Impacts of Computer Crimes and Misuse on Users, Companies, and Society
Verified
Added on 2023/06/03
|13
|4227
|329
AI Summary
This report analyzes and discusses the impacts of computer crimes and misuse on the users, companies, and society. It includes a literature review, types of computer crimes, and their impacts on the economy and human behavior.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORK AND SECURITY 0 Network and security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORK AND SECURITY 1 Table of Contents Introduction...........................................................................................................................................2 Computer crimes and computer misuse................................................................................................2 Literature review...................................................................................................................................3 Impacts of computer crimes and computer misuse..............................................................................5 Types of computer crimes and computer misuse..................................................................................7 Crackers.............................................................................................................................................7 Hackers..............................................................................................................................................7 Pranksters..........................................................................................................................................7 Spam..................................................................................................................................................7 Fraud.................................................................................................................................................8 Denial of service attack......................................................................................................................8 Career criminals.................................................................................................................................8 Findings and results...............................................................................................................................8 Recommendation..................................................................................................................................9 Conclusion...........................................................................................................................................10 References...........................................................................................................................................11
NETWORK AND SECURITY 2 Introduction Computer crime is defined as the security threat, cyber-crime and hi-tech crime which are performed by the hackers to access the personal devices and accounts of consumers. Mainly, attacker’s uses the malicious software to detect the private details of users because it has potential to identify the login ID and password of computer devices and networks (Albanese, 2008)Computer misuse is defined as a security problem in which the third person access user’s personal accounts and misuse their computer system and networks. Many criminals enter into the computer devices and encrypt user personal information such as bank details, pictures, financial documents and many more. The objective of this report is to analysis and discusses the impacts of computer crimes and misuse on the users, companies, and society. In this report, a literature review will be conducted which evaluate the opinions of other experts and researcher and reduce the previous research gaps. The research question will focus on the impact of computer crimes and misuse on the companies, individuals and society. Computer crimes and computer misuse Computer crime is a part of cyber-crime in which hackers attack the computer devices and networks of individuals. It is one of the most common security issue faced by many organizations because criminals use the more complex algorithm and botnet process to enter into the computer system. Between 2014 and 2016 the rates of computer crime and misuse have increased by the 44% because every individual uses the internet connectivity in their computer devices which are associated with the cyber-attacks and data breaches (Bainbridge, 2007).It occurs when consumers and companies employees useunauthorizedserverstoaccesstheir personalaccountsbecauseunauthentic networks are developed by hackers to detect accounts details of users. Computer misuse happens when any individual uses the third party application or click on the unwanted links and many hackers send the traffic signals to the consumers to access their computer systems (Williams, 2008).In this modern era, the rate of cyber-crimes and computer misuse is growing rapidly and many largest business companies are facing this issue and they can lose their personal information due to such security issues.
NETWORK AND SECURITY 3 Literature review Today, computer crime is very common cyber threat in the field of computer science which is increasing due to the lack of security and use of unauthentic networks during the communication process. There are many researchers investigated on this topic and they observed that computer crimes impacts on the individual and companies due to which they can lose their personal data files and suffer from the financial issues. Most hackers attack the largest business industries and companies to earn more money because they block users and employees data and demand money from companies to restore their files. According toBiggs, and Vidalis, (2009)there are numerous kinds of cyber-threats and attacks occur in the computer system and it is very difficult to identify the key factors which increase the rate of computer crimes. To understand the concept of computer crimes and misuse the researcher conducted a survey and collected the views of other persons. This survey evaluated that more than 70% of individuals and employees use simple passwords and access personal Gmail accounts in the third party application that increase the issue of cyber-attacks and hacking. The computer crimes and misuse considered as the security threat and they have serious impacts on the society and organizations in the form of psychological disorder, economical disrupt and threat to national defense.Bryan Foltz, Schwager, and Anderson, (2008)provide the understanding of cyber-attacks and their impacts on the society and individuals and they identified that the problem of cyber-crimes can affect the performance of the computer networks and companies can lose their clients and consumers due to cyber-attacks. The Internet is the best platform to share and receive any information from others and many individuals and organization use this step to communicate with their friends and clients. But the problem of this step is that users connected their devices with the internet and hackers use the malicious process to identify their accounts details (Camp, 2009). D'Arcy and Hovav, (2009)defined computer crime as a cyber-crime which is completely related to the use of computer system particularly illegal trespass into the computer devices. The author also discussed