Corruption Fueled Cybercrime Activities
VerifiedAdded on 2022/12/26
|7
|1282
|68
AI Summary
This paper analyzes how insiders support cybercrime activities and the level of anti-corruption in the prospected future. It explores the relationship between corruption and cybercrime, the role of human factors in deteriorating security systems, and the use of financial policies and cultural ethics to minimize corruption and cybercrime.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: CORRUPTION FUELED CYBERCRIME ACTIVITIES 1
Corruption Fueled Cybercrime Activities
Name
Institution
Corruption Fueled Cybercrime Activities
Name
Institution
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Corruption Fueled Cybercrime Activities 2
Introduction
Cybercrime, financial crime, and corruption are all cyber enabled. Criminally acquired cash is
conveyed immediately globally via the cyberspace, there enabling corruption, fraudulent
activities, thus boosting terrorist’s groups. Organizational officials and legal enforcement
services are currently augmenting the systems. Increased improvised transactions is currently
under threats. Evolving tech for example the use of block chain, artificial intelligence, and big
data analytics are methods that help in contesting against fraud, corruption, and terrorist attacks.
The question lies to how effective or ineffective the systems may be in combating such threats
(Ashgate Gower, 2010). Moreover, whether global laws and regulations instituted can effective
be used in reducing such threats. Therefore, the major focus of the paper will be analyzing how
insiders support cybercrime activities and the level of anti-corruption in the prospected future.
Literature review
According to Britz (1009), increased corruption rates has led to challenges of cybercrime. This
trend was analyzed by forensics in the department of investigation of cyber related corruption
cases. Moreover, in his journal, there are specific issues such as that inhibits the reduction of
corruption rates in the world. This is supported by Dion (2011), as he says that corruption and
cybercrime can be reduced through depriving criminals access to assets and credentials.
Although, human factors positions great dangers. In the literature the author has stated that
human factors deteriorate the whole security system, as corruption in global financial sectors is
increasingly augmenting at a faster rate.
Introduction
Cybercrime, financial crime, and corruption are all cyber enabled. Criminally acquired cash is
conveyed immediately globally via the cyberspace, there enabling corruption, fraudulent
activities, thus boosting terrorist’s groups. Organizational officials and legal enforcement
services are currently augmenting the systems. Increased improvised transactions is currently
under threats. Evolving tech for example the use of block chain, artificial intelligence, and big
data analytics are methods that help in contesting against fraud, corruption, and terrorist attacks.
The question lies to how effective or ineffective the systems may be in combating such threats
(Ashgate Gower, 2010). Moreover, whether global laws and regulations instituted can effective
be used in reducing such threats. Therefore, the major focus of the paper will be analyzing how
insiders support cybercrime activities and the level of anti-corruption in the prospected future.
Literature review
According to Britz (1009), increased corruption rates has led to challenges of cybercrime. This
trend was analyzed by forensics in the department of investigation of cyber related corruption
cases. Moreover, in his journal, there are specific issues such as that inhibits the reduction of
corruption rates in the world. This is supported by Dion (2011), as he says that corruption and
cybercrime can be reduced through depriving criminals access to assets and credentials.
Although, human factors positions great dangers. In the literature the author has stated that
human factors deteriorate the whole security system, as corruption in global financial sectors is
increasingly augmenting at a faster rate.
Corruption Fueled Cybercrime Activities 3
In reference to a report from the investigation and prevention of financial crime (2010),
international corruption, global openness, levels countries in the world thus finding out that the
rate of corruption is great. Therefore, corruption is utilized vastly in expediting cybercrime levels
in the world, as customary planned crime consortia is currently focusing the cyber security
interface therefore posing great risks of financial accounts. Graycar & Sidebottom (2012),
explain the legal act between the corruptee and the corrupter is always of mutual benefit.
Although, its seen that the real essence is that each individual always has a price, although not all
prices is said to be corrupt, reflecting to the advantages and the dangers against one’s family
inclusive other elements.
Consequently, in the present markets there is no improvised hacking techniques, although, the
corrupt insider is the one who assists the fraudulent acts despite having refined firewalls.
Actually, corruption fueled financial and cybercrime has led in inside staffs letting cyber-
criminal entry to vital organizational data. Therefore, this makes the inside staff effectively
circumvent the security arrangements in which most firms have employed. According to Ivanov
(2013), there is no necessity of enacting great and sophisticated hacking equipment as corruption
is always a silent offence, thus becoming very hard identifying.
