Literature Review on "Cyber Crime Purpose & Audience Organization"

Literature Review 7 pages (3159 words) Sources: 5

[EXCERPT] . . . .

Cyber Crime

Purpose & Audience

Organization of the Paper

Forms of Online Abuse and Crime

Social and Economic Impact of Online Crimes

Likely Victims of Cyber and Internet Scam

Youth

Elderly People

Financial Institutions

Government, Health Care, and Academic Organizations

The cybercrime classification framework (CCF) will help in making cybercrime language formal and the results of this framework will be consistent within specified jurisdictions & remain consistent around the globe. This type of framework will help the authorities worldwide to better communicate and cooperate between certain jurisdictions. This framework will also enhance compatibility between reporting agencies of international or national cybercrime, which will allow a very true representation of incidence of cybercrime to be accepted and realized throughout the globe.

By using CCF summarized in this article, Stabek et al. identified seven types of scams with 4 key processes of scammer business. This information can use specialized law enforcement agencies and cyber crime and fraud task force in its recognition, tracking and monitoring of cyber crime and contributions to the cyber crime investigation methods, the use of blend.

Victimization in society results from many types of harmful behaviors committed by individuals or groups against other people. Behaviors considered negligent or abusive, or that otherwise are considered criminal in a particular place, often depends on t
Continue scrolling to

download full paper
he amount of harm inflicted, the technological means employed, and existing laws that forbid specific activities. Technological means used to commit cyber crimes refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. (Wall 2007) Modern information technology (it) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wirelessly, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or legal jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes.

Purpose & Audience

The purpose of this article is to identify a cyber-crime classification framework which is necessary these days because of the increasing diversity of the reporting procedures and classifications which are ununiformed. Due to this gap, the authorities are unable to produce valid and reliable decisions. In this article, Stabek et al. has developed a classification framework for cybercrime which will play a vital role in developing transnational, inter-jurisdictional and global approach for identifying, intercepting and prosecuting cyber criminals through valid and reliable proofs.

The objective set for this study was to develop a classification model for detection of various types of scams that prevail in the international online world of cybercrime. Dictionary inconsistencies in the network of crime is often reported as a focal point behind cross-border cooperation and the consistent increase in thin cross-border crime incidents on the network to investigate the cause for failure. This in turn leads to congestion of law enforcement and industry resources.

Methodology adopted by Stabel et al. consists of content analysis of some scam descriptions. A sample of more than 250 scam descriptions was selected by Stabek et al. In which there was 35 scamming categories and around 80 static features which were derived from the sample. Since the sample for this research was too large, Stabek reduced the sample size from 35 categories to 7 scam types having 4 top scamming functions using discriminant function and hierarchical cluster analysis.

Organization of the Paper

This article is divided into 6 parts; motivation, the motivation behind this study was discussed, the report of the analysis, in which a network of crime statistics and crime reporting agencies and networks between the comparative study presented an overview of the method, where in the approach is organized, the results, including a detailed survey results, discussion, and the results are present here, the significance of the research is considered to be a comprehensive discussion, conclusions, in making a final note.

This is a review and analysis of the article titled "The Seven Scam Types: Mapping the Terrain of Cybercrime." In this article, the Stabek et al. has talked about seven different types of scams which the cyber criminals use mostly. The article ends up with development of a classification framework for cybercrime which was applied in the selected samples of scam incidences. Additionally, this article provides some recommendations about the prevention of cybercrimes. Results produced by Stabek et al. have certain ramnifications to the current status of cyber crime classification, scams, research, analysis, etc. This research also offers some practical implications for applications and business processes adopted by cyber criminals and scammers.

Forms of Online Abuse and Crime

Cyber?

crime classification framework (CCF) can be extended to all current and future network into the forms of crime. With the framework can be continuously updated to help ease the rest of the preparation of sector, industry and enterprise of the most advanced information and relevant examples and types of circulating the Internet cyber crime and business goals and individuals.

Every form of online abuse and crime may have from one to many victims, and hundreds, thousands, or even millions of people may be victimized. According to Samual McQuade, categories of cyber scam now include illegal or abusive online activities such as the following:

Cyber negligence by users of information systems who violate recommended or required security policies or sound online practices, thereby exposing their systems, devices, or data to cyber attacks

Traditional in-person crimes by users of computers or other it devices for illicit communications and/or record keeping

Fraud and theft by people who illegally phish, spoof, spim, spam, or otherwise socially engineer people to commit identity theft or gain financially

Computer hacking and password cracking by individuals or groups who crack computer account passwords and unlawfully access information systems or exceed their online system permissions

Writing and releasing malware (i.e., malicious software), including disruptive or destructive viruses, Trojans, worms, and adware/spyware programs as well as illegal massive distributions of email known as spam

Pirating of music, movies, or software using computers and other it devices to violate criminal or civil copyright laws to replicate, distribute, download, sell, or possess software applications, data files, or code

