Search

Assignment on Cyber Crimes

University:

  • Unit No:
  • Level: Undergraduate/College
  • Pages: 8 / Words 2083
  • Paper Type: Assignment
  • Course Code:
  • Downloads: 5305

Introduction:

Internet expansion has provided ease in doing business. It has provided a platform on which businesses can expand their operations in various countries. Also, it has created vast opportunities for the business to grow (Arief,  Adzmi and Gross,  2015) But there have been serious consequences of using the internet in business. The sharing of data and information has led to cybercrimes. Sensitive data is leaked that is restricting the business growth. It has allowed businesses to develop strict policies and regulations for sharing information. For this, strong measures and actions are taken. Cyber-attacks have forced businesses to install high-security measures. Besides this, due to cyber-crimes, trade relations between governments of different countries are affected. The purpose of this study is to identify reasons behind cyber-crimes as well as threats and attacks of these crimes on business (Blakemore,  2016).

Literature Review

The increase in cyber crimes has created an alert in industries and businesses to use and implement effective systems for the safe sharing of data. People leak data to get financial benefits. Also, research done in the past shows that mostly, data piracy is mostly done by students. Along with this, it shows that the business and film industry is highly been affected by data piracy. According to (Aggarwal,  Arora and Ghai,  2014) it has become difficult to identify cyber-attacks due to malicious activities. These activities are related to spam e-mails, etc. According to (Somer,  Hallaq and Watson,  2016) in a report, it is shown that in 2005, about 1.2 billion illegal copies of copyrights were made. Moreover, the International Federation of Phonographic Industry IFPI in a report estimates that across $4.5 billion loss was there in the music industry due to piracy.

Need to Consult Directly With Our Experts?

Contact Us

The main reason behind the increase in cybercrime is the lack of effective rules and regulations for maintaining records of sensitive data. There is no proper system created to investigate crime. This has resulted in more frauds every day. Moreover, the government is also not focused on developing policies that can be used to investigate crimes. Victims are not been caught thus it has boosted their confidence level to do more crimes (Taylor,   Fritsch and Liederbach,  2014) Business is also playing a crucial role in cybercrime. They have created several communities that can provide them with confidential information. This information can be used to gain a competitive advantage in the market. According to the Identity Theft Resource Center's (ITRC) report among 383 organisations at least one of them suffered a data breach in 2016. in this average cost per breach was $4 million. The records stolen were an average of $158 globally. Theft of Trade secrets of a nation range from 1 to 3%  of its GDP (Brown,  2015)

There are various forms of cyber theft. The banking industry is been impacted a lot. While doing financial transactions people's banking details such as account number, ATM PIN, etc. are hacked. Financial fraud is done with them. So banks need to take strong actions against such thefts. More security measures should be installed while doing transactions online. Applications and software used in it must be protected by installing anti-virus and keeping them updated (Lavorgna and Sergi,  2016) It will help in making the system more secure and increase the trust of people. The investigation can be done with the help of a procedure that contains steps such as policy and procedure development evidence assessment, evidence acquisition, evidence examination, documentation and reporting. By following this procedure it will be easy to catch thieves of cyber fraud. It will be very beneficial in reducing this. Cyber fraud has developed different types of crimes. One of these is cyberterrorism. It is a process in which people use technology for terrorism purposes. They interact and communicate with people to involve them in these activities. It is been increased in countries like India and Pakistan (Dawson,  2015). Thus, now it has created a threat to these countries as terrorists are highly involved in these activities. Thus, it is also an issue that must be considered. Otherwise, it can lead to major consequences.

The main reason behind the increase in cybercrime is the lack of effective rules and regulations for maintaining records of sensitive data. So  IT industry is focusing on developing measures that can be taken to track cybercrime. Research done (Johnson,  2016) shows how there has been a transformation in using of digital technology by people and businesses. For this applications and software are developed by them to protect their data. However, it is having a great influence on people's lives as the focus is shifted towards doing illegal things. The Internet is the main source for this. Rather than having a positive impact, it has created a negative impact on businesses and people. There has been a rise in cybercrime due to insufficient policies and laws. Also, it is necessary to develop a policy so that can be used in tracking people who have committed crimes. Moreover, by keeping track records it will be easy to identify a number of crimes (Sun, Shih and Hwang, 2015). Also, which type of crimes are increased will be easily identified. The rise in the number of crimes has created conflicts among businesses. It has intense competition in the market. 

