StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The elimination of IT crimes by knowledge management approaches - Thesis Proposal Example

Cite this document
Summary
The Elimination of IT Crimes by Knowledge Management Approaches Background Criminal groups across the globe are benefitted from modern technology as the integration of various communication channels enables them to maintain strong relationships between each other…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
The elimination of IT crimes by knowledge management approaches
Read Text Preview

Extract of sample "The elimination of IT crimes by knowledge management approaches"

The Elimination of IT Crimes by Knowledge Management Approaches Background Criminal groups across the globe are benefitted from modern technology asthe integration of various communication channels enables them to maintain strong relationships between each other. According to Arreymbi (2005, pp.289-291), since the modern banking business widely employs innovative computing techniques and most modern information technologies, it assists criminal groups to close international delinquent transactions easily.

Longe, Ngwa, Wada, Mbarika, Kvasny (2009) also point out that the revolutionary developments in the field of electronics have greatly aided the criminal groups to get easy access to the new technical means, and thus embezzle huge funds, avoid tax barriers, and launder large sum of illegal money. These types of information technology crimes have become one of the major concerns for government and other legal authorities. Cherkasov opines that the IT crimes can be eliminated to a large extent through knowledge management approaches.

An IT crime specifically refers to “an unlawful act wherein the computer is either a tool or a target or both” (Darjeeling Police). Hence, the computer users must be aware of the cyber threats while logging on to their accounts. Firstly, physical security is an important factor. In the view of Newman (2010, p.228), organisations and other government authorities must ensure that their computer network is protected from the access of unauthorized persons. A well designed access control system would also prevent IT crimes to some extent as it does not allow unauthorized communications between internal and external network.

In the words of Proctor, Lien, Vu, Schultz, Salvendy (2002), since organizations or other governmental institutions may have large volume of data to store, it is better to set username and password for secret data. The timely changing of passwords increases the safety of organizational data, and protects firms from the threats of computer hackers. Similarly, the system managers must detect the weaknesses in the network ‘before the intruders do’ (The economic times). It is identified that holes in the network is a crucial factor that enables the hackers to access organizational information.

As Manzuik, Pfeil, Gold, and Gatford (2007, pp.88-90), cyber defense agencies have suggested that network scanning programs would be of great help to minimise the IT crime rates. UNIX, a security administration’s tool freely available on internet, scans and collects information about host on a network if there exists any. This utility examines different threats including bugs, inadequate password protection, and other security weaknesses. Horwitz (2003) suggests computer Oracle and Password System (COPS) as another network scanning program that mainly scans for threatening file permissions and poor passwords.

Recently, some effective intrusion alert program have been developed in order to identify suspicious activities and thereby to take immediate preventive measures. These programs operate constantly so that suspicious activities on network are identified immediately. Usage of encryption would also be a very effective method to prevent IT crimes. Research aims This research aims to identify effective tactics that can eliminate major IT crimes. The Computer Security Institute (as cited by Cherkasov) reports that 90% US companies were under the threat of computer attacks in 2002 and almost 80% of them suffered minor and major damages as a result of hackers’ activity .

This data indicates the intensity of IT crimes. However, it seems that most of the organisations are still unaware of the threats regarding information safety. This condition further helps criminal groups or hackers to get access into firms’ weaker networks. UK’s Parliamentary Office of Science and Technology (2006), reports in ‘Postnote: Computer crime’ that IT crimes have adversely affected the nation’s economic interests during the last few years; the major role of increasing crime is attributed to the ignorance of computer users.

In short, IT crimes and associated impacts can be mitigated notably, provided that organisations practice knowledge management approaches effectively. This paper will suggest some immediate steps that can be effectively practiced to address the issues related to IT crimes. Research objectives The research intends to propose a potential action plan that can effectively give recommendations to the beneficiaries. It is possible only by enhancing knowledge management practices across the firm. In brief, it is advisable for the cyber defense agencies to conduct security awareness programs for organisations and other beneficiaries.

Media can be widely utilised for enhancing awareness as people spend considerable amount of time on them these days. An expert team of IT professionals assigned by government can make visits to organisations across the country for giving specific advice to network system managers. This strategy would be helpful to organisations since nature of holes in network varies from firm to firm. References Arreymbi, J 2005, “Online banking: Spoofing scams exposes security loopholes”, In ISSE 2005 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference, (Eds.) S. Paulus, N.

Pohlmann & H. Reimer, Vieweg, Germany. Cherkasov, V (n. d), ‘Information technologies and organized crime’, Computer Crime Research Center, Viewed 04 July 2011, ‘Darjeeling Police’, n.d, Viewed 04 July 2011, ‘The Economic Times’, Viewed 04 July 2011, Horwitz, J 2002, Unix System management: Primer Plus, Sams Publishing, USA. Longe, O, Ngwa, O, Wada, F, Mbarika & Kvasny, L 2009, ‘Criminal uses of information & communication technologies in Sub-Saharan Africa: trends, concerns and perspectives’, Journal of Information Technology Impact, Vol.9, No.3, pp.155-172. Manzuik, S, Pfeil, K, Gold, A & Gatford, C 2006, Network Security Assessment: From Vulnerability to Pitch, Syngress Publishing, Canada.