Liu, G., & Liu, S. (2017), focuses in the ways and strategies that should be enacted in order to
counter effect cybercrime activities. Based on his recent research $7500 sums up the amount
taken from financial institutions with help from corrupted staffs in organizations. In the end
insider staffs cook financial statements so that the awful activity ends up unnoticed by the
company’s top executives. The authors states that the most probable solution to get rid of
In reference to a report from the investigation and prevention of financial crime (2010),
international corruption, global openness, levels countries in the world thus finding out that the
rate of corruption is great. Therefore, corruption is utilized vastly in expediting cybercrime levels
in the world, as customary planned crime consortia is currently focusing the cyber security
interface therefore posing great risks of financial accounts. Graycar & Sidebottom (2012),
explain the legal act between the corruptee and the corrupter is always of mutual benefit.
Although, its seen that the real essence is that each individual always has a price, although not all
prices is said to be corrupt, reflecting to the advantages and the dangers against one’s family
inclusive other elements.
Consequently, in the present markets there is no improvised hacking techniques, although, the
corrupt insider is the one who assists the fraudulent acts despite having refined firewalls.
Actually, corruption fueled financial and cybercrime has led in inside staffs letting cyber-
criminal entry to vital organizational data. Therefore, this makes the inside staff effectively
circumvent the security arrangements in which most firms have employed. According to Ivanov
(2013), there is no necessity of enacting great and sophisticated hacking equipment as corruption
is always a silent offence, thus becoming very hard identifying.
Liu, G., & Liu, S. (2017), focuses in the ways and strategies that should be enacted in order to
counter effect cybercrime activities. Based on his recent research $7500 sums up the amount
taken from financial institutions with help from corrupted staffs in organizations. In the end
insider staffs cook financial statements so that the awful activity ends up unnoticed by the
company’s top executives. The authors states that the most probable solution to get rid of
Corruption Fueled Cybercrime Activities 4
cybercrime related issues is taking control of the individuals take charge of the systems such as
the CEO’s. Such a precise entity may seemingly be employed in counter-effecting fraudulent
acts. Additionally, this is also a tools used in mass damage in the financial sector.
Nwele & Obasi (2016), outline a precise financial policy to being a tool of one’s choice in the
financial records, pointing out a formula used in counter-effecting fraud and its occurrence. The
technique was discovered in an accurate manner as its components can help in minimizing
corruption related cybercrime. Yeboah-Assiamah, Asamoah & Osei-kojo (2014), explain that
eliminating and recruiting staffs who don’t abide and the ones who adhere to the company’s
honor codes will be a brilliant technique that should be employed so that corruption can be
eliminated in organizations. The literature has highlighted specific areas that must be focused so
that corruption can be reduced. In that way cybercrime can be effectively reduced and
completely eliminated in financial organizations globally.
Conclusion
Conclusively, as stated in the above literature, cyber criminals will be able getting away 1wiith
their target within organizations through using social media networks and other accessible sites.
The sites are crucial as organizational employees post their profile information. For example, a
breach a company’s security system is where the manager is bribed about $4000 in order to set
up essential loggers so that government credentials can be stolen thus providing access critical
financial data. Therefore, organizations should aim at work and overlook the individuals who
work with them. Therefore, enable employer-employee relationship can effectively minimize
corruption fueled cybercrime activities. By doing such it will enable creating an environment
cybercrime related issues is taking control of the individuals take charge of the systems such as
the CEO’s. Such a precise entity may seemingly be employed in counter-effecting fraudulent
acts. Additionally, this is also a tools used in mass damage in the financial sector.
Nwele & Obasi (2016), outline a precise financial policy to being a tool of one’s choice in the
financial records, pointing out a formula used in counter-effecting fraud and its occurrence. The
technique was discovered in an accurate manner as its components can help in minimizing
corruption related cybercrime. Yeboah-Assiamah, Asamoah & Osei-kojo (2014), explain that
eliminating and recruiting staffs who don’t abide and the ones who adhere to the company’s
honor codes will be a brilliant technique that should be employed so that corruption can be
eliminated in organizations. The literature has highlighted specific areas that must be focused so
that corruption can be reduced. In that way cybercrime can be effectively reduced and
completely eliminated in financial organizations globally.