Methodology

Research design - The research design is used to describe methods and processes through which research is conducted. It helps in finding out the technique through which research is done. It is of two types, that is, exploratory and conclusive (Kruse and Monticone,  2017.). The following research is based on a conclusive technique. It will give reasons why there is an increase in cyber crimes and what changes are required to reduce it. Also, how it will provide efficiency to businesses in sharing data and information. The main purpose is to provide views of cyber-attacks due to the expansion of the internet.

Research philosophy- The research philosophy is used to describe on what basis research is been done. The researcher has used a realism approach in this. It shows that this research is conducted to develop knowledge of the reason and impact of cybercrime on business (Taylor,   Fritsch and Liederbach,  2014). It will help in providing results on whether cyber fraud has decreased or not and on what basis it has influenced business operations.  Realism is divided into two groups. One is direct and the other is indirect.  Direct means what we see and what we get.

Research approach - The research approach used in this is inductive. The results obtained from it will help in knowing the factors and reasons behind the increase of cyber-crime. Along with this, how business is been affected by this. This approach will help in providing results by which it can be reduced. How cyber-crime has influenced the sharing of data? (Lavorgna  and Sergi,  2016) Research conducted will generate theory regarding cyber-crimes.

Data sampling- The data collected will be by using stratified data sampling. The business will be divided into different strata. These strata will represent businesses of different sectors in which cyber-crime has increased. By this, it will be easy to find out the overall impact of cyber-attacks on business.

Analysis Of Primary Data

In this section it consists of two elements that will help in finding out how data is analysed (Sun, Shih  and Hwang, 2015) These elements are described below:-

Collection of data- The data collection method is of two types that are primary and secondary. Data that is collected for the first time is known as primary whereas data collected from different sources is known as secondary. These sources are old articles, newspapers, research papers, etc. The data collected for this research is primary as well as secondary. This will help in conducting research in a better way (Arief,  Adzmi and Gross,  2015). Also, it will give specific results.

Analysis of data - The data is analysed by using quantitative techniques. It is because; it will give an insight on how there is been influence of cyber-attacks on business. In this, data collected will be converted into meaningful information. Moreover, research is based on a rational approach and so, it will be easy to analyse this data (Aggarwal,  Arora and Ghai,  2014).

The analysis of data will help in giving specific and effective outcomes. After this, it will help in comparing data from previous research with the current one.

Need Personalised Assistance from Our Experts?

Share Your Requirements via Whatsapp!

Chat Now

Conclusion

This research paper concluded that the issues related to cyber crimes are increasing rapidly. Also, there has been a great impact on business due to this. The data shared is now hacked and leaked by communities that are organised by people. Also, it is analysed that the internet has become a useful tool in providing personal information to other people. Moreover, it has created both negative and positive impacts on business and people. Although business efficiency has increased due to strong restrictions on trading in countries. The Internet is the main source for this. Rather than having a positive impact it has created a negative impact on business and people.

Reflective Observation

During the research, I observed that there was effective communication between team members. After analysing the results, I observed that in order to reduce cyber crimes, businesses have implemented certain policies and laws regarding the sharing of data. This has benefited them very much as it reduced malicious activities in the network. Also, it has allowed effective communication between people and organisations. Apart from this, systems are having backups so that data can be retrieved. I also observed that there is much awareness about cyber fraud in business. This has resulted in taking appropriate measures before happening of any major event. Also, I think that it is very difficult to catch the victim of a cyber-attack. It is because of the movement of a person from one person to another. The use of technology has given a tool to people to do this. Now, it is been used in elections to provide the benefit to parties. This has interrupted relations between countries. I have also suffered from cyber fraud. It was due to spam mail. There are groups of people who commit these crimes for the sake of money. From research, I think that it is very important to stop cyber fraud. It is because; it will help in providing efficiency to business. I think that the internet has created a negative impact rather than a positive impact on business and people.

