StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Effects of Cybercrime - Essay Example

Cite this document
Summary
The paper "Effects of Cybercrime" discusses that generally speaking, piracy cybercrime has affected the music, software, and entertainment industries. These industries invest a lot of resources in their products only to fall into the hands of the pirates…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Effects of Cybercrime
Read Text Preview

Extract of sample "Effects of Cybercrime"

Effects of Cybercrime Effects of Cybercrime Introduction According to Brenner, Cybercrime, commonly known as e-crime/computer crime, is a criminal act whereby computer or computer networks serves as a target, location, means or as the source of the activity. Its scope covers all the criminal activities revolving around the computer. Such malicious activities include identity theft, web site defacement, financial fraud, and cyber bullying. In an organization, computer crimes involve hacking customer databases as well as stealing of intellectual property. Usually, computer users think that they can protect themselves, their personal computers and their accounts by using antivirus software or anti-spyware, but this is not always the case. E-crimes are very sophisticated and target consumers, public and private institutions (Wall). Computer crimes range from outside parties hacking the computer networks and phish in malicious programs that give users a deceitful sense of security, instigating them to disclose vital information. Some of the effects of cybercrimes are: Loss of intellectual property The greatest effect of cybercrime is the loss of intellectual property as well as confidential information of the business. However, it is not easy to determine the exactly the extent of the losses. Partially, cybercrime is not a zero-game because the stolen information is not fully gone. Infiltrators steal only the company plans including the customer lists and the working strategies (Westby). Amazingly, the company may not be aware that it is no longer in control of the information flow and they are controlled outside their infrastructure. The spies take control of the company’s network and access the information that runs the institution. More often, such infiltrators are the company’s competitors who wish to make similar products and compete equally. Even though they cannot produce exactly the same product, the idea is leaked out. The spies having the intellectual information can compete in the market, and the victim company may be grounded in its operations. This is because the competitor may produce cheap products that attract many customers in the market (Brenner). Loss of confidential business information Every business entity strives to be unique in its operation. This implies that every organization has to conceal its vital information to be peculiar and be attractive to the customers. Such vital information may be stored in the computers and network framework of the organization. Although it may take some time for stolen IP to appear in the competing product, there is no deferment in monetizing abducted vital business information. For instance, theft of sensitive business negotiation deals, oil exploration data or stock trading information may be quickly used by the acquirer and the damage may be huge. Such vital information once lost may be regrettably forgotten because deals are sealed without delays. It is very difficult to measure such category of loss because the victim may not know exactly why the negotiation was canceled; contracts were lost, or were underbid (Wall). On the other hand, hackers may manipulate the automated trading systems or stock prices putting out false impression about the organization in the market. Even though the effect may be short-lived, the spy may execute a planned trade in advance. In the cases where the hacker manipulates the stock, the crime will resemble an insider trading which is very difficult to notice. Such vital information may be used to make other trades in other exchanges, thus making enforcement efforts complicated. Loss of income/revenue Brenner and Kshetri argued that most computer fraudsters target financial sites where they can access money. Although it is not easy to directly access them, they use other programs that divulge the users to give. This leads them to obtain sensitive financial information that can be used to access the sites. They then withdraw the money unnoticed, leaving the accounts empty. There is no doubt that most operations worldwide have been digitized to make transactions faster and convenient. Financial transactions are done online with transfers done electronically. These electronic transfers involve a lot of money that if carelessly handled leads to big losses. The organization may, therefore, lose a lot of money especially when they are in-operational, or they are compromised. Waste of time and resources Time is money for any organization and every minute counts. No organization wants their precious time to be used in incidences like cybercrimes. Cybercrimes bring the operations into a standstill, especially if the most sensitive information or areas have been affected. There is no need to proceed in the operation if it ruins the performance. It involves the efforts of the managers and the IT personnel to ensure that the organization infrastructure is under control. Such precious time is wasted which could have been used to increase production. On the other hand, it involves hiring other personnel and use of other resources to bring the menace under control. Instead of investing in other productive work, much of these resources are used to handle security breaches and other related cybercrime problems (Westby). On the other hand, users have to use a lot of passwords to access the information which could otherwise be accessed easily. For instance, it may take a single user ten minutes to access information that could be accessed in two minutes. If ten users were to access the site, it translates to over one hour lost in the process. Even if it is the second that is wasted, it counts a lot for the productivity of the organization. Damaged reputations Organizations derive their pleasure in the good name they have. Good name attracts customers and other investors. However, when reputation of an organization is questionable, potential customers shy away, and the existing may seek other alternatives. When an organizational system is hacked, its reputation is soiled, and customers lose confidence in it. For instance, when customer records are tampered or illegally accessed as a result of cybercrimes, the reputation of the organization is at stake. Customers talk ill the company making the entire company look like a house of thieves. It is even worst when customers’ financial information is intercepted by the hackers. They begin investing elsewhere where they feel they are safe (Kshetri). Piracy Piracy cybercrime has affected the music, software, and entertainment industries. These industries invest a lot of resources in their products only to fall in the hands of the pirates. There are several fraud claims of piracy of original files and documents due to cybercrimes. Infiltrators hack other people’s inventions and reproduce them before the owners know to capture the available markets. Before the owners reach the market with their ‘new’ products, they are already available. This results in losses to the owners, especially if they have invested heavily. It may not be easy to estimate the losses, but it ranges from hundreds of millions to hundreds of billions of dollars annually (Wall). Very strict laws have been lobbied to curb this copyrights and intellectual theft of property. Cost of protection Organizations that wish to protect themselves from cybercrimes should pull out their wallets to accomplish this. A lot of costs are incurred in identifying the risks, creating new and safer operating system procedures as well as purchasing protective software and hardware devices. For businesses with sensitive or complicated operations, it involves hiring highly competent professionals and consultants to implement a customized solution. This is not only expensive, but also tedious to monitor frequently to ensure that up-to-date and free from cyber-attacks. These costs are usually passed to the final consumer through escalated prices of goods and services. In general, the entire production costs increases, making the customers shy away from the company. This will in turn cut down the profit margin and limit the company from competing fairly with others on the same level (Brenner & Wall). Work cited Brenner, Susan W. Cybercrime: Criminal Threats from Cyberspace. ABC-CLIO, 2010. Kshetri, Nir. Cybercrime and Cybersecurity in the Global South. ND: Palgrave Macmillan, 2013. Wall, David. Cybercrime: The Transformation of Crime in the Information Age. India, ND: Polity, 2007. Westby, Jody R. International Guide to Combating Cybercrime. New York: American Bar Association, 2003. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Effects of Cybercrime Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Effects of Cybercrime Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1668610-effects-of-cybercrime
(Effects of Cybercrime Essay Example | Topics and Well Written Essays - 1250 Words)
Effects of Cybercrime Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1668610-effects-of-cybercrime.
“Effects of Cybercrime Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1668610-effects-of-cybercrime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Effects of Cybercrime

