Premium Essay

Cyber Crime in Online Trading

In:

Submitted By asp3505
Words 537
Pages 3
Discuss cyber crime in online trading

Crimes are not to be measured by the issues of events , but by the bad intensions of man . This essay will discuss about cyber crime in online trading & how we can prevent it .

Ever wondered what crime you committed consciously and intentionally in online trade, illegal online activity committed using the internet. Crime is an unlawful practice which may lead to imprisonment by government authorities.
Online trade usually involve people from all around the world .

A fraudster may try to steal your money by typical scams like investment offers , bogus certificates from banks , property deals etc. criminals make such programs that deducts small amount of money like 3 pounds per month from the account of all the customers of the bank and deposit the same in his account . in this case no account holder will approach the bank for such a small amount , but the criminal gains huge amount. sometimes they even come up with online games like poker & lottery tickets , by which people often get fascinated & greedy and begin to take part in it . frauds like this often tell people to buy bitcoins which is the virtual money of internet . some games can even be played by using credit cards. According to the survey done by the government, there has been massive growth in cyber crime in past few years , because its one of the easiest way for criminals to steal money from people . they don’t even need any kind of weapons & no physical work , there are no signs of physical violence or struggle .there are more chances of getting away with the theft in cyber crime as compare to stealing in person . Nowadays the biggest issue for society are credit card stealing , phone taping , fake websites of banks & other online services .

Since , online shopping became more popular in society . everyone just wants to sit at home or at office and

Similar Documents

Free Essay

Is Cyber Crime a Serious and Growing Threat?

...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also gives...

Words: 2796 - Pages: 12

Premium Essay

Cyber Hacking Laws In The United States

...and compare the cyber hacking laws between the United States, Russian Federation, and the Peoples Republic of China Though, the fact that cyber security hacking is a widely used term, the law, punishment, rules and law are not fully developed yet. First, the cyber hacking laws in three countries are going to be reviewed. The cyber hacking laws of US is also known as “Computer Fraud and Abuse Act (CFAA) ” was released by the congress in 1986. In the documentation, it provides the laws to protect personal intellectual property on computer. Basically, it says that people should get punishment by accessing an authorized computer. Here, accessing means stealing code, command, and documents; damaging information from a...

Words: 1530 - Pages: 7

Premium Essay

Cyber Crime

...Abstract This paper explores articles that comprehensively cover the topic under consideration. The articles resourced from may vary in content depending on their authors, area of specialty, geographical location of the authors and the different times when the articles were written. A crime can be defined as engaging in a conduct that has been outlawed in a particular society. Dr. Debarati Halder and Dr. Jaishankar (2011) defines cybercrime as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to victim directly or indirectly using modern telecommunication networks such as internet (chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)”. In 1960s cyber crime involved sabotage and physical destruction of computers to cover up altered data, however in the modern day, cybercrime the computer is used as a tool. In Africa Nigeria is the most fraudulent country on cybercrime and the third in the word. In the United States of America alone cyber crime costs the economy losses worth $100billion dollars. If we are to roll out a similar survey then we could be talking of losses that run into trillions of dollars. These are losses that are incurred by businesses from all sectors: starting from the banking industry, manufacturing industry, the ICT sector transport and nearly all sectors both government and non government run organizations...

Words: 1377 - Pages: 6

Premium Essay

Online Child Exploitation

...and Preventing Online Child Exploitation Julie Swartzendruber Kaplan University Understanding and Preventing Online Child Exploitation Online child exploitation is a growing concern in the United States and abroad. Children of all age groups use the internet for socializing, school projects, entertainment, and music. The internet opens up a world of information but can unfortunately open up a world of danger for children who are particularly vulnerable to this risk. Sexual predators lurk in chat rooms and social networking sites searching for victims. After the first initial contact has been made they develop friendships by saying that they have common interests which they don’t. The internet allows the predator to anonymously hide their identity and the child thinks they are talking to someone around their own age. We need more solutions to stop child exploitation. Educating parents, children, and adults as well as legislation and policy change are one step, but more needs to be done. Strategies to combine education, training for those in the criminal justice field, resources from law enforcement, public health, and other private and public sector organizations to prevent this from happening are underway and also provide a solution to the problem. Even with the knowledge and up-to-date training, technology is always advancing making it harder for those in criminal justice to stop online child exploitation...