Newman, RC 2009, Computer Security: Protecting Digital Resources, Jones & Bartlett Learning, USA. Proctor, RW, Lien, M, Vu, K, Schultz, EE & Salvendy, G 2002, ‘Improving computer security for authentication of users: Influence of proactive password restrictions’, Behavior Research Methods, Instruments, & Computers, Vol. 34, No.2, pp. 163-169. ‘Postnote: Computer crime’, October 2006, Parliamentary Office of Science and Technology, No.271, viewed 04 July 2011,

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The elimination of IT crimes by knowledge management approaches Thesis Proposal”, n.d.)
Retrieved from https://studentshare.org/health-sciences-medicine/1426698-the-elimination-of-it-crimes-by-knowledge
(The Elimination of IT Crimes by Knowledge Management Approaches Thesis Proposal)
https://studentshare.org/health-sciences-medicine/1426698-the-elimination-of-it-crimes-by-knowledge.
“The Elimination of IT Crimes by Knowledge Management Approaches Thesis Proposal”, n.d. https://studentshare.org/health-sciences-medicine/1426698-the-elimination-of-it-crimes-by-knowledge.
  • Cited: 0 times

CHECK THESE SAMPLES OF The elimination of IT crimes by knowledge management approaches

Using more community service combined with probation we can eliminate the broken windows theory

Essentially, there is an abundance of research focusing on a collection of approaches deemed to possess the most impact on convicts in helping them minimize or desist from more criminal behavior.... In addition, this section also analyzes the approaches and community work skills commonly employed by probation officers, and also consider the... This may be a key policy issue for city management, which may be forced to weigh their options in an attempt to reach at the most effective method of dealing with crime....
18 Pages (4500 words) Research Paper

Psychological Approaches to Tackling Hate Crime

The paper "Psychological approaches to Tackling Hate Crime" states that hate crime can occur in any context, may involve any crime and may influence any part of society.... Keywords: hate crime, race, sexual orientation, religion, community, psychology, contact theory, scapegoat theory, in-group, out-group Psychological approaches to Tackling Hate Crime What Psychological approaches, if any, are Effective at Tackling Hate Crime?...
21 Pages (5250 words) Research Paper

Paradigm Shift in Penology: Rehabilitation of Sex Offenders

Reinterpreting Punishment In a world where barbaric ways and draconian approaches are shunned, constitutional provisions of most countries and states prohibit any form of ‘cruel and unusual' punishments.... The different serious types of sex offense such as prostitution, corruption of minor, child molestation, statutory rape, sexual imposition, child pornography and pandering obscenity may lead to various types of punishment and unique approaches to rehabilitation....
7 Pages (1750 words) Essay

The Critical Review of Three Basic Approaches towards Maintaining Law and Order

… The idea of law and order is known for being supported by three elementary approaches.... The critical review of all the three known approaches towards... The modern law and order management is based on treating humans with the humanistic values.... Additionally, as the advent of knowledge occurred in the modern era, governments and law enforcement agencies came to realize the importance and value of scientific evidence....
4 Pages (1000 words) Essay

What are the limitations of situational crime prevention

The underlying theme of environmental criminology is that crimes require convergence in time and space of a motivated offender, a suitable target, in the absence of a capable guardian.... Situational crime prevention.... as the applications of environmental criminology are called,… It does not try to attack the root social or psychological causes of crime....
16 Pages (4000 words) Essay

Effect of Internet on Fraud and Identity Theft

The paper “Effect of the Internet on Fraud and Identity Theft” examines the influence of the Internet on deception and persona robbery and will address the issues surrounding the difficulty of security and inadequacy of legislation against these crimes.... hellip; The purpose of the study will be to examine the effect of the internet on fraud and identity theft....
4 Pages (1000 words) Essay

To What Extent Has Criminal Violence Changed In The Last Century In The UK

The British crime survey was established to provide an empirical data on crime in the United Kingdom as a whole by monitoring reported violent crimes in the police stations.... Violent crimes are classified into different groups including robbery, rape, assault and murder in which violence is a common denominator.... Violent crimes have different endings including death, injury or permanent incapacitation of those involved due to deep tissue injuries and fractures....
12 Pages (3000 words) Essay

Imperfections in Audit Outcomes: Fraud & Corruption

This paper "Imperfections in Audit Outcomes: Fraud & Corruption" discusses fraud and corruption as activities that are most undesirable for any organization.... In fact, many experts including auditors strive to ensure that these activities do not take root in the organization.... hellip; it is beyond doubt that it is not entirely possible to unearth and measure all fraudulent activities....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us