...Baggili & Rogers - Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 550–565 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity Ibrahim Baggili 1 Zayed University, United Arab Emirates (UAE) Marcus Rogers 2 Purdue University, West Lafayette, USA Abstract A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants...
Words: 6388 - Pages: 26
...International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security, Mobile I. INTRODUCTION Information and Communications Technology (ICT) is often used as an extended synonym for Information Technology (IT). ICT is a term that summarizes the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society. A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld...
Words: 6752 - Pages: 28
...RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way to make any crime easily. For committing...
Words: 1924 - Pages: 8
...International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes...
Words: 5129 - Pages: 21
...discussion of how the topic relates to Acquisition and Supply Chain Management. The paper must list and discuss a minimum of 10 scholarly references (other than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. | ABSTRACT This paper will discuss the impact of cyber crimes on organization supply chain functions, and steps taken to improve supply chain security. Cyber crimes include, but are not limited to, piracy, implanting viruses, netspionage, and credit card fraud. During these times, it is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at bigger risk is procurement. Majority of companies use other businesses outside their own, like manufacturers and distributors, as part of their purchasing process. All this information is stored in the company’s computer system, and “the need to procure materials…through a network…exposes an organization to network risk” (Smith, Watson, Baker, and Pokorski, 2007). This kind of risk can cause serious damage to the company’s assets, transactions, and reputation...
Words: 5220 - Pages: 21
...is depending on computers. I like the historical overview of the use of computers. I also like the explanation of the criminal abuse of computers as a new platform for different crimes. You talked about the different methods such as hacking and phishing to obtain data from the victims and that the victims can be anybody using a computer. I would have gone further to state that you do not have to be on the computer to become a victim. My husband’s bank card had been hacked into at a gas station a month ago…..the cyber criminal is all around us. You talked about law enforcement investigating cyber crime cases. I did not see the answer to the question how the victim can be protected? Your writing is clear and you obtained the information from reliable resources. I noticed several APA format problems and especially the resources in the reference page are not following APA rules. Please visit the NCU Academic Support Center and read about APA applications in the reference page and formatting. Cheers, Dr. Suboch Grade B Writing 85% 9/3/14 Internet Crime, Our Modern Day World Kathryn Jones North Central University Abstract This paper analyzes the various online crimes that seem to have merged its way into the lives of everyday people. With the internet being such a helpful tool, it has also been a complex tool allowing criminals to find their way into bank accounts, child pornography, employment schemes, and other illegal activities. Online crime is made up of a...
Words: 1127 - Pages: 5
...Your Name: Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search. Computer Crime Criminals have always tried to take advantage or exploit the advances in technology. It's extremely profitable to do so and rarely can get to prosecution if caught and if caught will be given the option to work with the intelligence agencies. Computer crime is prosecution is relatively new in this New Age, and the court system is catching up with how to handle computer crimes and that is why computer forensics is coming to the forefront of many criminal cases that has to do with the computer-related crime. A profitable computer crime is credit card fraud, and the criminals know that computer crimes rarely prosecuted because companies and corporations do not want to admit there may be faults in their security practices. One of the main reasons why the Payment Card Industry created the Payment Card Industry Data Security Standards is to secure cardholder data from Cyber criminals. Additionally, the computer can be used to enhance and protect criminals conducting crime worldwide “ a computer may have been utilized by a drugs trafficker to record details of shipments and corresponding payments and, although incidental to the offenses, the computer may therefore still have evident significant value” (Bell, 2002). Plus, computers can be used as low-key tools to commit offences...
Words: 477 - Pages: 2
...Statement of Problems These study intents to find out how aware are the SEA students regarding cybercrimes. It also aimed to answer the following questions: 1. What is the profile of each respondent regarding their awareness? 2. What influences them to such an act of crime? 3. How can they be protected from any forms of cybercrimes? 4. How can these cybercrimes be prevented? Significance of Study The researchers believes that students, particularly in the School of Engineering and Architecture will be benefited from the findings of this study since the study provides basis for awareness and better understanding regarding cybercrimes. Likewise, gives them a focused and clear perspective that such acts of crimes if they get involved have penalties and punishment s according to Republic Act 10175, an act defining cybercrime, providing for the prevention, investigation, suppression and the imposition of penalties therefore and for other purposes. Furthermore, this study helps them refrain from doing such crimes and hopefully they would not do it again if they have done it before. Lastly, we help them how to be protected from cybercrimes so that they would not be a victim of such crime. Scope and Limitations The scopes of this research are the education of students here in University of Baguio for all year levels. The limitations of this research are only those students who are currently enrolled in the University of Baguio at the School of Engineering and Architecture for...
