StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem - Research Proposal Example

Cite this document
Summary
The paper "The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem" highlights the modern ways to commit cybercrime, global trends in cybercrime, ways to protect cyberspace from the likelihood of cyberattacks, legislation to prosecute cybercrimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem
Read Text Preview

Extract of sample "The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem"

Social research methods Title The title of the research is “The analysis of various dimensions of cyber-crimes and the identification of possible solutions to this problem as applicable in the modern world”. Introduction Cybercrime is the crime which involves the use of computers or other digital devices. Cyber-crimes are also known as digital crimes. In a cyber-crime, the computers or other digital devices may be a tool used in the crime, the target of the crime or a storage medium for storing the evidences of the committed crime. The use of computers and internet has become obligatory in all aspects of modern life. Most of the information processing done in these days is extensively dependent on the use of information technologies. Therefore, it has become extremely important to prevent, control as well as investigate cyber activities in order to protect the informational, financial and other assets of an individual or an organization. The digital assets of individuals and institutions should be protected sufficiently in order to maintain the CIA system of digital information which includes the factors of confidentiality, integrity and availability of digital assets. The information present in the human brains, in transit or stored in physical or digital media needs to be protected to maintain their authenticity and confidentiality. These facts establish the high requirement and relevance of understanding cyber-crime in order to control and prevent these crimes. The research work will be segregated in three categories for the ease of answering the research questions adequately. These categories are the prevention of cyber-crimes, the control of cyber-crimes and the investigation of cyber–crimes. Research questions The main research questions to be answered by this research are given as follows Why are cyber-crimes committed? What assets are to be protected from cyber-crimes? How are cyber-crimes done? Why are cyber-crimes often successful? What are the global trends of cyber-crimes? Why are the cyber criminals not punished in proper jail terms? How can cyber-crimes be reduced? How can the global societies make their cyber spaces more secure? Literature Search (250) The main terms that can be used to search the empirical literature relevant to this research are cyber-crimes, digital crimes, hacking, cyber frauds, viruses, attacks, cyber security, credit card fraud, identity theft, internet fraud, electronic communications privacy and electronic surveillance. Some relevant literary works in journals, article, newspapers and other publications can be considered for this research. The documents referred to for this research will include but are not limited to the use of books, journals, valid websites, published reports and guidelines. Also, the cyber laws implemented in differ countries for the prevention and investigation of cyber-crimes like the European Laws, The United States Federal laws, The Security Protect Yourself Against Cyber Trespass (SPY) Act , the Information Technology Act , Nigerian Evidence Act, Japan’s Cyber Laws, Indian Cyber Laws, the Cybercrime Act, the Freedom of Information Bill, the Data Protection Act and the Financial Integrity Act would be studied for gaining a deeper understating of cyber-crimes and related cyber laws (Bernadette, Thomas and Schell, 2010). The websites of these different laws would also be referred to. The works of other researchers in this domain would also be considered as useful resources for the study being conducted. Methodology The research methodologies used in this research would include the collection of both primary and secondary data. The research will use a combination of qualitative research approach and quantitative research approach because some of the selected research questions can be adequately answered through the use of a qualitative research design while the rest of the research questions can be answered through the use of quantitative research designs (Creswell and Miller, 2000). The primary data collection techniques would include the administration of a questionnaire on a sample selected for the research. The questionnaire prepared for the research is given in Appendix 1. The questionnaires would be distributed among the security professionals who deal with cyber security in various organizations and businesses. The sample size selected would be around 60 people including the security personnel, random individuals from the society, ethical hackers and computer forensic experts. The questionnaires will be distributed through electronic mails. The research would follow a survey technique in which the chosen sample would be e-mailed the link to the survey. Also, an exploratory interview would be conducted with a selected group from the sample of 60 people in order to understand the qualitative aspects of the research. The primary data collection techniques would also include attending the trials of court cases in which criminal processing are being carried out against cyber-crimes and visiting computer forensic labs to develop a knowhow of the subject. Desk reviews and online reviews in related topics will be conducted as a part of secondary research (Golafshani, 2003). Analysis of case laws and media reporting related to cyber-crimes would also be taken up as secondary research methods. Ethical issues The research is conducted by giving adequate consideration to the associated ethical issues. Cyber-crime has emerged as a harmful and concerning issue in the global societies. Therefore, this research is expected to be an ethically complaint and valuable research from the perspectives of the global societies (Gray, 2004). The research is aimed at identifying the roots of cyber-crimes, evaluating the ways of prevention and investigation of cyber-crimes and promoting the awareness regarding cyber-crimes. The outcomes of this research are expected to be valuable for many individuals, organizations as well as government agencies for protecting their digital assets. This is likely to make the cyber space a more protected and secured place. Thus, the research is not only ethically compliant but is also expected to become a valuable resource for the societies. Timetable The time table for the research is given in the form of a Gantt chart which can be used to represent the tasks of a project in different phases as allocated in specific time periods of the research (Collis and Hussey, 2003). The total duration selected for the research is from September to March. The key tasks are allocated according to their priority and required time of completion. Month September October November December January February March Selection of research area Background information collection Selection of research methodologies Administration of selected tools Ethical evaluation Analysis of the information Outcomes and Learning from the research PDP Reflection The conduction of this research helped me to extend my knowledge about crimes in the digital world. I collected practical information about cyber-crimes by referring to various journals, reports and articles relevant to cyber-crimes and cyber laws. This helped me to develop extensive and in depth knowledge with respect to cyber-crimes. I studied a number of laws related to cyber safety and electronic surveillance. This has made me more knowledgeable about the laws enforced in different countries across the world to prevent and control cyber-crimes like identity thefts, credit card and online payment frauds, digital information hackling, phishing, money laundering, home renovation scams, circulation of offensive and prevented contents etc. I have developed an understanding of the reasons because of which cyber-crimes are committed, the technical and social vulnerabilities that may lead to cyber-crimes, the ways these crimes can be prevented, controlled as well as investigated. I have also identified certain ways in which general awareness can be created among people and to protect them from being the victims of cyber-attacks. I have accumulated much information about the cyber rules, electronic surveillance, safety and security in the use of the internet and motives and ways of cyber-crimes. The knowledge and skills gained through this research are likely to add value to my learning regarding crime and investigation and is expected to be much valuable for my future career development. References Bernadette, H., Thomas, J. & Schell, H. (2010). Corporate hacking and technology driven crime: social dynamics and implications. Hershey: Business Science Reference. Collis, J. & Hussey, R. (2003). Business Research. London: Palgrave Macmillan. Creswell, J. W. & Miller, D. L. (2000). Determining validity in qualitative inquiry: theory into Practice. Qualitative Research. Vol. 39(3). Golafshani, N. (2003). Understanding Reliability and Validity in Qualitative Research. The Qualitative Report. Vol. 8(4). Gray, D. E. (2004). Doing Research in the Real World. London: Sage Publications. Appendix Appendix 1: Questionnaire What are the psychologies and motivations behind cyber-crimes? Can cyber-crimes be controlled more by prevention or by legal punishments? In your view, can social awareness be identified as a way of preventing cyber-crimes? What are the ways in which cyber-crimes can be committed? Why do you think cyber-crimes have become frequent? Why do you think the success rate of cyber-crimes is so high? What, in your opinion are the most significant ways in which cyber-crimes can be reduced? What are the other ways in which the cyber space can be made more secured? Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Analysis of Various Dimensions of Cybercrimes and Possible Solutio Research Proposal, n.d.)
The Analysis of Various Dimensions of Cybercrimes and Possible Solutio Research Proposal. Retrieved from https://studentshare.org/information-technology/1653466-social-research-methods
(The Analysis of Various Dimensions of Cybercrimes and Possible Solutio Research Proposal)
The Analysis of Various Dimensions of Cybercrimes and Possible Solutio Research Proposal. https://studentshare.org/information-technology/1653466-social-research-methods.
“The Analysis of Various Dimensions of Cybercrimes and Possible Solutio Research Proposal”, n.d. https://studentshare.org/information-technology/1653466-social-research-methods.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem

