StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

New Technologies and the Emergence of Cyber Crime - Dissertation Example

Cite this document
Summary
The paper “New Technologies and the Emergence of Cyber Crime” discusses the effects of cybercrime on the citizens, businesses, government, and the relevant interventions to deal with it. Globally, computer-based commerce and communications cut across the territorial boundaries…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
New Technologies and the Emergence of Cyber Crime
Read Text Preview

Extract of sample "New Technologies and the Emergence of Cyber Crime"

 New Technologies and the Emergence of Cyber Crime Abstract Globally, computer based commerce and communications cut across the territorial boundaries, and create a new realm of human activities, undermining the legitimacy and feasibility of applying geographical boundary laws. The upcoming boundaries in the computer-based world are monitor screen, passwords, firewalls, intruder detection and virus busters. These have created new personalities, organizations, groups, and other new forms of economic, social, and political groupings in the virtual world of bits. In this paper, we will discuss the types of cyber crimes and the upcoming frauds that are done by them. Under the light of this crime, we will see the effects it has created on the economy of the United Kingdom. The paper discusses the effects of cyber crime on the citizens, businesses, government, and the relevant interventions to deal with it. Table of Contents Introduction 3 Literature Review 4 Evidence and Evaluation 8 Conclusion 14 References 18 Introduction Digital convergence and globalization in the rising knowledge society has increased the complex legal, ethical and societal issues. Now the society is facing difficult and complex questions related to the access of information, right to privacy, cultural diversity and intellectual property rights. For the gathering of information and knowledge, the instrument that is required by all human beings is ICT, and security in this regard should be guaranteed to them as their basic right. However, throughout the world the rights of humans are violated one way or the other. Violation of these rights have created new problems in the human social system like cyber crime, digital divide, digital security and privacy concerns for all of them. Round the globe, all of this has affected the lives of the people directly or indirectly (Sembok, 2003). The computer related crime such as fraud and forgery is increasing throughout the globe. Other than this, content related offences like child pornography and violation of intellectual property rights are also emerging rapidly on the scene. Moreover, threats to the critical infrastructure and national interests are rising by using internet for criminal and terrorist activities (Cevidalli, 2010). In the countries where internet is widely used, the harm for businesses, governments and individuals is gaining scope. However, in other countries the cyber crime threats are rising on the applications of communication and information technology for healthcare, trade, banking and government services. As a result, the users have started losing the confidence in online transactions and business (Sembok, 2003). Globally, computer based commerce and communications cut across the territorial boundaries, and create a new realm of human activities, undermining the legitimacy and feasibility of applying geographical boundary laws. The upcoming boundaries in the computer-based world are monitor screen, passwords, firewalls, intruder detection and virus busters. These have created new personalities, organizations, groups and other new forms of economic, social and political groupings in the virtual world of bits (Sembok, 2003). In this paper, we will discuss the types of cyber crimes and the upcoming frauds that are done by them. Under the light of this crime, we will see the effects it has created on the economy of the United Kingdom. The paper discusses the effects of cyber crimes on the citizens, businesses, government, and the relevant interventions to deal with it. Literature Review Information technology is influencing life all over the world. The developments in the computer skills have made the transition possible in information storage, dissemination and processing from atoms to bits. Because of this the new standards of efficiency, speed and accuracy in human activities is emerging. According to Sembok (2003), in order to support the human activities and bring various benefits for the society, all the sectors of life ranging from social, political, economic or personals nature depend heavily on ICT. However, the rapid development in ICT has led to the growth of new forms of transnational and national crimes. Virtually these crimes have no boundaries and can affect any country round the globe. Therefore, a rapid need of awareness, enactment of legislation and policy formation related to the cyber crime is necessary. In his study, Semnok (2003) discusses the challenges to the region that lie mostly because of the lack of awareness on the issues related to information security, the growth in the complexity of the systems, increased capacity, and reach of