Cybercrime Essay

6388 words - 26 pages

Baggili & Rogers - Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity
Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 550–565 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.

Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity ...view middle of the document...

Keywords: Self reported Cybercrime, Anonymity, Pre-employment Integrity, Cyber

Crime engagement. Introduction Cyber crime is an unlawful act in which a computer/s is/are used as means of committing a crime against a person, property or the government (Babu & Parishat, 2004). Sukhai (2004) explained that an FBI and Computer Security Institute annual survey of 520 companies and institutions reported more than 60% unauthorized use of digital computer systems during a period of 12 months and 57% of all break-ins involved the Internet. Even though these numbers seem large, Sukhai (2004) describes that about 60% of cyber attacks are not even detected. Research indicates that only about 15% of exposed attacks are reported to law enforcement agencies (Sukhai, 2004). In the newer 2006 FBI and Computer Security Institute annual survey of 313 companies and institutions, it was
Assistant Professor and Director of the Advanced Cyber Forensics Research Laboratory, Zayed University, United Arab Emirates. Email: Ibrahim.Baggili@zu.ac.ae 2 Professor, Department of Computer and Information Technology, Purdue University, West Lafayette, IN, USA. E-mail: rogersmk@purdue.edu 550
1
© 2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License

International Journal of Cyber Criminology Vol 3 Issue 2 July - December 2009

found that the total losses attributed to security breaches amounted to $52,494,290 dollars (Gordon et al., 2006). Finally, in the 2008 CSI Computer Crime and Security Survey, it was noted that there is an average loss of $500,000 with corporations experiencing financial fraud (related to computing) and an extra average of $350,000 loss at companies that experienced “bot” attacks. The abovementioned figures illustrate that the capital losses attributed to unauthorized use of computers have a substantial damaging bearing on today’s economy. This is also reinforced in the significant average capital loss in the 2008 survey. Due to the negative impact of cyber crime on society, it becomes imperative to understand the social and psychological implications of the cyber crime phenomenon. Many researchers have focused their efforts on technical aspects related to decreasing cyber crime through computer technology/science prevention and incident response techniques. Rogers (2003) explained that little psychological research is conducted on cyber crime focusing on factors such as personality traits/individual differences, motivation and situational factors associated with the cyber criminals. It is now 2009 and this statement remains true. Two major questions whose answers will remain of important value in social scientific research on cyber crime still need to be examined: What attracts people to cyber criminal activities? And what personality traits/individual differences are associated with cyber criminals? Literature suggests that one of the major...

Other Papers Like Cybercrime

Ethical Hacking Essay

1017 words - 5 pages in 1978 (OZEMAIL, 2003). In Australia, the federal legislation has enacted that unauthorised access to, or modification of, restricted data it is an offence against the law (THE CYBERCRIME ACT, 2001). Obviously, if hack into somebody's computer is regarded as a computer crime, so the course of Ethical Hacking is becomes unnecessary. In fact, Ethical Hacking is not only the way that can improve system security. Software such as intrusion-detection

Single Most Importan Cybersecurity Vulnerability Essay

3016 words - 13 pages and it is costly to recover from such attacks. The Ponemon Institute, reported in a study titled “The 2013 Cost of Cyber Crime Study” that the cost of cybercrime went up by 78 percent while the time necessary to resolve cybercrime related issues increased to 130 percent in the space of four year; the average cost of resolving one attack alone being $1. Consequences are not only immediate, but they can also have long term consequences on the

Ssds

2026 words - 9 pages are: * Information and Cyber Insecurity The banking sector in India is highly prone to cyber frauds. The heavy use of technology in the banking sector has offered a potent platform for committing frauds like cybercrime, phishing and data theft. Technology is misused in the banking sector in many ways which includes use of banking access for overpayments to vendors/self-bank accounts, unauthorized sharing of confidential information, and usage

Homeland Security Research Design

2565 words - 11 pages combat effectively local threats to security caused by poor border security and emerging threats like cybercrime and climate change. Methodology The study will mainly rely on content analysis. This content analysis is a research technique where the researcher makes valid and replicable inferences by interpreting the textual material. The material is drawn from documents and graphics concerning the selected topic to provide qualitative data