Cyber crime and security affair in e-business

What are the new trends in cybercrimes?... How computers of home users are affected by cybercrimes?... The study will define Cybercrime and its meanings along with defining E-Commerce.... Effect of cyber crime on E commerce will be discussed in detail.... It will be established whether Cybercrime and cyber criminals are a threat to E Commerce especially online shopping....
24 Pages (6000 words) Article

Legal and Illegal Access to Personal Information Online

Thesis Statement An analysis of the reasons of internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outweigh the benefits of internet and what should be done to reduce crime involving unethical practices of hacking, identity theft, crime in e-commerce and social networking.... ?? Written By: Table of Contents Introduction 2 Thesis statement 3 Categories of Cyber Crime 3 E-Commerce 4 Social Networking 5 Identity Theft and Hacking 5 Evaluation and solutions for E-Commerce & Social Networking 6 References 8 Introduction We live in an era which is rapidly getting transformed into a cyber-world....
7 Pages (1750 words) Essay

Cyber Threat in a Finance Organisation

This paper “Cyber Threat in a Finance Organisation” will try to shed light on pertinent issues regarding identity fraud in the financial organization through cyberspace.... In the first section, the paper will try to demystify the nature of identity fraud in financial organizations.... hellip; Research scholars have tried to identify the nature and complexity of fraud in cyberspace....
12 Pages (3000 words) Essay

Contract tender process in the work environment

36 Pages (9000 words) Essay

Scientific Management and Human Relations Model in Criminal Justice

This paper “Scientific Management and Human Relations Model in Criminal Justice” attempts to understand this work environment, undertake a review of relevant literature and research work carried out in this direction and present some solutions, for consideration.... hellip; The author states that through time and motion studies, science was brought into each and every facet of work by reducing the need for human intervention, to as great a degree as possible....
8 Pages (2000 words) Research Paper

Evaluation and Solutions for E-Commerce & Social Networking

An analysis of the reasons for internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outweigh the benefits of the internet and what should be done to reduce crime involving unethical practices of hacking, identity theft, crime in e-commerce and social networking.... This paper "Evaluation and solutions for E-Commerce & Social Networking" discusses the risks and hazards of information being misused over the internet....
7 Pages (1750 words) Case Study

Cyber Security Issues

With this, attackers combine the characteristics of different components of IT threats including viruses, malicious code, worms with the server, client-side, and internet vulnerabilities to launch various attacks.... This report "Cyber Security Issues" presents cyber attacks that have often been individuals, corporate institutions, and in worse cases, governmental institutions....
38 Pages (9500 words) Report

Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK

Having established one aspect that constitutes cyber victimization, there have been studies that have widely considered legal solutions within a broader context, with such studies including what has been considered in the United Arab Emirates (UAE) as alternative approaches to regulating online conduct like public education....
38 Pages (9500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us