information and communication technology. The ambiguity of these technologies and the nature of the communication network is transnational. To meet these challenges few of the countries had appropriate legal and regulatory frameworks. Countries where awareness is growing and the legislation is adequate, the capacity to use, relate, detect and protect technologies related to information security is low. This shows that due to this, the reports of cyber crime represent only a small fraction of their incidence (Sembok, 2003). Investment in the cyber world In order to turn Britain into a digital world, the businesses and the government of the United Kingdom is investing heavily in the innovation programs that are related to software, creative industries, information security, and digital communications. In 2009, in order to make the United Kingdom a more prosperous and secure place for the businesses and the individuals, around £ 4 million was invested for the projects of ‘Trust Economics’; £ 5.5 million was invested in the projects related to ‘Ensuring Privacy and Consent’. To manage the complexity, risk and resilience in the projects of ‘Information Infrastructure Protection’, a total of £ 6 million worth of investment was made. In the creative industry, to develop the project of ‘Accessing and Commercialising content in a Digitally Networked world’, the government invested around £ 5 million (Technology Strategy Board, 2009). Despite these investments in the digital world, the government and the industry fail to protect themselves from the cyber crime. Therefore, every year frauds worth million pounds are conducted all over the kingdom which put the economy of the United Kingdom in a difficult position. If the same problem continues, it can become a major threat to the economy of the United Kingdom. What is Cyber Crime? The undertaken activities by the criminals for the financial gain are cyber crime. Such kinds of activities are used to exploit the vulnerabilities that are in use of the internet and other electronic systems. These systems illegally attack or access the information that is used by the business, citizen and government (Nelson, 2009). The range of cyber criminal is very large; they can be from foreign intelligence services and large organized crime groups, to disreputable companies, small groups and individuals. The type of cyber crimes that are highly affecting the United Kingdom are: the identity theft and online scams that are effecting the citizens, the IP theft, and industrial espionage at businesses, and the most important is the fiscal fraud that is committed against the government (Mohiuddin, 2006). Other forms of e-crime include website disruption, spam, harassment, drug trafficking, and cloning (Spamlaw, 2009). Traditionally, to capture the customer’s credit card details and other personal information, the entire web presence like a retailer is copied. In recent years, organisations can have their websites and other communications disrupted. In some cases, form of ‘protection racket’ has become commonplace, where criminal organizations threat to disrupt the target website by using methods like distributed denial of service attacks, unless the company pays them for not doing such things (Intellect, 2010). Why Measure the Cost of Cyber Crime? Across the world, there are around two billion internet users and almost five billion mobile phone connections. Everyday 296 billion emails and five billion messages are sent. If we see the statistics in the United Kingdom, we will see that more than 91 percent of their businesses and 73 percent of the United Kingdom households have internet access, which shows that the economy and the citizens of the state are using internet in high ratio. Moreover, in the United Kingdom over £ 47.2 billion was spent online in the year of 2009. This shows that our society is completely dependent on the information and communication technology. This technology is required for the domestic machinery for the government, economic health, for national defence and for day-to-day cultural and social existence. However, as the internet has significant benefits, it has also given birth to the new and more subtle ways for the crime. In the United Kingdom, the government has recognized cyber threats as one of the four ‘Tier One’ risks to the security of the Kingdom (Detica, 2011). Security in cyber space has to be driven by the industry that creates it. In 2007 (Technology Strategy Board, 2008), the International Information and Communication Technologies market was estimates to be worth $ 3.4 trillion. Only in the region of United Kingdom, ICT spent around $ 187 billion. It is also estimated that worldwide the software and computer services companies spend approximately £ 27 billion in research and development. Moreover, to gain an indication on the global spending on ICT, £ 7.8 billion is spent in fixed telecommunication, £ 27 billion in electric and electrical equipment, and £ 69 billion in technology hardware and equipment (BIS, 2010). Laws for Cyber Crimes By 2000, the United Kingdom was considered as one of those countries that had partially undated themselves against the cyber crime laws. By that time, the state had laws only against these cyber crimes: in data crime, only