Online harassment and extortion to threaten, intimidate, intentionally embarrass, annoy, coerce or some combination of these which when involving youth is commonly referred to as "cyberbullying"

Cyber stalking, pedophilia, and other cyber sex crimes by online offenders who acquire illegal sexual pleasure by exerting power or control over their victims, including cases of human trafficking for sexual purposes and so-called sex tourism (traveling to have sexual relations with minors) (Rantala 2005)

For example, a group of computer hackers may consist of expert malware code writers who release remotely controlled and/or self-morphing programs onto the Internet where they can be downloaded by unsuspecting users. Results from such an "attack" vary considerably depending on the intent and skill of perpetrators and the potential value of a victim's data. Online theft or destruction of data belonging to a large corporation may be worth millions of dollars, and losses of personal, personnel, or client data can be very traumatic to individual victims, as in cases of identity theft.

Social and Economic Impact of Online Crimes

Firms that lose computerized data due to system user neglect or abuse, to cybercrimes committed by insider employees or external attackers, or to a natural or human-made disaster may never fully recover from their losses. Firms that do not have data saved on their information systems automatically backed up to an offsite location along with business continuity plans ready to implement on a moment's notice risk much. Losses of data, money, or other property, along with emotional and psychological harm and even physical injury or death as the indirect result of cyber crimes, are experienced every day by thousands of individuals, families, and groups of people. (McQuade & Sampat 2008)

Cybercrimes such as those previously listed are normally considered nonviolent property crimes, and many also qualify as financial crimes. This is especially true if the primary goal of offenders is to illegally acquire funds or control electronic banking or credit card accounts. Identity theft, for example, is a financial crimeand often also constitutes bank fraud.

Despite frequent occurrences of identity theft and many other forms of online crime, the amount of financial loss and other social and economic harm caused by or associated with cyber and Internet crimes is not truly known, and the accuracy of any estimate depends on how crimes are defined; however, specific forms of online crime are periodically estimated for specific forms of crime, and annual economic losses from cybercrime have been estimated to be in the tens of billions of dollars worldwide. A single release onto the Internet of a malicious virus, Trojan, or worm program has on more than one occasion affected millions of users and cost billions in damages to information systems and loss of data (e.g., the "I Love You" virus released in May 2000 was estimated to have cost between $1 billion and $10 billion worldwide).

The… READ MORE

Quoted Instructions for "Cyber Crime Purpose and Audience Organization" Assignment:

Read the article titled *****Cybercrime Article for Literature Review*****. Create an properly APA formatted paper with title page, abstract page, table of contents, the body of your paper, and references page. The essence of your paper, the commentary, should include detailed sections for each of these areas:

- Purpose and audience

- Organization

- Level of detail

- Citations and references

Also include your summary for recommendation of the article. Please adhere to the required criteria stated below:

a. Paper Outline

b. Paper Bibliography

i. your references must be formatted according to APA Guidelines

ii. you must use a minimum of 5 sources found online (no Wikipedia or Webopedia)

c. Paper

i. this must be at least 5 pages ***** with full APA formatting

ii. the paper will follow a conventional report format (introduction, abstract (optional), body, conclusion, and references)

iii. I have to provide an acceptable turnitin.com originality report with your paper (10% maximum overall match with no single source above 2%)

*****

*****

How to Reference "Cyber Crime Purpose and Audience Organization" Literature Review in a Bibliography

Cyber Crime Purpose and Audience Organization.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464. Accessed 1 Jul 2024.

Cyber Crime Purpose and Audience Organization (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464
A1-TermPaper.com. (2011). Cyber Crime Purpose and Audience Organization. [online] Available at: https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464 [Accessed 1 Jul, 2024].
”Cyber Crime Purpose and Audience Organization” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464.
”Cyber Crime Purpose and Audience Organization” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464.
[1] ”Cyber Crime Purpose and Audience Organization”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464. [Accessed: 1-Jul-2024].
1. Cyber Crime Purpose and Audience Organization [Internet]. A1-TermPaper.com. 2011 [cited 1 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464
1. Cyber Crime Purpose and Audience Organization. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cyber-crime-purpose-audience/244464. Published 2011. Accessed July 1, 2024.

Related Literature Reviews:

American Domestic Terror Groups and International Essay

Paper Icon

American domestic terror groups and international terror groups forging common ties? Who are their common enemies? Please provide examples to support your answer. Also, you are encouraged to draw from… read more

Essay 5 pages (1694 words) Sources: 5 Style: APA Topic: Terrorism / Extremism / Radicalization


Security Issues of Online Communities Term Paper

Paper Icon

Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more

Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet


Comprehensive Study of Offshore Financial Centers and Their Effects on Global Economy Dissertation

Paper Icon

Offshore Financial Centres and Their Effects on Global Economy

The past 3 decades or so have witnessed the proliferation of offshore financial centres that have drawn both criticism and praise… read more

Dissertation 60 pages (22477 words) Sources: 20 Topic: Economics / Finance / Banking


Mon, Jul 1, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!