StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cybercrime Issues Discussion - Essay Example

Cite this document
Summary
The essay "Cybercrime Issues Discussion" focuses on the critical analysis and discussion of the major issues in cybercrime. One of the fundamental ways in which our current world has changed is how cyber crime and the threat thereof have changed the very face of business…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Cybercrime Issues Discussion
Read Text Preview

Extract of sample "Cybercrime Issues Discussion"

The first of these that will be discussed is piracy. Although piracy has traditionally been viewed as a problem that is specific to a young generation of music downloaders and video game players, the fact of the matter is that the market for software, video, music, and data piracy has exploded within recent years and is a multi-billion dollar a year loss for the industries whose intellectual rights are being infringed upon. Moreover, if the firm in question distributes or creates a software product, its overall revenues are in dire danger of being lowered as a result of the actions of pirates. Likewise, the firm must be aware of the fact that software piracy usually takes place from within first as an unscrupulous employee having access to the information in question usually is responsible for taking this information home on their own and uploading it to any number of a host of sites as a means of beginning the snow-ball effect of data piracy.

As such, one of how a firm can seek to ameliorate how it is exposed to the risk of software piracy is to ensure that all data movements within the firm are well tracked as well as having a robust legal department that operates in close concert with the human resources department to ensure that limited numbers of the employees have access to the finished product and those that do are well accounted for and have been explained to the ramifications, both ethical and criminal, with relation to stealing the company’s product. Secondly, if the firm itself does not rely on the development of software as a means to earn its revenues, the firm will need to be responsible for how its employees download and utilize the data that they might find on the internet. For this reason, a robust internet usage policy must be delineated to the employees upon their employment, and watch groups should be established to ensure that compliance is met at every step of the process.

The second issue that relates to cyber crimes is that of cyber terrorism. Although this is of course a lower level incidence than the one that has been thus far mentioned, it is of primary importance not only to governmental instruments but to the very foundations of a nation’s economy. Therefore, the threat of cyber terrorism can include any firms that deal with an entire litany of different industries and/or businesses. To guard against the threat of cyber terrorism, it should be the goal of the firms in question to seek to review their security policies in dept on a quarterly and yearly basis as a means of ensuring that key oversights are addressed and no blatant flaws are exhibited in their systems. Even though it is never possible to ensure that a given firm will be 100% secure from cyber terrorism, the engagement of key assets to review the security procedures is integral in protecting the firm from such an eventuality.

Finally, this analysis will discuss the threat of fraud. This is perhaps the easiest of the three to seek to prevent as it involves the instruction of shareholders about how to interpret threats that present themselves daily. Furthermore, concerning fraud, this is almost always the type of situation in which employee lack of knowledge presents the ultimate threat. With regards to fraud, the individual can understand this as a type of instance in which phishing schemes and others present the greatest threat. in this respect, seeking to engage employees with the types of information that are the most threat as well as ensuring that a level of supervisory oversight reduces risk is the most effective means of minimizing risk (Babu, 2013). However, one should not assume that fraud is a threat from the outside only. Because unscrupulous and dishonest employees represent a threat, the firm should seek to ensure that a robust policy of oversight and compliance that mitigates such a risk is also a primary means by which such a risk can be mitigated.

As has been discussed, each of these threats is of dire importance for a firm to ensure that profitability and sustainment are furthered. However, as has been seen, each of these threats can work to be prevented; although it is of course impossible to ensure that such a risk is mitigated entirely. Yet, by implementing the above safeguards that have been discussed, a firm can seek to ensure that the threats that it faces in the course of day-to-day business interaction are reduced. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Crimes Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Cyber Crimes Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/business/1468246-cyber-crimes
(Cyber Crimes Essay Example | Topics and Well Written Essays - 750 Words)
Cyber Crimes Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/business/1468246-cyber-crimes.
“Cyber Crimes Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1468246-cyber-crimes.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybercrime Issues Discussion

How can we safeguard against the cybercrime

Written Assignment: discussion Questions Some might say the crime of the 21st century will be white collar.... Business Law: legal environment, online commerce, business ethics and international issues.... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.... If that is true, what will be the major types of cybercrime?... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century....
3 Pages (750 words) Essay

Constitutional Challenges Associated With Investigating Cybercrimes

issues that surround cybercrimes include copyright infringement, child grooming, financial theft, privacy, cracking, espionage, cyber terrorism and child pornography among others (Hinde, 2003).... Technological developments especially in respect to cyberspace have been inarguably beneficial to human beings and have positively impacted on how they conduct business and how they live (Ditzion, et al....
10 Pages (2500 words) Term Paper

Fighting Cyber-Crime

This is the topic of discussion in this task.... Every country has its own separate legal, technical, and organizational issues.... "Fighting Cyber-Crime" paper argues that there is no magical formula that would completely destroy the world of cybercrime.... The creation of a super-natural anti-cybercrime force or the re-engineering of internet protocols seems just good enough to be imagined only.... Cybercriminals should be highly punished so that others hesitate in committing cybercrime....
5 Pages (1250 words) Term Paper

Capacity Building as an International Response to Cybercrime

The primary aim of the discussion is to illustrate the probable and the potential measures to eradicate or control the extensive presence of cybercrime within a society.... The discussion further focuses on depicting capacity building as an international response towards cybercrime.... his discussion stresses that cybercrimes are offences against computer systems, which are conducted within or via computer networks.... It is regarded by legal authority as a punishable crime and is one of the major issues to be resolved in the contemporary scenario....
15 Pages (3750 words) Assignment

Fighting Cyber-crimes

This is the topic of discussion in this task.... This is because: Every country has its own and separate legal, technical, and organizational issues.... This paper ''Fighting Cyber-crimes'' tells that with the increase in the widespread use of the internet, cybercrime rose massively from 2005, draining billions of dollars.... This is because:cybercrime is any illegal activity that is conducted through the use of computers, the internet and computer network....
5 Pages (1250 words) Report

Cybercrime and Privacy

This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole.... This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole.... Additionally, the writer of the paper will debunk some of the myths related to cybercrime....
5 Pages (1250 words) Term Paper

The Cyber Threats in Saint Louis County

Hence, it is recommended that the cybercrime task force must increase its cooperation with the law-enforcing bodies In order to effectively combat and eliminate risks of cybercrime.... The paper "The Cyber Threats in Saint Louis County" discusses that the development of information technology has been driving the world towards becoming more digitalization....
9 Pages (2250 words) Case Study

Differences between Investigating Traditional Criminal Offences and Cyber Offences

The first part of the discussion is the differences between investigating traditional criminal offences and cyber-related offences.... The second part of the discussion will be an analysis of the elements that would be included in a plan of investigation when investigating cybercrimes.... Finally, the third part of the discussion will be a review of the greatest challenges that the police and investigators face when dealing with electronic evidence....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us