Studyspark Study Document

Impact of Cybercrime Term Paper

Pages:4 (1357 words)



Topic:Cyber Crime

Document Type:Term Paper


Cyber Crime

It is important to note that today, unlike was the case a couple of years ago, technology has made it easy for businesses to compete more efficiently, reduce costs associated with doing business, and address the needs of customers in a more effective manner. However, the same technology has brought with itself some unique challenges. This is particularly the case with regard to increased instances of cyber crime.

Cyber crime and its Impact on Businesses and Consumers

Cyber crime, according to Thomas and Loader (as cited in Reyes, Brittson, O'Shea, and Steele, 2011, p. 28), constitutes of all those "…computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks." The examples of cyber crime offered by the authors in this case include, but they are not limited to, software piracy, industrial espionage, network break-ins, etc. As the Federal Bureau of Investigations (FBI) has pointed out in the past, cyber crime has (for the last few years), been on the increase among American business entities (Snow, 2014). The key driving force of this trend has largely been the need for business competitors and other unscrupulous individuals or organizations to steal critical information about a business and its operations, as well as get access to confidential client information. In some cases, instances of cyber crime has been driven by pure malice, such as is the case when hackers compromise an entity's network or servers with an aim of denying service to the concerned entity's website.

Cyber crime has got huge cost implications for businesses. To begin with, when it comes to the cost of protection, it is important to note that companies that would wish to hold cyber criminals at bay have to incur various costs such as costs associated with risk identification; costs of establishing operating procedures regarded safe; costs of purchasing, installing, as well as monitoring protective hardware and software, etc. It should be noted that the costs could be even higher for businesses involved in sensitive operations, i.e. ecommerce businesses that handle and process sensitive customer information. This is particularly the case given that in addition to putting in place excellent measures (installation of costly protective hardware and software) to hold cyber criminals at bay, such businesses may also be forced to hire cyber-security professionals to keep watch over their operating procedures. In the final analysis, therefore, the costs businesses incur as a consequence of cyber crime are massive and could impact negatively on the bottom-line.

Businesses could also lose money as a consequence of denial of service attacks. Some of the companies that have been subjected to denial of service attacks include, but they are not limited to MasterCard and PayPal. It is important to note during the time the company's sites are down as a result of such attacks, and before IT experts can restore them, customers are effectively shut out -- thus denying the affected businesses revenues thought the entire period.

In the past, we have had cases of businesses being taken to court by clients who feel aggrieved as a result of inappropriate exposure of their private information after criminals manage to infiltrate the affected businesses' networks and computers. In some cases, the aggrieved clients end up incurring actual monetary losses as a result of what is, in their view, inability of businesses (typically banks) to take the necessary steps to protect them. For instance, TRC Operating Co. recently "sued the Fresno-based United Security Bank, claiming that the bank has failed to adequately secure its accounts" (ESET Staff Writer, 2014). The settlement reached in this particular case was $350,000 -- in favor of TRC. Some companies may even be forced to close shop for fear of exposure to costly litigation. This is particularly the case for small businesses whose budgets cannot allow them to invest in extensive security measures to deter cyber criminals.

On the customer side, it should be noted that the costs businesses incur in having their businesses protected against cyber crime end up being passed on to…

Sample Source(s) Used


ESET Staff Writer. (2014). California Company Sues Bank Over Cybercrime, Wins $350,000 Settlement. Retrieved from

Newtek Contributor. (2013). How to Prevent Cyber Crime. Retrieved from

Reyes, A., Brittson, B., O'Shea, K. & Steele, J. (2011). Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors. New York, NY: Syngress.

Snow, G.M. (2011). Testimony: Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism. Retrieved from

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Cybercrime Modern Scam: A Summary of the

Pages: 4 (1182 words) Sources: 1+ Subject: Criminal Justice Document: #17471775

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Studyspark Study Document

Cyber Crime Malicious Activities Like Identity Theft,

Pages: 7 (2334 words) Sources: 5 Subject: Teaching Document: #4044629

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Studyspark Study Document

Cyber Crime Task Force Plan

Pages: 8 (2886 words) Sources: 6 Subject: Education - Computers Document: #89472748

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Studyspark Study Document

Cybercrime Is a Concept That

Pages: 10 (3003 words) Sources: 10 Subject: Criminal Justice Document: #73147129

Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special

Studyspark Study Document

Cyber Crime Purpose & Audience

Pages: 7 (3159 words) Sources: 5 Subject: Criminal Justice Document: #95048976

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Studyspark Study Document

Cybercrime What's in a Name

Pages: 9 (2690 words) Sources: 6 Subject: Education - Computers Document: #33175689

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

Join thousands of other students and

"spark your studies".