References:

  • Aggarwal, P., Arora, P. and Ghai, R., 2014. Review on cybercrime and security. International Journal of Research in Engineering and Applied Sciences. 2(1). pp.48-51.
  • Arief, B., Adzmi, M.A.B. and Gross, T., 2015. Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers. IEEE Security & Privacy. 13(1). pp.71-76.
  • Blakemore, B., 2016. Policing cyber hate, cyber threats and cyber terrorism. Routledge.
  • Brown, C.S., 2015. Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology. 9(1). p.55.
  • Dawson, M. ed., 2015. New threats and countermeasures in digital crime and cyber terrorism. IGI Global.
  • Johnson, M., 2016. Cyber Crime, Security and Digital Intelligence. Routledge.
  • Kruse and Monticone, D.K., 2017. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care. 25(1). pp.1-10.
  • Lavorgna, A. and Sergi, A., 2016. Serious, therefore organised? A critique of the emerging" cyber-organised crime" rhetoric in the United Kingdom. International Journal of Cyber Criminology. 10(2). p.170.
  • Somer, T., Hallaq, B. and Watson, T., 2016. Utilising Journey Mapping and Crime Scripting to Combat Cybercrime and Cyber Warfare Attacks. Journal of Information Warfare. 15(4). pp.39-VI.
  • Sun, J.R., Shih, M.L. and Hwang, M.S., 2015. A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. IJ Network Security. 17(5). pp.497-509.
  • Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
Download Full Sample
Cite This Work To export references to this Sample, select the desired referencing style below:
Assignment Desk.(2024) Assignment on Cyber Crimes Retrieved from: https://www.assignmentdesk.co.uk/free-samples/computer-science/assignment-on-cyber-crimes
Copy to Clipboard
Copy to Clipboard
Assignment Desk (2024) Assignment on Cyber Crimes[Online]. Retrieved from: https://www.assignmentdesk.co.uk/free-samples/computer-science/assignment-on-cyber-crimes
Copy to Clipboard
Assignment Desk Assignment on Cyber Crimes. (Assignment Desk, 2024) https://www.assignmentdesk.co.uk/free-samples/computer-science/assignment-on-cyber-crimes
Copy to Clipboard
Assignment Desk Assignment on Cyber Crimes. [Internet]. Assignment Desk.(2024), Retrieved from: https://www.assignmentdesk.co.uk/free-samples/computer-science/assignment-on-cyber-crimes
Copy to Clipboard
Struggling with writing assignments? Take our academic writing services to resolve your problems. We not only provide online assignment help but also various other services like thesis, dissertation, and essay writing services. If you have any doubts about our experts, then we suggest you check our “Samples” before seeking dissertation help from us. Our experts can ease the complexity of your work. All you have to do is ask, “Can you do my assignment?”
Boost Grades & Leave Stress

Share Your Requirements Now for Customized Solutions.

Lowest Price
USD 6

    Delivered on-time or your money back

    100+ Qualified Writers

    For Best Computer Science Assignment Help

    View All Writers
    FREE Tools

    To Make Your Work Original

    • tools Paraphrasing Tool

      Check your work against paraphrasing & get a free Plagiarism report!

      Check Paraphrasing
    • tools Plagiarism Checker

      Check your work against plagiarism & get a free Plagiarism report!

      Check Plagiarism
    • tools Dissertation Outline Generator

      Quick and Simple Tool to Generate Dissertation Outline Instantly

      Dissertation Outline Generator
    • tools Grammar Checker Tool

      Make your content free of errors in just a few clicks for free!

      Grammar Checker
    • tools Essay Typer

      Generate plagiarism-free essays as per your topic’s requirement!

      Essay Typer
    • tools Thesis Statement Generator

      Generate a Compelling Thesis Statement and Impress Your Professor

      Try Thesis Generator Tool

    Professional Academic Help at Pocket-Friendly Prices!

    Captcha Code refresh

        Estimated Price

        USD 6.32 25% OFF
        Total Price USD 6
        182532+Delivered Orders 4500+PhD Writers 4.8/5Client Rating

         
        AD whatsapp

        Limited Time Offer

        Exclusive Library Membership + FREE Wallet Balance