up with the works of criminals (Sheptycki, 2000). It is important that modern information technology equipment be acquired in order to assist the police in the tackling of cybercrimes.

Conclusion

The fight against cybercrimes is a very protracted one that requires the contribution of everyone involved in the cyber space activities. The complexity of the crime and the lack of a clear framework to deal with its effects make it necessary for the world to come up with certain minimum security standards to be adopted by individuals and corporate bodies in the fight against cybercrimes. Law enforcement agencies must also be brought board using a unified command post as well as the use of a unified cyber legislation to be used in the handling of transnational cyber disputes. The problem of cybercrime can never be fully eliminated but it can surely be checked so that it does not undermine the security of information that is being passed on the internet or proprietary data held on computers. There is a need for individual, corporations and internet service providers to collaborate with the government in collectively fighting cybercrime.

References

Chung, W., Chen, H., Chang, W., & Chou, S. (2006). Fighting cybercrime: A

review and the Taiwan experience, Decision Support Systems, 41 (3),

669-682.

Cobbs, RW (2003). Cyber Security: The Status of Information Security and the Effects of the Federal Information Security Management Act (FISMA) at NASA

Davis, R and Hutchison, S. 1997. Computer Crime in Canada. Toronto: Thomson Canada

Limited.

Gibson, S. (2006). Stepping up the Effort to Beat Cyber-Crime. Eweek.com.

Haggerty, K.D. And Ericson, R.V. (2000), the surveillant assemblage. The British Journal of Sociology, 51: 605 -- 622.

Home Office (2010). Cyber Crime Strategy Retrieved January 21, 2011 from http://www.official-documents.gov.uk/document/cm78/7842/7842.pdf

Kowalski, M. (2002). Cybercrime: Issues, data sources, and feasibility of collecting police-reported statistics. Minister of Industry, Catalogue Number 85-558-XIE.

Ottawa, Ontario, Canada: Statistics Canada, Canadian Centre for Justice

Messmer, E (2010). Cybercrime costs a business U.S.$3.8 million a year, study finds January 21,

2011 from http://www.cio.co.ke/Top-Stories/cybercrime-costs-a-business-us38-million-a-year-study-finds.html

New Scientist, Reed Business Information UK, Ltd. (2005). Gaping Holes in Internet Security.

New Scientist, 188 (2531/2532), 1.

Poneman Institute (2010). First Annual Cost of Cyber Crime Study Benchmark Study of U.S.

Companies http://www.arcsight.com/collateral/whitepapers/Ponemon_Cost_of_Cyber_Crime_study_2010.pdf

Sheptycki, James. 2000. "Policing the Virtual Launderette: Money Laundering and Global

Governance." Pp. 134-176 in Issues in Transnational Policing, edited by J.W.E. Sheptycki.

London: Routledge.

Vogel, J (2007)Towards a Global Convention against Cybercrime. First World conference of Penal law. Penal Law in the xxist century. Quadalajara (Mexico), 18-23 November 2007

Walker, C., and Akdeniz, Y. (1998), "The governance of the Internet in Europe with special reference to illegal and harmful content" Criminal Law Review (Special edition, London:

Sweet & Maxwell), pp.5-18.


Sample Source(s) Used

References

Chung, W., Chen, H., Chang, W., & Chou, S. (2006). Fighting cybercrime: A

review and the Taiwan experience, Decision Support Systems, 41 (3),

669-682.

Cobbs, RW (2003). Cyber Security: The Status of Information Security and the Effects of the Federal Information Security Management Act (FISMA) at NASA

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Cybercrimes Cyber Prevention an Analysis

Pages: 8 (2419 words) Sources: 8 Subject: Sports - Drugs Document: #56508462

Cyber Crime Cybercrime has been a hot button topic in recent years. A crime involving digital services or computers, cybercrimes typically is when someone targets a computer for a crime, uses a computer as a tool for a crime, or has computer containing evidence of a crime. Since the rise of information technology, cybercrime has become taken center stage as a shift in criminal activity means more criminals doing business online

Studyspark Study Document

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since

Pages: 10 (2784 words) Sources: 10 Subject: Military Document: #44365655

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Studyspark Study Document

Cyber Crime and Technology Crime

Pages: 14 (4865 words) Sources: 14 Subject: Education - Computers Document: #907909

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Studyspark Study Document

BlockChain Cyber Crime and Cyber Security

Pages: 4 (1172 words) Sources: 3 Subject: Information Technology Document: #42778912

Cyber Security BlockChainCybercrime is one of the most leading types of crime these days as the use of the internet is inevitable, and so has cybersecurity gained a new significance. Cybercrime can cost the economy up to $500 billion every year (Daley, 2019). The current security system seems to be obsolete as new updates in the technology give rise to new types of methods through system breach can easily be

Studyspark Study Document

Cybersecurity and Organizational Change Concept Map

Pages: 6 (1519 words) Sources: 6 Subject: Management Document: #88291276

Modernization Theory
Support managers, involve stakeholders, address resistance, celebrate victories and define the objective
Give focus and support to individuals involved in the change
Know the needs of all stakeholders
Start at the top
Change has to be implemented correctly and follow a process so as not to stall or be met with resistance (Schantz, 2018)
Change is required
Organizational Change
IT workers have to be more involved in making

Studyspark Study Document

Intellectual Property Is the Concept

Pages: 2 (773 words) Sources: 3 Subject: Business - Law Document: #59045458

The right to distribute is one thing, the right to the idea is another. It is quite possible that the Internet itself has spawned this idea of intellectual property as separate from tangible property in a quite real way. By viewing the Internet itself as basically intangible, in essence you cannot see the Internet only the result that is given on the screen, certainly has something to do with starting

Join thousands of other students and

"spark your studies".