that the lack of security is one of common problem which increases the percentage of the data breaches. In the the year 2016 attackers hacked thousands of computer devices with the help of malware and botnet process and they entered into the computer devices and blocked their files. In the year 2015, the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NETWORK AND SECURITY 4 rate of cyber-crime has increased by 24% and around 70% of individuals were suffered from the issue of data breach and hacking. Recent investigation evaluated that there are main four kinds of security attacks occur in the field of computer science such as viruses and worms, denial of service attack, malware attack, and phishing. In which malware and phishing both are very common cyber-attacks that faced by the many companies and business industries. According toD'Arcy, Hovav, and Galletta, (2009)hackers first generate the huge amount of unwanted links and traffic signals by using the malicious software after that they transfer these traffic on the computer networks of individuals or companies. These traffic signals jam the server or network of consumers and reduce the performance of their system which is the very common impact of computer crimes on the companies. At the end, hackers detect password of user’s peripheral devices and enter into their computer system to hack data files or information.Field, (2008)analyzed that hackers send the fraud mails to the consumers through Gmail and users click on spam mails by whichattackersconnecttheirserverstotheindividualserversandcollectthe passwords of the computer system. Most hackers use this step and it affects their servers and networks and they can lose the account details like pictures, videos and data files. Every year the problem of email phishing defrauds is increasing and amazon, eBay, Github, and Facebook all these are best examples of computer crimes. Recently the bank of Bahrain and Kuwait was targeted for phishing in which they lost their financial documents and data of 55 million individuals that reduced their values by 20% in the market. In which hackers sent the spam mail to the customers where users restricted data or information were explored and they lost their private files (Guo, 2013). The cyber-crimes those are processed can be defined as computer crimes and they have a serious impact on the society and individual in the form of economical disrupt and psychologicaldisorder.Itisobservedthattherestrictionofcomputercrimeis completely depended on their behaviors and security networks because hackers attack the communication networks and detect their IP address and location. According to Kerr, (2009)computer crimes are the illegal activities which can be penalized with the help of low and such kind of attack may impact badly on the society and individuals. In thispaper,theresearchercollectedtherelevantdatabyusingqualitativeand
NETWORK AND SECURITY 5 quantitativeresearchmethodwherequalitativemethodprovidesthetheoretical information about the research topic and quantitative approach provide the graphs and statistics and data of the previous investigation. The main key factor of computer crime isthatmanyuserslogintheiraccountsinotherpersoncomputersthatcreate uncertainty in the system and they do not update their computer software on regular basis due to which the rate of cyber-crimes and hacking also increases. In this advanced generation the most concern research field our impact of the computer crime on the consumers and the impact of computer crimes on the organization is very high rather than other because every company uses the internet and wireless technologies for communication that increase the number of computer crimes. Liao, et al., (2009) described the impact of cyber-crimes and computer misuse on the performance of the organization and evaluated that hackers, pranksters, spam, fraud, and harassment all these are types of computer crimes which occur in the area of information and communication technology. Today, users and employees may care about their personal data files and information because the problem of hacking is rising very fast and they want to protect data from hackers. Such kind of issue affects the various areas of the society, for example, bank, software, shops and business industries due to which individuals can suffer from the financial issue (Marcella Jr, and Menendez, 2007).The recent survey evaluated that the rate of negative impacts of computer crime is very high rather than other and hackers encrypt their account details and demand money to restore back. Impacts of computer crimes and computer misuse It is analyzed byNg, Kankanhalli, and Xu, (2009)that the computer crime and computer misuse both negatively impact the gross domestic product, gross national product, economic structure, and income levels of an organization. This is mainly caused by wasted time, loss of revenue, and decreased the productivity of the business and computer crimes also affects the money, jobs, and community. The recent survey evaluated that in the year 2016 around 45% of individuals affected by the fraud case over the internet and hackers collected the details of their credit and debit cards (Marion, 2010).Many government authorities and organization are suffering from the
NETWORK AND SECURITY 6 issue of cyber-crimes and because they have important databases of consumers and hackers detected passwords of their computers to access their networks. According to theMcGuire, and Dowling, (2013)business is one of the most important victims which improving the wave of computer crime because business industries are utilizing the information and communication technologies to increase numbers of clients but it has expended the risk of computer crime. Such kind of computer attacks and crimes can inhibit the business from performing its daily life activities which can cause the business it infects to lose a substantial part of money or cost in a short time. According to the recent research in the field of cyber-crimes over 70 million individuals in the US were victims of computer crimes in the year 2011 and such hackers act resultedinthe$30billionindirectfinanciallosses.Thefurtherinvestigation highlighted that around 68% of the consumers and adults that are online have been victims of computer crimes and misuse resulting in the 1 million computer crime victims in the day. A survey is conducted by the investigator and observed that most consumers think computer crimes and hacking are the fact of doing business and earn money online. It also impacts on human behavior and nature because hackers collect user’s data or information and demand money to restore them which can increase the amount of frustration. If any company suffer from the cyber-attacks and data breach issues then they can lose their values in the market and also decrease the consumers’ confidence. Majority of hackers and criminals are targeted on the consumer’s personal devices and computer systems which can affect the networks of their systems. Such kind of attacks and crimes are also affecting the economy of the country and many investigators identified how such crimes are growing rapidly. Due to computer crimes and data breach, there is the loss of billions of dollar annually and it is also producing big losses and organization level (Parker, 2007).The United State is leading in the field of cyber- crimes and computer misuse and criminals attack the largest business sectors like banking, social media, and e-commerce where they can earn more money. It is analyzed that an organization suffers from the financial losses due to computer crimes and misuse when an attacker steals confidential information and future plans of the organization. Most cyber criminals collect the bank details of consumers accounts and the data or information are stolen the user will not trust the organization again and will
