StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How can we safeguard against the cybercrime - Essay Example

Cite this document
Summary
A number of scholars describe white collar crime as a nonviolent form of crime that is committed by people having technical or professional knowledge about a business or government operations and that uses deception with the sole purpose of gaining financially…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
How can we safeguard against the cybercrime
Read Text Preview

Extract of sample "How can we safeguard against the cybercrime"

Written Assignment: Discussion Questions Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? In a nutshell, the FBI describes white collar crime as “lying, cheating, and stealing”. A number of scholars describe white collar crime as a nonviolent form of crime that is committed by people having technical or professional knowledge about a business or government operations and that uses deception with the sole purpose of gaining financially (Strader, 2001).

White collar crime is something that has elicited debate and mixed reactions from across the globe with many companies such as Enron and WorldCom going down as a result of it. Cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century. There exist different types of cybercrimes and these include computer fraud, spamming, identity theft, hacking, and intellectual property theft. These crimes are committed through the use of computers as weapons, accessories, or sources of the crime, and are thus a creation of the 21st century (Benson & Simpson, 2009).

A number of nations and governments are working round the clock with specialized units to help in stopping cybercrime. However, the magnitude, scope, and complexity of these crimes are growing on a daily basis, and this makes it even more difficult to deal with them. The first and most basic way is to enact laws that cover cybercrimes and review them on a regular basis to protect people and businesses against cybercriminals (Wall, 2007). Secondly, companies must enact security policies so that each and every individual is able to account for his or her activities on the computer at the workplace.

An authorized access should be prohibited at all costs, and people should know of the costs of engaging in the crimes. Thirdly, both individuals and companies need to install hardware and software defenses which include antivirus, anti-spamming software, and firewalls to minimize external access to the organizations networks (Wall, 2007). Fourthly, international treaties and agreements must be made, and this is necessary because of the worldwide nature of the internet. In what ways should making money online have its limits?

For example, is pornography, online gambling, etc., fair game? What are the ethical considerations involved? Globalization is something that has brought a lot of good to the world and, at the same time, has increased problems. One of the results of globalization is the ability of people to make money while at home; the ability to work oversees while sited in the comfort of your home. However, there are a number of immoral commercial activities that take place in the internet. Money making should not extend to those activities that put others at risk or corrupt the minds of others.

Such is the result of activities such as pornography and online gambling. People engaging in activities over the internet have to engage in legal activities, which are for the benefit of the individual and the economy of a nation. When dignity, morals, and self-worth are lost as a result of these activities, then they are not beneficial at all (Cheeseman, 2012). Several ethical considerations are supposed to be made when engaging in these activities. First is individuals’ privacy, which is something that must be respected.

When engaging in such activities, privacy is lost and people often lack a sense of self-worth and dignity. Another ethical consideration is security both of individuals and the community. When people make money online through such activities, the identity theft and other cybercrimes are inherent (Tavani, 2011). Due to the nature of the activities, it is difficult to ensure security of transactions, and thus no one is liable for losses. A third ethical issue is morality; many people, including children, access the internet and they want to engage in such activities that generate money.

The problem is that the information is not filtered and thus corrupts the morals of children who may want to engage in the activities. Information is thus available to them, and they can receive help from the perpetrators, and this increases the risk of their exposure to such immoral acts (Cheeseman, 2012). If I post a poem on my Facebook site and someone cuts and pastes it on their site is that a case for stealing my intellectual property? Intellectual property refers to the creations of the mind.

Everything original that a person creates in his or her mind warrants to be called intellectual property and is supposed to be safeguarded with all the care it deserves. Intellectual property falls broadly into two categories: industrial property and copyright. Industrial property includes trademarks, patents, and the industrial designs that are used specifically for the purposes of commerce (Holland, Reed, Lee, Kimmel, & Peterson, 2007). These may be owned by one company, a group of companies, or even the employees, and are very important for the business transactions, hence the need to keep them confidential.

Copyrights include artistic and literary works produced by individuals, and this may include such things as poems, musical works, films, photographs, paintings, drawings among others. Intellectual property rights are, therefore, concerned with the protection of these creations to ensure that they are kept confidential and that their use is subject to the approval of the owner (Schwabach, 2007). A poem that is posted on Facebook is still a creation of the mind that was made by an individual with the purpose of entertaining others.

The poem thus falls under the copyright category of the intellectual property and should be respected just like any other creation of the mind. The person who came up with the poem is an artist, and his or her work needs to be respected as much as the work not copyrighted at that moment. Copying such a poem and pasting on another site warrants intellectual property theft, because the information is not your creation. In such a situation, if the poem has to be used on the particular site, then the individual using it has to acknowledge the poet and mention his or her name at the end of the poem.

In this way, he attributes the poem to the author, and the chances of being liable for copyright infringement will be low as compared to when it is copied without acknowledgement. References Benson, M. L., & Simpson, S. S. (2009). White-collar crime: An opportunity perspective. London: Taylor and Francis. Cheeseman, H. R. (2012). Business Law: legal environment, online commerce, business ethics and international issues. London: Pearson Education. Holland, C. J., Reed, D. M., Lee, S. H., Kimmel, A. I., & Peterson, W. K. (2007).