Words: 1694 - Pages: 7

Premium Essay

Advantages And Disadvantages Of Cybercommerce

...Nowadays, the statistics show that there is an increment in the number of cybercrime especially in this new era technology. Recently, this rises up hot issue about security threat in e-commerce. Cyber-attack usually happened on online business and organizations which threaten the security of data and operations in their trademark reputation as well as their intellectual property. These actions can cause significant damage or loss in e-commerce. Security is like a strong protective wall which blocks the bad guys and launching small, well-guarded doors to provide secure. So, this will prevent unauthorized organization to leak into or attack company system. E-commerce is an online transaction between buyers and sellers through the internet via devices such as computers or mobile phone. Nowadays, hacker can easily get valuable information from innocent victims. The most common security threat is stealing information of credit card and location details. Hackers can then exploit this information to rob the victims of huge amounts of cash. In orders to reduce such incidence, these are several precautionary solutions that formerly exist. For example, when a transaction is made with a credit card, banks will call up the card holder to inform and confirm the transaction that has been made by owners. 3.0...

Words: 793 - Pages: 4

Premium Essay

Cyber Scam

...CYBER SCAM AND ITS EFFECTS November 27, 2011 SUBMITTED BY: FETALVER, FRANCIS VIOLETA, ROGENE CRIS SUBMITTED TO: MRS. MARY GRACE P. ALFANTA I Introduction Background of the Study Experts and law-enforcement officials who track Internet crime say scams have intensified in the past six months, as fraudsters take advantage of economic confusion and anxiety to target both consumers and businesses. Thieves are sending out phony emails and putting up fake Web sites pretending to be banks, mortgage-service providers or even government agencies like the Federal Bureau of Investigation or the Federal Deposit Insurance Corp. Cell phones and Internet-based phone services have also been used to seek out victims. The object: to drain customer accounts of money or to gain information for identity theft. Most scams are done by e-mail (Spam). They entice users to give them critical information like usernames, passwords, credit card information, or other types of account information. Most of these e-mails can easily be identified as fraudulent, by identifying a couple of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most organizations...

Words: 2516 - Pages: 11

Premium Essay

Criminal Law and Cyber Crime

...* Chapter 10: Criminal Law and Cyber Crime * Section 1: Civil Law and Criminal Law * Crime- A wrong against society set forth in a statute and punishable by a fine and/or imprisonment—or in some cases, death * Key Differences Between Civil Law and Criminal Law * Burden of Proof * Civil Case * Plaintiff must prove his or her case by a preponderance of the evidence and must convince the court that based on the evidence presented by both parties; it is more likely than not that the plaintiff’s allegation is true. * Criminal Case * The state must prove its case beyond a reasonable doubt. The prosecutor must prove beyond a reasonable doubt that the defendant has committed every essential element of the offense with which she or he is charged * Criminal Sanctions * Much harsher than civil * Involve fines, imprisonment, probation, and sometimes the death penalty * Civil Liability for Criminal Acts * Some torts, such as assault and battery, provide a basis for a criminal prosecution as well as a civil action in tort, * Classification of Crimes * Felonies * Serious crimes punishable by death or by imprisonment for more than one year * Misdemeanors * Less serious crimes punishable by a fine or by confinement for up to a year * Petty...

Words: 2272 - Pages: 10

Free Essay

Mgmt 330 Mid Term Study Guide

...• Constitutional Speech (Personal and Corporate) * (personal); afforded highest protection by the Courts. Balance must be struck between a government’s obligation to protect its citizens versus a citizen’s right to speech. In other words, if government suppresses speech it must be to protect the citizens. EX. Don’t yell fire in a crowded area. See below. * If restriction is content neutral, restrictions must target some societal problem – not to primarily suppress the message. (Corporate); -Political speech by corporations is protected by the First Amendment. -In Citizens United v. Federal Election Commission (2010) the Supreme Court ruled that corporations can spend freely to support or oppose candidates for President and Congress. • Commercial Speech -Courts give substantial protection to commercial speech (advertising). -Restrictions must: Implement substantial government interest; directly advance that interest; and go no further than necessary. EX. Bad Frog Brewery, Inc. v. New York Liquor Authority= their logo of the frog flipping people off was denied so the company sued and won because their logo is only put in bars, alcohol sections in stores, etc. • Due Process (procedural and substantive); Fifth and Fourteenth Amendments provide “no person shall be deprived of life, liberty or property without due process of law.”; (Procedural) -Procedures depriving an individual of her rights must be fair and equitable. -Constitution requires...

