Tuesday, December 10, 2019

Computer crime research proposal free essay sample

Over the last few years the internet crime industry has changed very dramatically. Think back almost twenty years ago, computers were just beginning to make their marks in the professional world. However, big companies were the main individuals with computers, mainly because they weren’t that popular in homes. Nowadays, computers can be found anywhere. They are so convenient and you can do almost anything from a computer, pay a bill, shop, order food, even banking. The convenience has even been extended to a cell phone or smart phone as they are referred too. At the same time, all of the convenience and little to no security method is implemented. This proposal is geared to help people who have been victimized. Surveys, secondary data, and field research will all be of help to anyone that needs it. INTRODUCTION: Convenience versus Security, everything is able to be completed online, whether its shopping, banking, taxes, or simple communication it can all be done behind a screen. Its so easy for someone to assume your identity and you never know because of how convenient computers have become. When one item becomes too convenient the downfall is the lack of security that will come with that, it can be viewed as Convenience vs. Inconvenience. Making things convenient for ourselves isn’t always the most secure thing that we can do. It’s a fact that, â€Å"convenience is often times inversely proportional to safety and security (Mente, 2000)†. My independent variable is the expansion of technology which leaves end users vulnerable for attack. The variable that is dependent upon my IV is the rise in attacks. As technology increases, the knowledge the hackers attain increases as well. Meaning that they are getting smarter and we need to be educated in their methods. As time progresses and technology continues to thrive in an upward direction more attacks are going to occur. Computers, PDAs, and Tablets are showing an economic boom in sales as the security level is withering. Convenience versus Security! The more you have of one the less you have of the other. BACKGROUND AND LITERATURE REVIEW: The five articles I chose to summarize are important to me. The trends that  these cyber criminals are implementing are progressing at a very fast pace. Newer trends are developing just as fast as technology is growing. We have to be ready for all the new ideas the tech savvy individuals are coming up with to assume ones identity. There are so many that the public cannot be warned about them all therefore schooling yourself on the security measures to take will save you the hassle in end. â€Å"Internet Crime Trends: The Latest Report† I chose this article because it is good to be aware of the trends that the computer criminals implement. Based on the ICR, or the Internet Crime Report which dates back to 2010, the top three common complaints that the IC3, or Internet Crime Complaint Center, had were non-delivery of payment or merchandise, impersonating scams, and identity theft. Most of the complaints came from United States residents, mostly male, between the ages of 40 and 59. Most of the complaints come from California, Texas, New York, and Florida. Those are the states that are heavily impacted because they are heavily populated. Computer criminals are far from fools. Being able to master the art of theft online is not easy. They target the cities that are fast-paced, that way they will not realize a crime is being committed until well into the process. The IC3 received approximately 300,000 complaints a year roughly 25,000 per month. Half of the reported complaints were of some form of financial loss. However, many internet crimes go unreported. Citizens are not aware that even if they do not fall into the trap and become a victim of a computer crime, the fact that they were contacted at all should be reported as well. According to the NCSS, or National Computer Security Survey, there are three types of cybercrime. There are the cyber-attacks, cyber-theft, and cyber-security incidents. The cyber-attacks are when the computer system in general is the target. Viruses and worms are the culprit in cyber-attacks. Cyber-theft is when a computer is used to receive any type of financial gain or other things of value, embezzlement and fraud are types of cyber-theft just to name a few. Cyber-Security incidents normally affect businesses. Spyware, Adware, Hacking and Phishing are common incidents that can happen in a business establishment. However, this is where our security needs to be in its best shape. In 2005, a study of over 7000 companies reported that 67% detected at least one cybercrime,  almost 60% detected one or more types of cyber-attack, 11% detected cyber theft and 24% detected other computer security incidents (NCSS, 2005). Many of the companies didn’t even report the crimes but the ones that were reported sustained monetary loss of $10,000 or more. This data revealed to me that some cyber-crimes go unnoticed because they are not reported. Business companies and individual citizens alike have been victim to a potential cyber-crime whether you are aware or not. Many people do not report mainly because nothing was stolen. It takes for something to leave our possession before we react. On the contrary, with crimes like Cyber-Attacks, Cyber-Theft, and Cyber-Security breaches acting on something small can save you a lot of disappointment in the end. The fact that the trends are adapting rapidly daily does not mean that the older techniques are not still lurking. If you have received mail, physically or electronically, asking for money, claiming to be someone that needs money, or telling you how to make money it’s usually a scam. â€Å"Cyber-Crime Taking on Sinister Forms† Nowadays, the criminals who attack via the computer are growing rapidly. Authorities feel that 2012 will be a big year for cyber criminals. Especially the scams, there have literally been hundreds of emails sent out asking one to send money, or to cash a check then wire it somewhere else. Often scammers assume the identity of major companies and corporation’s telling you that you can become a member of their team if you send money from one place to another. Citizens should report any suspicious activity. Older men are considered a high risk target. Unlike women, most men are not computer savvy and may fall for a scam faster than a woman would. Many scammers are unemployed and are looking to make easy money. However, we cannot be so easily fooled. Another common problem for authorities is the use of computers to stalk and harass individuals. Usually the sender remains anonymous and their main goal is to gain access to the identity of an individual. Based on an electronic monitoring study in 2006, 83% reported that they received an email from a stalker, 35% received an instant message. More than 3 million people, both male and female, over the age of 18 had been stalked at least once. Now of course, stalking in the physical is completely different from cyber stalking. In this sense, stalking is defined  as conduct that would cause a person to feel fear. Studies show that electronic monitoring was used to stalk 1 in 13 victims. Video or digital cameras we used to spy on individuals that never knew they were being watched. Of the 3 million people surveyed over 250,000 sustained injuries in stalking attacks (Osterburg Ward, 2010). These specific attacks escalated from cyber-stalking to physical stalking, however, it everything originated online. Out of the initial survey, over 35,000 were raped or sexually assaulted, over 50,000 were seriously injured, and over 270,000 individuals suffered minor injuries (Osterburg Ward, 2010). This information was shocking. One never knew you could be stalked online. However, if at any point you felt any type of fear whilst online that is considered cyber-stalking. Another fact that shocked me was that the offenders were between the ages of 18 and 29, at the same time, the victims were between 21 and 39. One would think the offenders would be older and the victims young but sadly this is not the case.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.