Conclusion
Conclusively, as stated in the above literature, cyber criminals will be able getting away 1wiith
their target within organizations through using social media networks and other accessible sites.
The sites are crucial as organizational employees post their profile information. For example, a
breach a company’s security system is where the manager is bribed about $4000 in order to set
up essential loggers so that government credentials can be stolen thus providing access critical
financial data. Therefore, organizations should aim at work and overlook the individuals who
work with them. Therefore, enable employer-employee relationship can effectively minimize
corruption fueled cybercrime activities. By doing such it will enable creating an environment
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Corruption Fueled Cybercrime Activities 5
where employees are interested in involving themselves in corrupt cases. Thus imparting rigid
cultural ethics within firms globally will be of use in vindicating corruption risks.
where employees are interested in involving themselves in corrupt cases. Thus imparting rigid
cultural ethics within firms globally will be of use in vindicating corruption risks.
Corruption Fueled Cybercrime Activities 6
Reference
Ashgate Gower. (2010). Investigation and Prevention of Financial Crime.
Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River, N.J.: Pearson
Prentice Hall.
Dion, M. (2011). Corruption, fraud and cybercrime as dehumanizing phenomena. International
Journal Of Social Economics, 38(5), 466-476. doi: 10.1108/03068291111123156
Graycar, A., & Sidebottom, A. (2012). Corruption and control: a corruption reduction approach.
Journal Of Financial Crime, 19(4), 384-399. doi: 10.1108/13590791211266377
IVANOV, A. (2013). ANTI-CORRUPTION POLICY AND LEGAL REGULATIONS FOR
COUNTERACTING CORRUPTION IN GEORGIA. Law And Modern States, 4. doi:
10.14420/en.2013.4.9
Liu, G., & Liu, S. (2017). Corruption crime and punishment: evidence from China’s state
corruption audits. Journal Of Financial Crime, 24(4), 601-619. doi: 10.1108/jfc-06-2016-
0044
Nwele, N., & Obasi, J. (2016). Impact of Law and Order in the Management of Corruption,
Fraud and Cybercrime for Economic Development: The study of two African Nations
(Nigeria and Malaysia). IOSR Journal Of Mathematics, 12(06), 01-06. doi:
10.9790/5728-1206020106
Reference
Ashgate Gower. (2010). Investigation and Prevention of Financial Crime.
Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River, N.J.: Pearson
Prentice Hall.
Dion, M. (2011). Corruption, fraud and cybercrime as dehumanizing phenomena. International
Journal Of Social Economics, 38(5), 466-476. doi: 10.1108/03068291111123156
Graycar, A., & Sidebottom, A. (2012). Corruption and control: a corruption reduction approach.
Journal Of Financial Crime, 19(4), 384-399. doi: 10.1108/13590791211266377
IVANOV, A. (2013). ANTI-CORRUPTION POLICY AND LEGAL REGULATIONS FOR
COUNTERACTING CORRUPTION IN GEORGIA. Law And Modern States, 4. doi:
10.14420/en.2013.4.9
Liu, G., & Liu, S. (2017). Corruption crime and punishment: evidence from China’s state
corruption audits. Journal Of Financial Crime, 24(4), 601-619. doi: 10.1108/jfc-06-2016-
0044
Nwele, N., & Obasi, J. (2016). Impact of Law and Order in the Management of Corruption,
Fraud and Cybercrime for Economic Development: The study of two African Nations
(Nigeria and Malaysia). IOSR Journal Of Mathematics, 12(06), 01-06. doi:
10.9790/5728-1206020106
Corruption Fueled Cybercrime Activities 7
Yeboah-Assiamah, E., Asamoah, K., & Osei-kojo, A. (2014). Corruption Here, Corruption
There, Corruption Everywhere: A Framework for Understanding and Addressing Public
Sector Corruption in Developing African Democracies. Journal Of Public Administration
And Governance, 4(3), 186. doi: 10.5296/jpag.v4i3.6406
Yeboah-Assiamah, E., Asamoah, K., & Osei-kojo, A. (2014). Corruption Here, Corruption
There, Corruption Everywhere: A Framework for Understanding and Addressing Public
Sector Corruption in Developing African Democracies. Journal Of Public Administration
And Governance, 4(3), 186. doi: 10.5296/jpag.v4i3.6406
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.