Cyber crime - Article Example

Comments (0) Cite this document
The article "Cyber Threats and Data Privacy" by Birchfield simply provides information about the occurrences and the effects of cyber crime in US and especially in New Zealand. In this article, the author tries to provide a clear meaning of what is meant by the word “cyber…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Cyber crime
Read TextPreview

Extract of sample "Cyber crime"

Key Words: Cyber Crime, Data Privacy, Internet, Malicious, Non-Malicious Attacks Summary of Article The article "Cyber Threats and Data Privacy" by Birchfield simply provides information about the occurrences and the effects of cyber crime in US and especially in New Zealand. In this article, the author tries to provide a clear meaning of what is meant by the word “cyber crime” and “data privacy.” The author does this by providing detailed information concerning the internet and the role that the internet plays in the current economies. Further, the author gives this explanation by depicting threats that come as a result of cyber crime. These threats are into two groups, which are malicious and non-malicious attacks. For instance, some of the malicious attacks that organizations and businesses face include cyber theft and fraud, cyber warfare, industrial espionage and hacking among others. The non-malicious attacks include misuse of access devices, human error and accidental system failures. Additionally, the article provides the costs that companies incur or may in future incur as a result of cyber crime. Moreover, some of the best practices that can limit the cyber crime, and legislations and regulations of cyber crimes are also included in the article.
Your opinion about the piece- did you agree with it?
In my opinion, I would agree with the information provided concerning cyber crime in the article. One fact is that cyber crime is increasingly becoming an issue to most governments and its threats can be far much worse to an economy since it is a crime related to the internet; internet is one factor that an economy cannot survive without. Additionally, I would agree with what the author has indicated in the article because currently issues concerning cyber crimes are often discussed in the social media and various governments, therefore it is no doubt that whatever the author has provided is backed by so varied and valid evidences.
Do you think the topic was important?
The topic is very much important globally. Cyber threats and data privacy are factors that are currently becoming a major focus to various businesses, organizations and governments around the world. Since various sectors in the world or different nations depend so much on the internet, I think it is important to educate people on the threats that come as a result of the existence of the internet and how these threats can be limited. Failure to notify the world about this can affect the general economic growth of various nations.
Did you feel the author gave enough evidence about it?
Certainly, the author has provided more than enough evidence with regards to cyber threats and data privacy. For instance, the author has provided valid statistics concerning the intensity of cyber crime. In addition, the author has also tried to give some examples of cyber crime, how cyber crime occurs, and what governments are doing to limit cyber crime.
Work Cited
Birchfield, Reg. "Cyber Threats and Data Privacy." New Zealand Management 60.3 (2013): 46- 51. Business Source Complete. Web. 8Th April 2014. Read More
Cite this document
  • APA
  • MLA
(“Cyber crime Article Example | Topics and Well Written Essays - 500 words”, n.d.)
Cyber crime Article Example | Topics and Well Written Essays - 500 words. Retrieved from
(Cyber Crime Article Example | Topics and Well Written Essays - 500 Words)
Cyber Crime Article Example | Topics and Well Written Essays - 500 Words.
“Cyber Crime Article Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Fighting Cyber-Crime

...? Cybercrime Introduction With the increase in the widespread use of the internet, cybercrime rose massively from the year 2005 draining billions of dollars. In order to fight against it, technical, ethical and juridical challenges in efficiently reducing the crime started being identified. Fighting cybercrime has become an international engagement as this crime is not limited to a specific region. That is why the technical, organizational and legal understanding and cooperation among countries has become an important issue. However; this international cooperation has been facing many difficulties; the most important being the sharing and accessing of related information. This is because: 1. Every country...
5 Pages(1250 words)Term Paper

Criminology: Cyber Crime

...Criminology: Cyber Crime Introduction The invention and introduction of computer technology presented great advantages that made it receive warm welcome and appreciation from all corners of the world. Computer technologies have actually led to simplification of lifestyles considering its quick manner of solving problems and tasks. Computers have been the basis of operations in various institutions ranging from corporate to government organizations. Computers have been very instrumental in communication, transactions, storage of files and data, as well detecting certain malicious activities. Increasing technological knowhow about computer and its systems have witnessed simultaneous increase in criminal...
8 Pages(2000 words)Research Paper

Cyber crime

...? Article on Cybercrime for analysis: Anonymous cyber-attacks cost PayPal ?3.5m, court told Perhaps if there is a group that is infamously notorious in committing cyber crime, it would be the group Anonymous. Recently, one of the group’s leaders hit the news with the arrest and prosecution of one of its leader, Christopher Weatherhead, 22, a student at Northampton University who is now undergoing a trial at Suthwark crown court for attacking the PayPal which allegedly cost the company more than ?3.5m. The article involved Weatherhead and his three co-conspirators, Ashley Rhodes, 28, of south London, Peter Gibson, 24, of Hartlepool, and an 18-year-old from Chester where they carried out an...
3 Pages(750 words)Essay