Data Modification was included, which involves alteration, modification, or erasing of any kind of data. For crimes related to networks, the penalised crimes were Network Interference, which is impending or preventing the access of others, through which the hacked computers only obey the commands of the perpetrator. Network Sabotage is another category in the network related crimes; it is the modification or destruction of a network or system. In the category of access crimes, Unauthorized Access was checked; it is related to the cracking or hacking to gain access to a data or system. In the category of related crimes, Aiding and Abetting cyber crimes were handled by the United Kingdom’s government; the person enabling the commission of cyber crimes was to be punished (McConnell International, 2000). On the other hand, crimes like data interception, computer- related forgery, and computer-related frauds were not tackled by them. However, the incident of 9/11 had forced all the developed countries to look into this matter more keenly. Thus, after that the development, the security of cyber crimes has increased rapidly. Evidence and Evaluation It is noted that the system protection tools, like hardware and software for defending information system, are expensive and complex to operate. Thus to avoid the expense and hassles the system operators or manufactures usually leave the security features “turned off” regardless of the increased vulnerability of the information on the system. Security holes and bugs that have known fixes are usually left uncorrected. In addition to this, there is no standard exit and no methodology for the organizations so that they can determine the necessary investment that is required ensuring the perfect security for the system. Thus, the incapability of the benefits and costs in the security investment leaves the managers at a disadvantage when competing for organizational resources. Therefore, a lot of work in form of concrete laws is required to improve the technical solutions and management for the protection of information (McConnell International, 2000). Cost of Cyber crime on the United Kingdom Economy Cyber crime has a considerable impact on the citizens, businesses, and the government. It is estimated that the per second cost of cyber crime to the United Kingdom is around £ 1000 (iClass, 2011) which makes it over £ 27 billion per year and it is likely to grow every day (Brewster, 2011). It is also reported that the significant portion of this cost comes from the theft of IP from the United Kingdom’s businesses. Per year the estimated price from this crime is £ 9.2 billion. Espionage is the crime that comes on the second number; the loss by it is around £ 7.5 billion. The cost by other crimes like extortion, fiscal fraud, online theft from business, identity theft, customer data loss, and online fraud lies between £ 1 billion to £ 2.2 billion independently (E-Cybercrime, 2009). UK CITIZENS: The cost of cyber crime to the United Kingdom citizen is around £ 3.1 billion per year (Raywood, 2011). The estimate includes the identity theft of £ 1.7 billion, £ 1.4 billion for online scams, and £ 30 million for fake anti-virus software and scareware (Detica, 2011). Through cyber crime citizens of the United Kingdom have suffered from identity theft and financial fraud. Identity theft is when a person lives under the name of another person, dead or living (Urrico, 2005). According to the report in 2006, there were around 92000 cases of identity fraud. In addition, around 40 percent of all the identity frauds were assisted online. In 2006, the top three stolen documents used by the fraudsters were passports, utility bills, and bank statements; with such key identity information the fraudsters can commit more sophisticated identity frauds (Fafinski, 2006). On the basis of the identify fraud where the transaction is carried out, it has taken up to 400 hours and with cost of up to £ 8000 for the victim (CIFAS, 2004). Identity fraud is based on three basic elements of identity: Biometric Identity fraud, it includes the heat radiation, and fingerprints etc. The next is attributed as identity theft, with characteristics such as stealing the full name, date, and place of birth etc. The last is Biographical Identity theft, in which the property ownership, marriage, electoral register entries are included (Cabinet Office Study, 2002). People who are liable for these frauds are individuals and entities like customers, building societies, fund managers, and insurance companies etc (FSA Report, 2004). Another type of fraud that the citizens face is financial fraud. It is closely linked to identity theft. This fraud is related to stealing the identity for financial gain. During 2006, there were a total of 207,000 cases of online financial fraud (McAfee, 2006). This figure is 32 percent more than the figure recorded in 2005. The other type of fraud under this category is card not present (CNP) fraud. In 2006, the percentage of this crime was 49whereas in 2005 it was 41. The total value of CNP rose by 16 percent that is from £ 183.2 million to £ 212.6 million (APACS, 2007). The proportion of CNP fraud taking place online has also been rising; in 2005 it was 65 percent where as in 2006 its value