Syndicated Loan In Asia Pivot Of Supporting The Loan

5720 words - 23 pages fraud. The payment is done usually after keying in a password and sometimes answering security questions. There is no way of verifying the true identity of the maker of the transaction. As long as the password and security questions are correct, the system assumes you are the right person. If this information falls into the possession of fraudsters, then they can defraud you of your money. Another threat comes from cybercrime. With respect

Lafarge S.A

2924 words - 12 pages NAME: IHEKANANDU KINGSLEY N. COURSE: MGMT 292 / F12 N01 TITLE: INDIVIDUAL CASE STUDY (LAFARGE S.A.) SUBMITTED: October 5, 2012 TABLE OF CONTENTS 2. INTRODUCTION 3 3. DESCRIPTION OF CASE 4 4. VALUES 4 4.1. Types of values 4 5. TEAMWORK 7 6. MOTIVATION 8 7. CREATIVITY 9 7.1. Components of creativity 9 8. CONCLUSION 12 9. BIBLIOGRAPHY 13 INTRODUCTION This report aims to provide an in-depth analysis of initiatives pursued by Lafarge as

Finance

665 words - 3 pages Financial statements are the most common tool used for making business decisions. They consist of the balance sheet, income statement and statement of cash flows. The analysis tools used affect all aspects of a company not just a few. A systematic review of the resources a company used to achieve its mission is cost control. Cash flow should be kept at necessary levels for operations is one of the major benefits of cost control. It is a very

Analysis Of Operation Blue Star And Its Effects On The Gandhi Dynasty

934 words - 4 pages The period of time including and following Operation Blue star is considered a dark time in India and black spot in Indian history. It is a time Indian would rather forget, yet still to this day debate about. Was Indihar Gandhi correct in instating operation Blue Star, inflicting damage to the Golden temple, and being responsible for the killing of anywhere from 492 (official reports) to 1500 (estimates run as high as) civilians, which lead to an

Regretful Decisions

930 words - 4 pages Regretful Decisions There are many individuals in a child’s life that helps mold them into a well-rounded adult. In most cases, this guidance comes from the child’s parents or other older, but in Sonny’s case, this guidance was expected from his older brother. In the short narrative, Sonny’s Blues, Sonny’s life was adversely affected by the decisions that his older brother made. The decisions that his brother made include leaving Sonny to stay

Jail Responsibilities

589 words - 3 pages Jail Responsibilities Monique Priorello September 23, 2012 One of the main responsibilities of a jail is to give the officers the correct “Police Correspondence” courses. This is because these courses give the officers the effective basic training that they need to do things such as; Writing of Memoranda, Police Reports, and Civilian Letters. What needs to be done first is make sure that there are NO errors. This means in

Mgt330

638 words - 3 pages Starbucks Nefertiti Wright Sangita Patel October 15, 2012 STARBUCKS 2 STARBUCKS - 1 - [no notes on this page]I. Job description a. Baristas II. Job specifications a. Duties III. Form of departmentalization STARBUCKS 3 Starbucks Starbucks have been named in the 100 best companies to work for. Starbucks has many job opportunities for people, which require the right job specifications. The employees create uplifting experience

Related Essays

Impact Of Mobile Information And Communication Technology On Cybercrime

6752 words - 28 pages International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security

The Internet Postive And Negative Essay

1953 words - 8 pages security researcher was sentenced in 2010 for a total of 13 years the longest prison stay handed down over computer hacking. In addition upon payroll he will be supervised for 5 years and force to pay his victims restitution in close to 30 million dollars. In the beginning as a security researcher, he was a regular consultant for the FBI. As he turned to a life of cybercrime he began to use his talents to hack into carder forum websites for credit

Globalisation Essay

2208 words - 9 pages radioactive waste in developing countries. Brown et al (2014) argue the growth in new communication and media technologies such as the internet (which have contributed towards globalisation) have led to an increase in cybercrime. Cybercrime is crime committed with the help of communication and information technology. With more and more people using the internet for example, there is more opportunity for criminals to commit credit card fraud

Phising And Online Bank Fraud Essay

3597 words - 15 pages phishing, keystroke-logging, malwares, identity theft etc. In Bank of Maharashtra v. Automotive Engineering Co.It was held that it may be expedient and to ensure greater safety in some cases that a bank should take the aid of advanced technology in detecting fraud attempted to be committed by fabricating or forging cheques Cyber Crime& Online Banking Fraud Cybercrime can be defined as “computer-mediated activities conducted through global