ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Corruption Fueled Cybercrime Activities

Verified

Added on  2022/12/26

|7
|1282
|68
AI Summary
This paper analyzes how insiders support cybercrime activities and the level of anti-corruption in the prospected future. It explores the relationship between corruption and cybercrime, the role of human factors in deteriorating security systems, and the use of financial policies and cultural ethics to minimize corruption and cybercrime.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: CORRUPTION FUELED CYBERCRIME ACTIVITIES 1
Corruption Fueled Cybercrime Activities
Name
Institution

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Corruption Fueled Cybercrime Activities 2
Introduction
Cybercrime, financial crime, and corruption are all cyber enabled. Criminally acquired cash is
conveyed immediately globally via the cyberspace, there enabling corruption, fraudulent
activities, thus boosting terrorist’s groups. Organizational officials and legal enforcement
services are currently augmenting the systems. Increased improvised transactions is currently
under threats. Evolving tech for example the use of block chain, artificial intelligence, and big
data analytics are methods that help in contesting against fraud, corruption, and terrorist attacks.
The question lies to how effective or ineffective the systems may be in combating such threats
(Ashgate Gower, 2010). Moreover, whether global laws and regulations instituted can effective
be used in reducing such threats. Therefore, the major focus of the paper will be analyzing how
insiders support cybercrime activities and the level of anti-corruption in the prospected future.
Literature review
According to Britz (1009), increased corruption rates has led to challenges of cybercrime. This
trend was analyzed by forensics in the department of investigation of cyber related corruption
cases. Moreover, in his journal, there are specific issues such as that inhibits the reduction of
corruption rates in the world. This is supported by Dion (2011), as he says that corruption and
cybercrime can be reduced through depriving criminals access to assets and credentials.
Although, human factors positions great dangers. In the literature the author has stated that
human factors deteriorate the whole security system, as corruption in global financial sectors is
increasingly augmenting at a faster rate.
Document Page
Corruption Fueled Cybercrime Activities 3
In reference to a report from the investigation and prevention of financial crime (2010),
international corruption, global openness, levels countries in the world thus finding out that the
rate of corruption is great. Therefore, corruption is utilized vastly in expediting cybercrime levels
in the world, as customary planned crime consortia is currently focusing the cyber security
interface therefore posing great risks of financial accounts. Graycar & Sidebottom (2012),
explain the legal act between the corruptee and the corrupter is always of mutual benefit.
Although, its seen that the real essence is that each individual always has a price, although not all
prices is said to be corrupt, reflecting to the advantages and the dangers against one’s family
inclusive other elements.
Consequently, in the present markets there is no improvised hacking techniques, although, the
corrupt insider is the one who assists the fraudulent acts despite having refined firewalls.
Actually, corruption fueled financial and cybercrime has led in inside staffs letting cyber-
criminal entry to vital organizational data. Therefore, this makes the inside staff effectively
circumvent the security arrangements in which most firms have employed. According to Ivanov
(2013), there is no necessity of enacting great and sophisticated hacking equipment as corruption
is always a silent offence, thus becoming very hard identifying.
Liu, G., & Liu, S. (2017), focuses in the ways and strategies that should be enacted in order to
counter effect cybercrime activities. Based on his recent research $7500 sums up the amount
taken from financial institutions with help from corrupted staffs in organizations. In the end
insider staffs cook financial statements so that the awful activity ends up unnoticed by the
company’s top executives. The authors states that the most probable solution to get rid of
Document Page
Corruption Fueled Cybercrime Activities 4
cybercrime related issues is taking control of the individuals take charge of the systems such as
the CEO’s. Such a precise entity may seemingly be employed in counter-effecting fraudulent
acts. Additionally, this is also a tools used in mass damage in the financial sector.
Nwele & Obasi (2016), outline a precise financial policy to being a tool of one’s choice in the
financial records, pointing out a formula used in counter-effecting fraud and its occurrence. The
technique was discovered in an accurate manner as its components can help in minimizing
corruption related cybercrime. Yeboah-Assiamah, Asamoah & Osei-kojo (2014), explain that
eliminating and recruiting staffs who don’t abide and the ones who adhere to the company’s
honor codes will be a brilliant technique that should be employed so that corruption can be
eliminated in organizations. The literature has highlighted specific areas that must be focused so
that corruption can be reduced. In that way cybercrime can be effectively reduced and
completely eliminated in financial organizations globally.
Conclusion
Conclusively, as stated in the above literature, cyber criminals will be able getting away 1wiith
their target within organizations through using social media networks and other accessible sites.
The sites are crucial as organizational employees post their profile information. For example, a
breach a company’s security system is where the manager is bribed about $4000 in order to set
up essential loggers so that government credentials can be stolen thus providing access critical
financial data. Therefore, organizations should aim at work and overlook the individuals who
work with them. Therefore, enable employer-employee relationship can effectively minimize
corruption fueled cybercrime activities. By doing such it will enable creating an environment

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Corruption Fueled Cybercrime Activities 5
where employees are interested in involving themselves in corrupt cases. Thus imparting rigid
cultural ethics within firms globally will be of use in vindicating corruption risks.
Document Page
Corruption Fueled Cybercrime Activities 6
Reference
Ashgate Gower. (2010). Investigation and Prevention of Financial Crime.
Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River, N.J.: Pearson
Prentice Hall.
Dion, M. (2011). Corruption, fraud and cybercrime as dehumanizing phenomena. International
Journal Of Social Economics, 38(5), 466-476. doi: 10.1108/03068291111123156
Graycar, A., & Sidebottom, A. (2012). Corruption and control: a corruption reduction approach.
Journal Of Financial Crime, 19(4), 384-399. doi: 10.1108/13590791211266377
IVANOV, A. (2013). ANTI-CORRUPTION POLICY AND LEGAL REGULATIONS FOR
COUNTERACTING CORRUPTION IN GEORGIA. Law And Modern States, 4. doi:
10.14420/en.2013.4.9
Liu, G., & Liu, S. (2017). Corruption crime and punishment: evidence from China’s state
corruption audits. Journal Of Financial Crime, 24(4), 601-619. doi: 10.1108/jfc-06-2016-
0044
Nwele, N., & Obasi, J. (2016). Impact of Law and Order in the Management of Corruption,
Fraud and Cybercrime for Economic Development: The study of two African Nations
(Nigeria and Malaysia). IOSR Journal Of Mathematics, 12(06), 01-06. doi:
10.9790/5728-1206020106
Document Page
Corruption Fueled Cybercrime Activities 7
Yeboah-Assiamah, E., Asamoah, K., & Osei-kojo, A. (2014). Corruption Here, Corruption
There, Corruption Everywhere: A Framework for Understanding and Addressing Public
Sector Corruption in Developing African Democracies. Journal Of Public Administration
And Governance, 4(3), 186. doi: 10.5296/jpag.v4i3.6406
1 out of 7
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]