raised to 73 percent (APACS, 2007). In 2006, approximately £ 1.41 million of the people became the victim of card fraud and as a result, the average loss was £ 740 million (APACS, 2006). From 2005 to 2007, the recorded card fraud had fallen by 33 percent; this could be because the financial institutions had started acting as the gatekeepers to police reporting (Walker, Kershaw and Nicholas, 2006). According to the Fraud Act 2006, after the fraud the police contacts banks and the financial institutions. However, it is seen that the CNP fraud is becoming more attractive to the fraudsters since businesses cannot physically check the care and no guarantee is required if the information is provided by the legitimate cardholder. For this reason, the increased number of online purchasing is also at risk (Furnell, Papadopoulos and Dowland 2004). GOVERNMENT: According to the estimation the per year economic cost of the cyber crime to the government is £ 2.2 billion (Detica, 2011). This figure comprises of the total cost of tax and benefits fraud, NHS frauds, pension frauds, and local government and central government frauds. These crimes were reported under cyber crime, as all these transactions were committed online (Detica, 2011). BUSINESSES: According to the report by Detica (2011), the economic cost of cyber crime to the United Kingdom businesses is £ 21 billion. It is stated that per year, from IP theft the cost is £ 9.2 billion. This has the greatest economic impact from any other type of cyber crime. It is likely that they have larger impact on companies for those who have IP that is easy to exploit, or for those who create significant quantities of IP. Due to the IP theft, pharmaceuticals and biotechnological industries have suffered more than £ 1.8 billion per annum. On the next stand, electrical equipments come that suffer more than £ 1.7 billion. Industry of software and computer services has suffered more than £ 1.6 billion and the last most affected industry by the cyber crime is chemical industry which has suffered more than £ 1.3 billion. Other than these industries, there are several other industries like aerospace automobiles, oil and gas producers; however their per annum damage is less than £ 1 billion. The report also discusses that from industrial espionage the economy suffers around £ 7.6 billion. It also involves the exploitation and theft of non-IP related data. This affects the companies that are involved in the competition of open tendering and thus rely on large numbers of financial transactions. Due to espionage, financial services have suffered £ 2 billion. Aerospace and mining has suffered £1.2 billion and £ 1.6 billion respectively. Other services like computer software, support services, and technology hardware equipments also suffer but their damage amount is less than £ 1 billion. Through online theft the estimated per annum loss is £ 1.3 billion. Under this category the criminals target financial services, support services, and the material and construction industries. The loss recorded by the theft of customer data is around £ 1 billion. Due to such a high level of fraud in the online business, high rate in the rejection of orders is noticed. According to a survey in 2011, due to the suspicion of fraud, on the average 5 percent of the orders were cancelled. This figure is 4.6 percent higher from the last survey. The figure has remained relatively consistent in the last few years. It is also noted that around 60 percent of businesses have rejected 3 percent of their orders due to fraud concerns (Khan, 2011). Since the risk of internet crime is increasing considerably, therefore, precaution in this regard is better than cure. Consequently, it is better to safeguard the personal information when online transaction takes place. The more the person transmits the information through internet the risk of becoming the victim increases. Thus, few of the precautions at the personal level and some at the government level should be done (Editorial today, 2011). Interventions At international level, several cooperation frameworks help to combat the cyber crime. The Interior and Justice Ministers from the G8 nations, namely: France, Germany, the United Kingdom, Russia, Japan, Italy, Canada, and USA met to reach a common decision to combat high-tech crime, and recognize the extraordinary ways in which the new communication and computer technologies were getting weak in front of cyber crimes (Broadhust, 2002). All these countries had agreed on an action plan to combat the crimes. Few of the plans point included in the conference was to for the abuse of the information technologies. It was established that there was no safe place for them. In case of international high-tech crime, the investigation and prosecution was to be coordinated among all the concerned states, regardless of the point where the harm had occurred. Moreover, in such international scenarios mutual assistance regimes were to ensure the timely gathering and exchange of the evidence. Other than this, the forensic standards for authenticating and retrieving electronic data for using in the criminal prosecutions and investigations were to be employed and developed. According to this plan, all the states had agreed that in the work