Cyber Crime: Edward Snowdens leaks

...Cyber Crime: Edward Snowden’s leaks The unauthorized disclosure of the classified information on the National Security Agency (NSA) surveillance was illegal and an act of treason. The director of the agency Keith Alexander during congressional hearings said that the leakage had caused profound and irreversible damage to the interests of national security (Forbes 2013, September). Due to this, the president and the government branded him a threat to national security. However, the actions of Snowden acted as a whistleblower on the agency and encouraged the public demand for increased transparency around the foreign and domestic surveillance. Edward Snowden worked for the NSA for a few years. He realized...
4 Pages(1000 words)Essay

Cyber Security and Cyber Crime

...Cyber Security and Cyber Crime: An Annotated Bibliography Cashell, B., Jackson, W. D., Jickling, M. & Webel, B. “The Economic impact of Cyber-Attacks.” CRS Report for Congress. 2004. This report appreciates that cyber security has become a matter of national concern. It focuses on both the private and public sectors to unearth how cyber attacks could impact on the economic environment. It gives statistics of the effect on stock of some companies after an attack and the losses that result making it an important paper for managers and those in economic field. It also discusses how insurance companies have embraced this as a possible market...
3 Pages(750 words)Annotated Bibliography

Cyber Crime

...Introduction Cyber crime is a reference to a criminal activity that is carried out using the internet and the computers. Cybercrime takes the form of defrauding bank accounts that are online and the illegal downloading of music files. Moreover, the creation and distribution of viruses on computers and exposure of confidential information pertaining businesses amount to cyber crime. Criminals use identity theft in order to steal information from other internet users. This form of cyber crime entails luring unsuspecting users into fake websites whereby they enter confidential information (Ştefan p.116). Cyber...
8 Pages(2000 words)Research Paper

Cyber Security, Cyber Crime and Cyber Forensic

... is not limited to boundaries. Loop holes in information protection results in diverse kind of crimes, ranging from defense to finance. References Santanam, R., &Sethumadhavan, M. (2011).Cyber Security, Cyber Crime and Cyber Forensic: Applications and Perspectives. Idea Group Inc. Print Finklea, K. M., &Theohary, C. A. (2013).Cybercrime: Conceptual Issues for Congress and U. S. Law Enforcement.Congressional Research Service.... The Role of Federal Agencies in Fighting Digital Crimes Question 1 TheUnited States of America among other developed countries are facing escalating war against cybercrimes. The safety of the nation on digital basis entirely depends on the competence and devotion of the Federal...
2 Pages(500 words)Assignment

Cyber crime,the social engineering

...Cyber Crime By Introduction The term cybercrime refers to any unjustified act that relates to a computer and a network. The acts are felonious manipulations of the internet. The crime takes place to obtain important organizational information, robing of people through impersonation and other unlawful acts. The crimes lead to insecurity and threats to financial health of a given nation. In addition, the crimes may cause mental harm or ruin the reputation of an individual or a group (Wall 2007 page 107-240). Social engineering refers to the use of confidential tricks to divulge information from an organization through people, though it differs from a...
2 Pages(500 words)Essay

Cyber Crime

...Cybercrime The recent cases on data breach within high-profile companies have made many shoppers to have negative attitude towards online shopping.Most shoppers have the view that online shopping is more risky than ever. According to statistics by USA Today poll, 24% of Americans have reduced their frequent use of online purchasing techniques owing to recent incidents on identity theft. This presents an unfortunate situation since even the most careful online shoppers are not guaranteed 100% protection from identity theft or credit card fraud. One of the latest cybercrimes according to cyber security bloggers involves hacking of beauty supply chain Sally Beauty (SBH). Underground marketplaces posted a batch of stolen...
1 Pages(250 words)Essay

Cyber Crime

...A Review of Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting Review of Related Literature 2 Introduction Current developments intechnology have made it possible for most countries to improve and expand their communication technologies, allowing for faster as well as easier exchange of data. A good majority of the global population is using the internet and even more are connected to the internet and the communication networks via their phones and other mobile devices. Each day, close to 300 billion electronic mails and about 5 billion phone messages are being sent out (KPMG Klynveld Main Goerdeler, 2011). Majority of the global population has also...
26 Pages(6500 words)Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Cyber crime for FREE!

Contact Us