Words: 1234 - Pages: 5
...The internet has changed how organizations conduct business. Within moments information exchange occurs and a profit is made. It has changed how crimes are investigated and solved by law enforcement agencies. Unfortunately, it has also changed how criminals conduct their crimes- through cyberspace. President Obama, Sony executives, Target organization and many of its’ customers have all been victims of some form of cyber crimes. This writer will provide a brief overview of the six types of cybercrimes and the economic loss as it affects America’s businesses. TYPES OF CYBER CRIME The growth and availability of technology has resulted in cyber attacks becoming a major concern for governments worldwide (Dzielinski, 2014). Small companies along with the larger corporations are now being targeted. A recent survey reported that more than one-third of small companies have been victims of some form of cyber attacks (Dzielinski, 2014). Approximately 75 percent of these companies were unable to recover their stolen data. The Central Intelligence Agency (CIA) has classified cyber crimes into six categories; fraud, computer trespassing, hardware hijacking, bullying-harassment-stalking, spam, and cyber warfare. Financial fraud is considered to be the most common of the six cyber attacks. The Target Corporation, the third largest U.S. retailer, and its customers were affected in 2013 (Target Corporation, 2013). Despite in place security measures, Target failed to detect...
Words: 1600 - Pages: 7
...Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators 2 I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against...
Words: 2467 - Pages: 10
...marketing activity. Most of e-commerce proceeds on the websites of publicly traded companies. A challenge that e-business face is that vulnerably experience e-crime, also known as cybercrime. As Internet technology continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Various types of Cyber crimes that can be encountered over the net are spam, fraud, cyber terrorism and so on. Whether for individuals, companies or governments, cybercrime has become a big problem. Spam is defined as unsolicited junk e-mail. It is used by chain mailers, forger and some others who selling dubious products. “The Federal Trade Commission (FTC) has identified 12 types of scams that are most likely to arrive in consumers’ e-mail boxes. The “dirty dozen” are: business opportunities, bulk e-mail, work at home schemes, health and diet scams, effortless income, free goods, investment opportunities, cable descrambler kits, guaranteed loans or credit on easy terms, credit repair, and vacation prize promotions”(Phommalinh). Meanwhile, the most common type of cybercrimes occurred in spam is virus which spread by e-mails. When one receive an e-mail with a virus, the default settings of your computer do not have any action required to resist virus. At that point, virus can follow instructions and does anything whatever the programmer wants it to do. The typical...
Words: 1173 - Pages: 5
...Cyber crimes and effectiveness of laws in India to control them Under the Supervision of Dr. P.K. Rai Birendra Singh (M.Phil(CS)) Department of Computer Science APSU Rewa ABSTRACT:- India owes a lot to the exponential growth of the Information Technology service Industry over the last 15 years. Though India got its first codified Act in the Information Technology Act (“IT Act), in the year 2000, the IT Industry and in fact all businesses with cross-border obligations have been left crying themselves hoarse for more! The Indian Legislature has now passed a mish –mash legislation in December 2008, which clearly demonstrates the appeasement policy adapted to meet the various and in some instances divergent interests of the Industry and the Government. The scope of this paper is to highlight some important provisions of the cyber criminal laws in India relating to data protection, privacy, encryption and other cyber crimes and the extent to which the said provisions arm the enforcement authorities to combat not just existing but emerging trends in Cyber Crime. INTRODUCTION:- The general laws in India were drafted and enacted in the 19th century. Whilst each of the general laws have undergone modifications and amendments, the broad and underlying provisions have withstood the test of time, including unimaginable advancements in technology, which speaks to the dynamism of the General laws. The general laws referred to in this Article are the Indian Penal Code, 1860 (“IPC”), which...
Words: 2370 - Pages: 10
...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...
Words: 14728 - Pages: 59
...Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum for England, Wales and Northern Ireland in 2000. As of September 2013, the term "ICT" in the UK National Curriculum has been replaced by the broader term "computing". The term ICT is now also used to refer to the convergence of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due...
Words: 6414 - Pages: 26
...beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of its size. Global governments need to continue working on creating workable laws that accurately describe the problem of cyberattacks and effectively enforce the solution. The modern world still has a long way to go before all security threats are addressed, appropriate defence is in place and all the critical computer infrastructure...
Words: 8586 - Pages: 35