there should be coordination with other relevant international forums so that the plan could ensure against the duplications of efforts (G8, 2002). To reduce the loss from the cyber world, citizens can help themselves by ensuring that they are taking sensible precautions to stay at a safe side. These may include the installation of the firewall, regular updating of software applications, and the use of legitimate anti-virus software. To be protected against the impact of identity theft they should do the specialist insurance. However, no defences are fool proof and there might be some cases in which the most well prepared citizens can suffer a range of costs due to cyber crime (Detica, 2011). If such crimes continue, then there are chances that the economy of the United Kingdom faces aggregate effects. Moreover, some indirect macroeconomic effects can also be seen because of these virtual crimes; there is a possibility that the local public loses the confidence in general services like online banking and online buying. Due to the increase in the fiscal fraud done by the cyber criminals, the scale of efficiency saving can be limited. Thus, it will stop the government to move more of its activities online. Furthermore, cyber crime can affect tax revenues and minimize the confidence of the overseas investors in the United Kingdom. Likewise, it can affect the economic growth of the state. As more and more businesses are coming under the attack of the cyber criminals, many of the United Kingdom businesses are adopting stronger physical security like segregated networks, advanced intruder detection hardware, and they are providing training so that they can increase the employees’ awareness of cyber crime (Detica, 2011). Such steps are very crucial particularly for the IP-rich business sectors like pharmaceutical and biotechnology sectors that spend heavily in research and development. Relying on such steps can gain market advantage not only in local market but also in the international market. To tackle the cyber crime, more tactical efforts are required than strategic. The potential of reputation damage is slowing down the reporting of cyber crime. The problem exists due to the lack of a clear mechanism and the point of view that even if the crime is reported what can be done about it. Therefore, the companies from most affected business sectors should approach the government and build accurate assessment of IP theft and espionage. This will increase the awareness in the individual companies (Sisk, 2005). Other than this, the United Kingdom’s businesses should have sponsorship from the government so that the authoritative, interactive, and online services can be used to promote more widespread awareness in order for the businesses to adopt best practices against cyber crime (Skinner, 2011). As a result of such effective control on the cyber crimes by the law enforcement agencies, an occasional huge success by them is seen. In March 2010, convict hacker Albert Gonzalez was given 20 years sentence in the prison. He was accused for leading a gang of cyber thieves, which included a team of Russian hackers. Also, TJ Maxx and other retailers were reported to have stolen more than 90 million debit card and credit card numbers. Therefore, the government and the private companies should work effectively for controlling and arresting other such gangs (The Independent, 2010). Conclusion Cyber crime is a global problem that threatens all countries and economies. The United Kingdom economy has affected an estimated amount of £ 27 billion. The cyber criminals can be individuals, organised crime groups, or even nation states. For them since the barriers are low, therefore, it is highly profitable. The easy access and relative secrecy by the ICT lowers the risk of being caught. Thus it clears the way for the crimes to be conducted. As a result of the IP theft and espionage, cyber crime has influenced the United Kingdom’s business relatively more than any other department. However, the impact of the crime does not fall equally across the industry sectors. The businesses that are most seriously affected by the cyber crime were traditionally not likely to become the victim of cyber crime. Though, the government is keenly protecting the critical national infrastructure, IP- rich industries are particularly at risk (Marlin, 2005). In most of the studies related to cyber crime, only the cost that is lost because of the crime is included. However, the cost used to install the systems to prevent such crimes has not been included. If this cost is also catered for by the researchers, the possibility of rising the total sum is evident. On the government level, there is the formation of the Police Central e-Crime Unit. In the studies, the cost of maintenance and establishment of such units are not included. In crimes like the extortion of large companies, since most of such crimes remain unreported, the actual price for the incident can be much higher. Therefore, regular researches and surveys should be done by the think tanks and the academia for countering the cyber crime by more holistic approaches should be developed. The discussed statistics in this paper show that to make the information well protected, business of all the sectors should