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORK AND SECURITY 7 transfer to someone else that could secure their confidential information (Saini, Rao, and Panda, 2012). Types of computer crimes and computer misuse Therearevariouskindsofcomputercrimesoccurintheinformationand communication technology which are described below: Crackers These consumers are intent on causing loss to satisfy some antisocial motives or just for fun and they earn money by jamming the computer networks of the small business and companies (Siponen, and Vance, 2010).In such type numerous virus creators and generators involve and they first identify the types of networks and servers used by the users to enter into their system. Hackers Such kind of criminals explores the information or data of other computer devices for education, out of curiosity and for entertainment. In which hackers use the high level computer systems and software to identify the passwords of the user's peripheral devices and gain respect from fellow attackers (Taylor, 2012). Pranksters Such kind of consumers perpetrates tricks and techniques on another and they mainly do not intend any long lasting harm. Many criminals collect only a few information like name, bank details, address and profile pictures. Spam It is a very common computer crime that occurs when any user clicks on the fraud links and traffic signals. Hackers send the spam mails to the users and employees in order to conduct the commercial advantages which help them to hack their private details. In last two years, the rate of spam and phishing attack has increased by the 45% because every user receives the spam mails and rewards links which are produced by the cyber- criminal and they lost security or privacy of their systems.
NETWORK AND SECURITY 8 Fraud It is defined as a dishonest process to make someone to do a loss which could make a profit for you in any case and every company suffers from the issue of the fraud case. Denial of service attack It is one of the common computer crime in which hackers produce the huge quantity jamming or traffic signals by using botnet process. Hackers use such type of attack to reduce the security and performance of the consumer’s networks and they easily detect the password of their data link servers. Recent investigation evaluated that more than 60% of employees in a company use the third party applications and fraud links during data sharing and communication process which impact on their privacy and data files. Career criminals These people earn money from the crimes and hacking and they learn the hacking or cyber-crimes to detect the passwords of the user’s computer systems. Such kind of persons extend from the mentally ill do not necessarily engage in the crime as a full time occupation. There are many other cyber-crimes and security threats which are associated with the computers and internet such as malware attack, ransom ware attack, wanna cry and so on. All these crimes occur when users use the unauthorized serves and networks that negatively impact on the private information, pictures, videos, and bank details. It also affects the society and individual behaviors because every user wants to earn money from both illegal and legal method. In the society, most adults and children use smart phones and computer systems and when they listen about computer crimes and hacking then they increase their focus towards hacking. It can impact on parents and family member’s relationship with their children and recent survey observed that around 4 people in the group of 5 members use the internet and spam links that increase the percentage of computer crimes. Findings and results In the last three years there are many researcher developed research articles and provided their view on the computer crimes and computer misuse and they evaluated that the rate of cyber-crimes has expended by 22% in the year 2014. Between 2015 and
NETWORK AND SECURITY 9 2017 this rate has increased by 45% due to lack of security and many users were suffering from the data breach and computer crime (Willison, and Warkentin, 2013). Fromrecentresearch,itisfoundedthatmostusersdonotfollowtheproper configuration process during generation of computer networks that increase the rate of cyber-crimes. More than 67% of individuals are facing the issue of hacking and computer misuse because they use the unauthorized servers to link their personal accounts. In the United Kingdom, the problem of cyber-crime is very hugged because every child and adult use the internet connectivity and simple password which can be easily detected by the attackers. Moreover, the most organization developed and implemented the security plans and they identified that there are main three key factors that increase the problem of computer crimes such as fraud links, less security, and use of the unauthentic system. Recommendation It is recommended that the problem of computer crimes and computer misuses can be resolved by adopting the high level security tools like encryption, cryptography and robust technology. Encryption is one of the common security techniques which are used by the organizations to protect the communication servers from hackers. It provided a platform to convert the data or information into a code that cannot be hacked by attackers without user permission. It uses the private key to encrypt the signals and information of consumers and companies and reduced the computer crimes by 22% in the year 2017. People should update the software and networks on a regular basis because hackers can easily enter into the system with the help of old software or processor. Companies can adopt the biometric recognition and two step verification process to control and monitor the cyber-crimes or data breach. There are a few other steps which can be used during security plans and strategies which are the following: Use only secure networks and authentic servers Enable the antivirus and firewall software to detect the malware and traffic signals from the computer Block the spam and fraud mails from the accounts Use the robust technology to detect and identify the spam links from the computer system
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NETWORK AND SECURITY 10 Conclusion This report is completely based on the impact of computer crimes and computer misuses on the consumers, society and companies and readers can enhance their skills in the area of network and security. Computer crime and hacking both are a most common issue faced by the users and business industries and they impact on the performance and productivity of their business. This report described the concept of computer crimes and a literature review is conducted which increase the effectiveness of the research. With the help of this literature, review researcher achieved the objective and solution of the research equation. People should ensure that they use only authentic networks and use backup plans to protect more important files from hackers.