Words: 953 - Pages: 4

Free Essay

Law Enforcement Challenges

...race when a crime is committed behind a keyboard. While this challenge can pretty much be crossed off of the list, there are many more that law enforcement agencies face when investigating computer crime. There are so many laws that apply to regions of enforcement and also to the rights of the suspected criminal. The even more difficult part is that while all parties are working together to achieve the same goal, there are so many grey areas in the chain of command and jurisdictional rules. Agencies investigation crimes such as corruption face a number of different challenges as well. In my eyes, if the crime can be solved, it should not matter where the officer is from. All members of law enforcement have the same goals and that is to keep the citizens of this nation safe by preventing crime. When prevention is not possible or fails, the teams investigating should not have to worry about whether they are allowed to be doing their job. They should simply work together and document evidence and witness material accordingly. Before we tackle the jurisdiction let us point out some of the other challenges that law enforcement faces with different types of computer crime. The long list of crimes that can be carried out via the computer creates an equal list of issues that the authorities have to deal with. There is so much that goes into a crime scene and the investigation process that we take for granted. First, let’s discuss the different types of crimes that cause corresponding...

Words: 1964 - Pages: 8

Premium Essay

Cybercrime

...Cybercrime Gabriela Peralta and James Walton CJA/204 April 5th, 2015 Robert Quesada Cybercrime The dark side of new technologies, as far as the justice system is concerned, is the potential they create for committing old crimes in new ways or for committing new crimes never before imagined; one of these ways is Cybercrime. Cybercrime is act of crime when using a computer and the Internet. Cybercrime, or computer crime, focuses on the information stored in electronic media, which is why it is sometimes referred to as information technology crime or info crime. This can be anything from downloading illegal music file to stealing money from online bank accounts. Cybercrime can also include non-monetary offenses, such as creating and distributing viruses on other computers or posting business information on the Internet that is meant to be confidential. There is no boundaries or jurisdictions when it comes to cybercrime ŞTEFAN, I. (2011). Below is three known cybercrimes though there are many more cybercrimes in the past and the future these are just a few. This cybercrime is considered being the biggest attack in US history. Five hackers hacked into companies like NASDAQ, Visa Inc., J.C. Penny Co, Jet blue airways Co, and Carrefour SA. They caused over 300 million to these companies. The hackers primarily wanted to steal and sale the 160 credit card numbers they stole from the companies. Authorities say each man had their own role, two hacked networks, another mined...

Words: 1242 - Pages: 5

Free Essay

Crime Investigation

...Journal For Technological Research In Engineering Volume 1, Issue 9, May-2014 ISSN (Online): 2347 - 4718 DATA MINING TECHNIQUES TO ANALYZE CRIME DATA R. G. Uthra, M. Tech (CS) Bharathidasan University, Trichy, India. Abstract: In data mining, Crime management is an interesting application where it plays an important role in handling of crime data. Crime investigation has very significant role of police system in any country. There had been an enormous increase in the crime in recent years. With rapid popularity of the internet, crime information maintained in web is becoming increasingly rampant. In this paper the data mining techniques are used to analyze the web data. This paper presents detailed study on classification and clustering. Classification is the process of classifying the crime type Clustering is the process of combining data object into groups. The construct of scenario is to extract the attributes and relations in the web page and reconstruct the scenario for crime mining. Key words: Crime data analysis, classification, clustering. I. INTRODUCTION Crime is one of the dangerous factors for any country. Crime analysis is the activity in which analysis is done on crime activities. Today criminals have maximum use of all modern technologies and hi-tech methods in committing crimes. The law enforcers have to effectively meet out challenges of crime control and maintenance of public order. One challenge to law enforcement and intelligence...