keep their defences high against the cyber crimes. Without the urgent measures to protect the intellectual property, it is likely that the cost of te cyber crime will rise further in the future as the industries increase their dependency on the ICT. If companies are encouraged in all sectors to make investments for the improvement in the security, the economic impact of cyber crime on the United Kingdom will reduce considerably. Recommendations: INFORMATION SHARING: It is believed that for the national security and economic imperatives, government and private sector should increase the awareness of new trends in the cyber security. In order to increase the awareness among the masses, potential sensitive data about the threats and incidents need to be shared. Such implications will allow the construction of a holistic experience of incidents and will allow the public and private organizations to comprehend the significance of e-crime and act accordingly. In the case of industries, with such relevant and productive information, they should not only protect themselves but also produce products that are more effective to remain strong barriers for the cyber crime. However, there is also an issue regarding the effectiveness of the sharing of information. The primary obstacle is commercial and security sensitivities. This makes it crucial for private sector and government to work together to find a way to share such information. This is because those who understand the problem and have authority to react often fail to get the desired information. Despite this fact, the information sharing is very necessary for the spread of awareness. COMMUNICATION: If the threat of cyber crime is broadly and extensively educated among the citizens, this is considered as the best strategy to promote awareness. Such an action will save the organizations and users without jeopardising confidence and without portraying challenges as impossible. For the better education of the people against this crime, it is required to communicate the importance of cyber security in a subtle and imaginative way. On the part of the government, it should engage itself with different parts of the private sectors so that they can come up with the best communication ideas. As the government and the private sectors make the communication more effective, the risks and threats related to cyber security decrease. However, since the government of the United Kingdom is gaining information from a number of sources, therefore educating all of them about the specific security measures is impractical and unaffordable. For this reason, models like Common Assurance Maturity Model (CAMM) should be introduced so that a common set of standards can be established that are affordable to implement and that increase the number of organizations offering secure services to their customers. STANDARDS: Regarding the security in the cyber world, across the United Kingdom different standards are seen. Since these protection standards play an important role in achieving quality and consistency across the government and industry, therefore for the protection against the e-crime, the state must follow an international framework of standards. This international criterion of standard will be beneficial for both government and the private sector to ensure their security on the cyber world. RESEARCH AND DEVELOPMENT: The co-ordination between the industry, government, and the academic research department can effectively help the government of the United Kingdom to fight against this security issue. When the industry is proposing new security ideas by the help of the government and other institutions’ funds, the academic research department can start a research programme in which they will do modelling and analysis of new technologies and services in the related field. Cyber crime has no limits; therefore it can be done from any part of the world. On the other hand, few of the countries have no legislation about such crimes or their criteria for the punishment differ. For this reason, in order to produce secure environment for e-commerce, globally fixed cyber crime legislation should be followed, so that across the border the criminals can be caught, and combating the cyber crimes becomes less complicated. From this threat the companies, government, and the people of the United Kingdom are also not safe, and thus the economy of the state is in jeopardy. However, the UK’s economy can boost by creating a digital infrastructure with strong reputation of security. Under this secure environment, the government, individuals, and business users can use a wide range of digitally enhanced services. Through this means, the businesses will attract the international investors and likewise the economy of the United Kingdom will expand and recover the poor economic conditions (Smith, 2002). References APACS (2006) ‘Fraud: The Facts 2006’ APACS (2007) ‘Fraud: The Facts 2007’ APACS (2007) ‘Press release: card fraud losses continue to fall’ BIS. (2010). The 2009 R&D Scoreboard, the top 1000 UK an 1000 Global companies by R&D investment. Brewster.T. (2011). Security experts question the astronomical figure attributed to the cost of cyber crime in the UK. Accessed on 4th April 2011 from