Training Series Part 6

A cybercrime is different from a natural crime in the most basic sense, which is the fact that any sort of criminal activities happen through the medium of internet. A normal crime consists of thefts,… Money can be stolen on the internet.... This is the sort of crime which happens on the internet....
3 Pages (750 words) Assignment

The Essence of Cybercrime

There are two types of cybercrime.... cybercrime is a criminal activity that is done through the use of computers and the internet as a tool to target a victim.... cybercrime has developed to become one of the fastest growing areas of crime.... In recent years, cybercrime has evolved....
5 Pages (1250 words) Essay

Anti hacking techniuqes

The occurrence of cybercrime is all over the world.... cybercrime is one of the problems being faced by everyone using computer systems and networks.... One of the stated cybercrime which is very popular is hacking.... n recent times, hacking is not only used to victimize and exploit others but also, hackers indulge in hacking cybercrime to utilize their knowledge to gain quick benefits....
7 Pages (1750 words) Report

Capacity Building as an International Response to Cybercrime

The primary aim of the discussion is to illustrate the probable and the potential measures to eradicate or control the extensive presence of cybercrime within a society.... The discussion further focuses on depicting capacity building as an international response towards cybercrime.... … According to the report Capacity Building as an International Response to cybercrime, people in the society need to deal with several challenges in relation to privacy....
15 Pages (3750 words) Assignment

International Banking and Financial Services

The scenario is same for both matured and emerging markets of the Asia Pacific region.... Surveys revealed that Japan and Australia… But surveys also tell that those banks will face serious challenges to cope with changing trends of global financial systems.... Flexibility and efficiency scalability will be under serious threats if their IT It is a back bone of global banking services....
8 Pages (2000 words) Term Paper

Cyber Crime

As such, there have been numerous debates on the need enact internet censorship laws that would limit the Effects of Cybercrime in America.... he increasing financial loses and security threats that America experience because of cybercrime triggered my interest in this topic.... Children are also victims of cybercrime.... The article, “cybercrime costs $575 billion a year, $100 billion to US” by Tal Kopan prompted me to address the current issue, cybercrime....
1 Pages (250 words) Assignment

Is there Relationship between Video Games among Children and Violent Behavior

It elaborates on different social sectors and businesses that face the damaging Effects of Cybercrime.... It discusses violent video contents such as shooting to the behavior of boys who watch them on video games and also covers how cybercrime has raised issues.... Moreover, it highlights the weaknesses in the legislation be in place to mitigate cybercrime....
3 Pages (750 words) Assignment

Find two Peer-Viewed Articles

IJCC determination is to lay emphasis on all features of cyber/internet crime, Controlling Cyber space, Practices of Cyber Crime, the effect of Cybercrimes in the typical world, ,Cyber-terrorism, Cyber Victims, the existing global viewpoints of Cyber Crime, development of cyber safety strategies, invasion of investigations, Cyber offender conducts, security of information that is online among other aspects of cybercrime.... B: The question is in the two articles is the rise of cybercrime in the developed countriesReferenceshttp://www....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us