NETWORK AND SECURITY 11 References Albanese, J.S., (2008)Criminal justice. Pearson/Allyn and Bacon. Bainbridge, D., (2007) Criminal law tackles computer fraud and misuse.Computer Law & Security Review,23(3), pp.276-281. Biggs, S. and Vidalis, S., (2009) Cloud computing: The impact on digital forensic investigations. InInternet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for, 12(1), pp. 1-6. Bryan Foltz, C., Schwager, P.H. and Anderson, J.E., (2008) Why users (fail to) read computer usage policies.Industrial Management & Data Systems,108(6), pp.701-712. Camp, L.J., (2009) Mental models of privacy and security.IEEE Technology and society magazine,28(3), pp. 12-14. D’Arcy, J. and Hovav, A., (2009) Does one size fit all? Examining the differential effects of IS security countermeasures.Journal of business ethics,89(1), p.59. D'Arcy, J., Hovav, A. and Galletta, D., (2009) User awareness of security countermeasures and its impact on information systems misuse A deterrence approach.Information Systems Research,20(1), pp.79-98. Field, K.M., (2008) Agency, Code, or Contract: Determining Employees' Authorization Under the Computer Fraud and Abuse Act.Mich. L. Rev.,107(4), p.819. Guo,K.H.,(2013)Security-relatedbehaviorinusinginformationsystemsinthe workplace: A review and synthesis.Computers & Security,32(2), pp.242-251. Kerr, O.S., (2009) Vagueness Challenges to the Computer Fraud and Abuse Act.Minn. L. Rev.,94(2), p.1561. Liao, Q., Gurung, A., Luo, X. and Li, L., (2009) Workplace management and employee misuse: does punishment matter?.Journal of Computer Information Systems,50(2), pp.49-59.
NETWORK AND SECURITY 12 Marcella Jr, A., and Menendez, D., (2007)Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes. Auerbach Publications. Marion, N.E., (2010) The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation.International Journal of Cyber Criminology,4(1/2), p.699. McGuire, M. and Dowling, S., (2013) Cyber crime: A review of the evidence.Summary of key findings and implications. Home Office Research report,75, pp. 12-20. Ng, B.Y., Kankanhalli, A. and Xu, Y.C., (2009) Studying users' computer security behavior: A health belief perspective.Decision Support Systems,46(4), pp.815-825. Parker, D.B., (2007) The dark side of computing: SRI international and the study of computer crime.IEEE Annals of the History of Computing,29(1), pp. 12-18. Saini,H.,Rao,Y.S.andPanda,T.C.,(2012)Cyber-crimesandtheirimpacts:A review.International Journal of Engineering Research and Applications,2(2), pp.202- 209. Siponen, M. and Vance, A., (2010) Neutralization: new insights into the problem of employee information systems security policy violations.MIS quarterly, 10(2), pp.487- 502. Taylor, P., (2012)Hackers: Crime and the digital sublime. Routledge. Williams, K.S., (2008) Using Tittle's control balance theory to understand computer crime and deviance.International Review of Law, Computers & Technology,22(1-2), pp.145-155. Willison, R. and Warkentin, M., (2013) Beyond deterrence: An expanded view of employee computer abuse.MIS quarterly,37(1), pp. 12-22.