http://www.itpro.co.uk/631189/does-cyber-crime-really-cost-27-billion-a-year Broadhurst, R. (2002). E-commerce & Cybercrime: issues, problems & prevention. Asia-Pacific Conference on Cybercrime and Information Security, Seoul, Republic of Korea, 11-13 November 2002. Cabinet Office Report (2002) "Identity Fraud: A study". Cabinet Office Report 2002. Cevidalli.A. (2010). A new approach to fighting varied types of Cybercrime Cases. Accessed on 4th April 2011 from http://searchsecurity.techtarget.co.uk/feature/A-new-approach-to-fighting-varied-types-of-cybercrime-cases CIFAS ,(2005) "How Serious is the Problem?" CIFAS Report. Accessed on 4th April 2011 from http://www.cifas.org.uk/identity_fraud_is_theft_serious.asp Detica, (2011). The Cost of Cyber Crime. Accessed on 3rd April 2011 from http://www.detica.com/uploads/press_releases/THE_COST_OF_CYBER_CRIME_SUMMARY_FINAL_14_February_2011.pdf E-cybercrime, (2009). Cyber Crime Costs UK 27 billion Every Year. Accessed on 4th April 2011 from http://www.ecybercrime.com/2011/02/govt-report-cyber-crime-costs-uk-27.html Editorialtoday, 2011. Types of Cyber Crime. Accessed on 4th April 2011 from http://www.streetdirectory.com/etoday/types-of-cyber-crime-eoffpf.html# Fafinski.S, (2006). UK Cybercrime Report. Accessed on 3rd April 2011 from https://www.garlik.com/press/Garlik_UK_Cybercrime_Report.pdf FSA (2004) ID - defusing the issue: a progress report. Financial Services Association, Financial Crime Sector Report October 2004. Furnell, S.M., Papadopoulos, I. and Dowland, P. (2004) "A long-term trial of alternative user authentication technologies" Information Management & Computer Security, Volume 12 Number 2 G8. (2002). Recommendations for Tracing Networked Communications Across National Borders in Terrorist and Criminal Investigations. G8 Justice and Interior Ministerial. USA. Accessed on 3rd April 2011 from http://www.coe.int/T/E/Legal_affairs/Legal_cooperation/Fight_against_terrorism/Texts_&_documents/ iClass, (2011).Cybercrime Costs Britain around £ 1000 per second. Accessed on 4th April 2011 from http://business.ezinemark.com/cybercrime-costs-britain-around-1-000-per-second-31ff54de1aa.html Intellect. (2010). Improving cyber Security Partnership. Accessed on 4th April 2011 from http://www.nexor.com/sites/default/files/Improving-Cyber-Security-Partnerships.pdf Khan.A. 2011. Seventh Annual UK Online Fraud 2011. Accessed on 4th April 2011 from http://www.e-crimebureau.com/data/uploads/cybersource-fraud-report-2011.pdf Marlin, S. (Nov 2005) "How Much Is Enough?" InformationWeek. Manhasset, Iss. 1063. McAfee (2006) ‘McAfee Virtual Criminology Report: Organised Crime and the Internet McConnell International, (2000). Cyber Crime . . . and Punishment? Archaic Laws Threaten Global Information. Accessed on 4th April 2011 from http://www.witsa.org/papers/McConnell-cybercrime.pdf Mohiudin.Z. (2006). Cyber Crime Laws in Pakistan. Accessed on 4th April 2011 from http://www.supremecourt.gov.pk/ijc/Articles/10/5.pdf Neslson.B. 2009. Cybercrime Defined. Accessed on 4th April 2011 from http://www.brighthub.com/internet/security-privacy/articles/3435.aspx Raywood.D. (2011). Cost of Cyber Crime in UK Estimated at £ 27 billion. Accessed on 4th April 2011 from http://www.scmagazineuk.com/cost-of-cyber-crime-in-uk-estimated-at-27-billion/article/196583/ Sembok.T.M. (2003). Ethics of Information Communication Technology (ICT). Accessed on 3rd April 2011 from http://www2.unescobkk.org/elib/publications/ethic_in_asia_pacific/239_325ETHICS.PDF Sisk, M. (Jan 2005) "A Phish Story" Bank Technology News. New York: Vol.18, Iss. 1. Skinner.C. 2011. Cyber crime to cost the UK Economy £ 1.9 bn. Accessed on 4th April 2011 from http://www.pcadvisor.co.uk/news/index.cfm?newsId=3261344 Smith. 2002. ID fraud over the Internet and the effects on financial institutions. Accessed on 4th April 2011 from http://www.ukdissertations.com/dissertations/business/idfraudovertheinternet.php Spamlaw. (2009). Types of Cybercrime. Accessed on 4th April 2011 from http://www.spamlaws.com/types-of-cyber-crime.html Technology Strategy Board. (2008). Information and Communication Technology, Key Technology Area 2008- 2011 Technology Strategy Board. (2009). Our Strategy for ‘Digital Britian’. Accessed on 4th April 2011 from http://www.innovateuk.org/_assets/pdf/TSB_DigitalBritainStrategy.pdf The Independent. 2010. Hacker’s high life brought to an end with 20-year sentence. Urrico, R. W. (Nov 2005) "Identity theft. Credit Union Magazine; 71, 11; ABI/INFORM Global Walker, A, Kershaw, C and Nicholas, S (2006) ‘Crime in England and Wales 2005/06’ Home Office Statistical Bulletin 12/06 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“New Technologies and the Emergence of Cyber Crime Dissertation”, n.d.)
Retrieved from https://studentshare.org/social-science/1413644-new-technologies-and-the-emergence-of-cyber-crime
(New Technologies and the Emergence of Cyber Crime Dissertation)
https://studentshare.org/social-science/1413644-new-technologies-and-the-emergence-of-cyber-crime.
“New Technologies and the Emergence of Cyber Crime Dissertation”, n.d. https://studentshare.org/social-science/1413644-new-technologies-and-the-emergence-of-cyber-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF New Technologies and the Emergence of Cyber Crime