Intellectual property: Patents, trademarks, copyrights and trade secrets. New York: Entrepreneur Press. Schwabach, A. (2007). Intellectual property: A reference handbook. Santa Barbara, California: ABC-CLIO. Strader, K. J. (2001). Understanding white collar crime. Retrieved May 28, 2012, from http://www.lexisnexis.com/lawschool/study/understanding/pdf/WhiteCollarCh1.pdf Tavani, H. T. (2011). Ethics and technology: Controversies, Questions and Strategies for ethical computing. New York: John Wiley& Sons. Wall, D. (2007).

Cybercrime: The transformation of crime in the information age. Cambridge: Polity press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How can we safeguard against the cybercrime Essay”, n.d.)
How can we safeguard against the cybercrime Essay. Retrieved from https://studentshare.org/information-technology/1399313-how-can-we-safeguard-against-the-cybercrime
(How Can We Safeguard Against the Cybercrime Essay)
How Can We Safeguard Against the Cybercrime Essay. https://studentshare.org/information-technology/1399313-how-can-we-safeguard-against-the-cybercrime.
“How Can We Safeguard Against the Cybercrime Essay”, n.d. https://studentshare.org/information-technology/1399313-how-can-we-safeguard-against-the-cybercrime.
  • Cited: 0 times

CHECK THESE SAMPLES OF How can we safeguard against the cybercrime

Cybercrime

The question arises how do we safeguard against cybercrime and who is responsible for this?... cybercrime cybercrime, or computer crime is an issue of growing importance today.... cybercrime, as the name suggests, is an illegal or immoral act that involves a computer or a network.... cybercrime can be done in different ways and can occur anywhere.... There are two categories of cybercrime.... These two types are the umbrella categories, but there are many other subcategories involved in cybercrime....
4 Pages (1000 words) Research Paper

Is the Fraud Act a Useful Tool in E-crime Prosecution

Another major factor that has helped to aggravate the problem of cybercrime is the anonymity that Internet offers.... ??2 This change in motive has occurred mainly due to rise in e-commerce, where we find that with nearly 45% of internet users using some kind of a financial transaction via cyberspace, there has been increasing number of online credits/debit card frauds, attempts at extortion attempts, and phishing....
59 Pages (14750 words) Dissertation

Legal Aspects of Internet Governance

Concerns have even stemmed out of activities such as cybercrime which includes: theft of identity, credit card online frauds, illegal pornography, and loss of property that is intellectual in nature.... These users are recognized as soft targets and a number of criminal entities can take advantage of them.... % of the world's population is using internet, but they are unaware of the threats they may face and their awareness of how to avoid such threats is even low in amount (International Business Publications, 2007, p....
7 Pages (1750 words) Essay

UK, USA and UAE Cybercrime Law

Nevertheless, given the high financial and security stakes that have come to stalk the Internet, cybercrime has become increasingly common and complex.... For this reason, the US and the UK have made legislation to counter and extirpate cybercrime, albeit these laws have their strong and weak points.... INTRODUCTION The phrase cybercrime refers to any legally proscribed action that is performed over the Internet, a local network or the computer or any other device that can support the Internet, a local network or function of a computer....
4 Pages (1000 words) Essay

Management Information Systems and Cybercrimes

The major types of cybercrime can be fraud and identity theft.... But I am not I know many teenagers who can download movies, post to Facebook, find a YouTube video and more, but the minute they need to learn something there is a lack of knowledge.... Personal information can be easily fallen in the wrong hands which can be detrimental to individuals....
2 Pages (500 words) Essay

Resolving Issues Related to Cybercrime

In order to combat cybercrime, international cooperation is necessary.... Authentication mechanisms are also instrumental in preventing various forms of cybercrime.... hellip; cybercrime takes the form of defrauding bank accounts that are online and the illegal downloading of music files.... The creation and distribution of viruses on computers and exposure of confidential information pertaining to businesses amount to cybercrime....
10 Pages (2500 words) Research Paper

Cyber Crime A Global Crime

A more extensive definition was given by the Council of Europe's Budapest Convention on Cyber Crime that defined cybercrime as – Offences against the confidentiality, integrity, and availability of computer data and systems, that is, offenses against computer data and systems, including illegal access to a computer system, such as “hacking” (Article 2), the illegal interception of the transmission of computer data (Article 3), data interference, that is, the damaging, deletion, deterioration, alteration or suppression of computer data (Article 4), system interference, that is, hindering of the functioning of computer systems (Article 5), including denial of service attacks, the misuse of devices (Article 6) – the production, sale, procurement, or otherwise making available of devices of data (e....
14 Pages (3500 words) Research Paper

Cybercrime and Its Impact on International Trade

The "cybercrime and Its Impact on International Trade" paper explore the cyber-world and take a brief look at how trade is conducted through this media while highlighting the effect of cybercrimes on this line of commerce.... Within the scope of this joint phenomenological convention, greater attention is now being given to what is known as the 'cybercrime'.... xecutive summary: Since the mid-1990s, the European Union, the Council of Europe and the Group of Eight (G8), have come together and made a number of laws and various other regulations to fight against organized crimes that are international in nature....
75 Pages (18750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us