Words: 1699 - Pages: 7

Free Essay

Social Perspective on Violent Video Games

...Cybercrime Monica Locklear CJ105 Lance Spivey 2/24/2015 Miller-Motte College Online Computer crime better known as Cybercrime refers to any crime that involves a computer and a network. Cybercrime may happen anywhere on the internet such as the chat room, email, notice groups, and even mobile phones. Technology is becoming so advance and more common that there are so many people who will take a chance to commit crimes that involve technology. It is so hard for the police to crack these type of cases, luckily there are people fighting computer crimes and federal agencies take this type of offense very seriously. such cybercrimes can be writing or spreading computer viruses or worms, making and digitally distributing child pornography, identity theft where this is accomplished by use of fraudulent computer transactions, and Salami slicing is the practice of stealing money repeatedly in extremely small quantities, and in which these are only a few cybercrimes that are and can be violated. Computer crime is a felony violation of section 1030 of the United States Code. Back in 2012 the FBI made a bust on the largest cybercrime ring in history when more the 2 dozen people in the United States were arrested. Suspects allegedly stole credit card and banking data and they shared this information via internet. One of the biggest cybercrimes is spreading a virus on someones computer. The most common type of computer virus is the “Trojan”.These types of...

Words: 1125 - Pages: 5

Premium Essay

E-Commerce

...benefits and limitations of online transactions of products * To examine the online shopping sites prevalent in Coimbatore such as the mall.coimbatore which is an online shopping store and personal buying assistant in Coimbatore * To observe the future of the industry and recommend improvement ideas Need for selecting the ecommerce Industry India, one of the fastest growing economies presents a world of opportunities to entrepreneurs, investors, and researchers with an interest in the global economy. India’s e-Commerce industry is on the growth curve and experiencing a spurt in growth. With this increased interest comes a surge in demand for facts, trends and indicators. Highly concentrated urban areas with very high literacy rates, a vast rural population with fast increasing literacy rate, a rapidly growing internet user base, technology advancement and adoption and such other factors make India a dream destination for ecommerce players. E-commerce combines web technology with business economics. As of the last 10 years, online visibility for such online enterprises now heavily rely on the relationship between the own online sales platform and Search Engines for improved traffic consisting of presumable customers with the intent of acquiring products or services related to the customers’ needs. In 2008 an Internet behavioural analysis showed that over 90% percent of internet users make use of search engines at least once a week, stating that online visibility through the...

Words: 6470 - Pages: 26

Free Essay

Cyber Law

...Report On Cyber law LEGAL ASPECTS OF MANAGEMENT Submitted to: Mr. Maneesh Yadav Submitted by: Ankita Bhatnagar (JL12PGDM030) Introduction: Computers and their use is a day to day activity of all the students, professionals, teachers, Universities, banks, Supermarkets, in the entertainment field, in medical profession and also in higher education. The use of this Weapon is spreading very widely in all parts of our society. As every weapon has two ways of operation. One is good and essential and the other are bad and not essential. Many times, whenever a new weapon is invented, many people use it unknowingly for the wrong purpose. So to aware them and to make the proper use of the Power of the newly invented weapon, laws is to be formulated and should be implemented. This chapter introduces the cyber law and many terms involved in it. There are two basic definitions of cyber crime. (a) One definition says that ‘cyber crime’ consists of only those offences provided in the Information technology Act, 2000. As per this definition, cyber crimes would mainly be restricted to tampering with the computer source code, hacking and cyber pornography. Cyber fraud, defamation, harassment, e – mail abuse and IPR thefts, would not classify as cyber crimes. (b) In second definition, ‘cyber crime’ is said to be an act of commission or omission with the internet, committed on the internet or through the internet or with the help of the internet or connected with the internet, whether...

Words: 3963 - Pages: 16

Free Essay

Computer

...Journal of Leadership, Accountability and Ethics Computer Addiction and Cyber Crime Nick Nykodym The University of Toledo Sonny Ariss The University of Toledo Katarina Kurtz The University of Toledo This research explores the relationship between computer addiction and cyber crime. There is evidence of computer addiction in medical settings, scholarly journals and legal proceedings. Reviewing the history of computer addiction has shown that computer addiction can be related to cyber crime. This paper will define computer addiction, show how various cyber crimes, especially those against businesses and organizations, can be motivated by computer addiction and propose further research on how managers can deal with cyber crime in a business, by recognizing addictive behaviors and computer addiction in their employees. HISTORY OF COMPUTER ADDICTION Computer addiction is an idea that has been in existence for years. Since the 1970s, avid computer programmers and hackers have been called “addicts” by both psychologists and the general public (Reed, 2002, p. 135). In 1976, Weizenbaum wrote about computer programmers who could sit and work at their computer terminals for twenty or thirty hours at a time. This behavior however, was viewed at the time as useful to technology and society. Computers, once seen as huge government machines that only very knowledgeable people could use, transformed into user-friendly tools that could be used by the everyday person. It became more common...

Words: 3633 - Pages: 15