Emergency Technologies

In other words, the integrity and independence of the case is not guaranteed if it involves cyber crime for untrained law enforcement officers.... On that prospect, a good example of a case where the computer was used to aid in the commission of crime was during the 9/11 attacks off the U.... Both police officers and forensic experts who picked fingerprint samples of the touched materials inside the memorabilia and matched them with those of the experts dusted the crime scene....
2 Pages (500 words) Essay

Cybercrime Threats in St. Louis County

Executive Summary of cyber crime Task Force Plan The cyber crime factor in St.... The criminal nature of cyber crime the county has posed a huge threat to its overall functioning.... The scope of cyber crime is wide and businesses are repeatedly faced by attacks, making them victims of various kinds of security threats.... The application of cyber crime prevention framework according to Rapaille (2007 is indicatively based on set of cultured codes that broadly classify the operational characteristics of the technological inference associated with web crime technologies....
9 Pages (2250 words) Research Paper

Crime In The Digital Sphere

the emergence of new forms of crimes such as those utilizing new technologies requires attention from the masses and from the authorities.... Thus, the study of the different forms and classifications of cyber crimes can be considered emergent in the present society.... new technologies can be equated as new ways and possibilities for the perpetration of crimes.... The paper "crime In The Digital Sphere" discusses how the unprecedented success in the application of the computer and the internet can attract both the legal and illegal application....
7 Pages (1750 words) Case Study

Homeland Security / Digital Crime and Digital Terrorism

Information technology has played a great role in the emergence of networked terrorist groups, such as al Qaeda and Jemmah Islamiyiah.... The development of internet has opened one more channel for terrorism; digital crime and digital terrorism.... Generally speaking digital crime or digital terrorism is the criminal or terrorist activities performed with the help of computers and internet.... This paper analyses topics such as Why Homeland Security is relevant in the context of digital crime and digital terrorism, How the issue of digital crime and digital terrorism have evolved or been altered over its lifespan?...
7 Pages (1750 words) Research Paper

Resolving Issues Related to Cybercrime

This paper has articulated various forms of cyber crimes and the countries in which the crimes have been undertaken.... Furthermore, law agencies have not formulated comprehensive mechanisms of addressing the issue of cyber crimes and the traditional type of policing that exists in many countries is incapable of apprehending the cybercriminals (Ionescu, Mirea and Blajan p.... The crime that started in the late 1990s as a form of social engineering whereby criminals would steal passwords for consumers' accounts with the intent of getting free connectivity has acquired significant growth and expansion into a profitable industry with the new forms of crime....
10 Pages (2500 words) Research Paper

The Cyber Threats in Saint Louis County

The digitalization of the world has led towards the emergence of the new and potential threat of cyber-war.... 1st century has been an era in which most of the criminals depend on progressive technologies and the Internet to undertake their criminal activities.... This provision must abandon the restrictive laws binding agencies involved in investigating cyber-crime so that they are able to carry out internet spying and are empowered to spy cybercrimes easily....
9 Pages (2250 words) Case Study

Digital Crime, Cybercrime

This paper presents an analysis and discussion of Burden and Palmer's perception of cyber crime.... Their perception shades more light on the implication of cyber crime to criminology.... Most common cyber crime activities include but not limited to the following, drug and arms trafficking, spying, money laundering scams and credit card theft or fraud.... In essence, policy makers lag behind cyber criminals in advancement mainly because of the relative low cost of committing a cyber crime....
8 Pages (2000 words) Essay

Clifford Stoll: Cyber Life and Achievements

Technology has transformed lives, but on the downside, it has led to the emergency of a new form of crime that involves some of the smartest people in the world.... This report "Clifford Stoll: cyber Life and Achievements" presents cybercrime that has a long history since the introduction of the Internet more than two decades ago.... This essay discusses Clifford Stoll's cyber life and his achievements that have been recorded in history.... Clifford made history as a cyber detective when he gave stark details of his adventures in catching the hacker Markus Hess (Walden, 2007)....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us