We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

The elimination of IT crimes by knowledge management approaches - Thesis Proposal Example

These types of information technology crimes have become one of the major concerns for government and other legal authorities. Cherkasov opines that the IT crimes can be eliminated to a large extent through knowledge management approaches. An IT crime specifically refers to “an unlawful act wherein the computer is either a tool or a target or both” (Darjeeling Police). Hence, the computer users must be aware of the cyber threats while logging on to their accounts. Firstly, physical security is an important factor. In the view of Newman (2010, p.228), organisations and other government authorities must ensure that their computer network is protected from the access of unauthorized persons. A well designed access control system would also prevent IT crimes to some extent as it does not allow unauthorized communications between internal and external network. In the words of Proctor, Lien, Vu, Schultz, Salvendy (2002), since organizations or other governmental institutions may have large volume of data to store, it is better to set username and password for secret data. The timely changing of passwords increases the safety of organizational data, and protects firms from the threats of computer hackers. Similarly, the system managers must detect the weaknesses in the network ‘before the intruders do’ (The economic times). It is identified that holes in the network is a crucial factor that enables the hackers to access organizational information. As Manzuik, Pfeil, Gold, and Gatford (2007, pp.88-90),

Check these samples - they also fit your topic

Project Management in a Matrix Organization
Our society makes exceptionally hard, mostly disputable, but historically inevitable and required restructuring. In social and political spheres, there is transition from totalitarianism to democracy, in economic life there is a switch from command economy to the market.
20 pages (5000 words)Thesis Proposal
Waste Elimination
Waste is described through very many means and the mode in which the responsible causative agent handles it matters a lot to the environment as a whole. It is for this reason that there was the analysis and classification of waste into 7 major groups (Ohno, 2008, 124).
6 pages (1500 words)Coursework
Reducing Errors by Improving Pain Medication Knowledge
Typically, the patients have received both fentanyl (a short-acting pain medication) and dilaudid (long-acting) pain medication. At times the anesthesiologist will not report when they gave the last dose of pain medication. The medication has been administered early in some cases, or late in the case of the patient having been in the operating room.
19 pages (4750 words)Thesis Proposal
Major Approaches to Knowledge Management
This question therefore compares and contrasts the major approaches to knowledge management; then examine the role that computer technology plays in capturing unique but level dependent, organizational
15 pages (3750 words)Essay
Finance; Enterprise Risk Management
Enterprise Risk Management (ERM) is a framework that allows businesses to achieve this. ERM has been defined as “A process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the
1 pages (250 words)Thesis Proposal
PhD in Human Resources Management
The proposed study will also look to investigate the impact of performance management on the employees of an organization and whether it
6 pages (1500 words)Thesis Proposal
Project management
There is the case of Flick (2008, pp. 93), for example, who explained that the widely recognized tendency for generality in the case of qualitative research can be addressed
4 pages (1000 words)Thesis Proposal
The relation of quality management and risk management -or- the future of quality management with risk management
According to Kuhn and Youngberg (2002, p.158) there are practices of quality management including quality improvement and quality optimization that would work well for risk management. Gow (2005, 2) observes that integrating quality management with risk management is an
4 pages (1000 words)Thesis Proposal
Data management in cloud environments
This research study would focus on identifying the different data storage systems belonging to both the framework of SQL and noSQL. The study not only outlines the different data storage engines but even brings forth the contrasting elements in such
10 pages (2500 words)Thesis Proposal
Leadership and management
As the following section shows, the existing research has addressed the influence of leadership, motivation, communication and conflict resolution approaches in virtual team leadership. However, a gap exists in the
7 pages (1750 words)Thesis Proposal
cyber defense agencies have suggested that network scanning programs would be of great help to minimise the IT crime rates. UNIX, a security administration’s tool freely available on internet, scans and collects information about host on a network if there exists any. This utility examines different threats including bugs, inadequate password protection, and other security weaknesses. Horwitz (2003) suggests computer Oracle and Password System (COPS) as another network scanning program that mainly scans for threatening file permissions and poor passwords. Recently, some effective intrusion alert program have been developed in order to identify suspicious activities and thereby to take immediate preventive measures. These programs operate constantly so that suspicious activities on network are identified immediately. Usage of encryption would also be a very effective method to prevent IT crimes. Research aims This research aims to identify effective tactics that can eliminate major IT crimes. The Computer Security Institute (as cited by Cherkasov) reports that 90% US companies were under the threat of computer attacks in 2002 and almost 80% of them suffered minor and major damages as a result of hackers’ activity . This data indicates the intensity of IT crimes. However, it seems that most of the organisations are still unaware of the threats regarding information safety. This condition further helps criminal groups or hackers to get access into firms’ weaker networks. UK’s Parliamentary Office of Science and Technology (2006), reports in ‘Postnote: Computer crime’ that IT crimes have adversely affected the nation’s economic interests during the last few years; the major role of increasing crime is


The Elimination of IT Crimes by Knowledge Management Approaches Background Criminal groups across the globe are benefitted from modern technology as the integration of various communication channels enables them to maintain strong relationships between each other…
The elimination of IT crimes by knowledge management approaches
Read TextPreview
Comments (0)
Click to create a comment
Let us find you another Thesis Proposal on topic The elimination of IT crimes by knowledge management approaches for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us