logo

Corruption Fueled Cybercrime Activities

   

Added on  2022-12-26

7 Pages1282 Words68 Views
 | 
 | 
 | 
Running Head: CORRUPTION FUELED CYBERCRIME ACTIVITIES 1
Corruption Fueled Cybercrime Activities
Name
Institution
Corruption Fueled Cybercrime Activities_1

Corruption Fueled Cybercrime Activities 2
Introduction
Cybercrime, financial crime, and corruption are all cyber enabled. Criminally acquired cash is
conveyed immediately globally via the cyberspace, there enabling corruption, fraudulent
activities, thus boosting terrorist’s groups. Organizational officials and legal enforcement
services are currently augmenting the systems. Increased improvised transactions is currently
under threats. Evolving tech for example the use of block chain, artificial intelligence, and big
data analytics are methods that help in contesting against fraud, corruption, and terrorist attacks.
The question lies to how effective or ineffective the systems may be in combating such threats
(Ashgate Gower, 2010). Moreover, whether global laws and regulations instituted can effective
be used in reducing such threats. Therefore, the major focus of the paper will be analyzing how
insiders support cybercrime activities and the level of anti-corruption in the prospected future.
Literature review
According to Britz (1009), increased corruption rates has led to challenges of cybercrime. This
trend was analyzed by forensics in the department of investigation of cyber related corruption
cases. Moreover, in his journal, there are specific issues such as that inhibits the reduction of
corruption rates in the world. This is supported by Dion (2011), as he says that corruption and
cybercrime can be reduced through depriving criminals access to assets and credentials.
Although, human factors positions great dangers. In the literature the author has stated that
human factors deteriorate the whole security system, as corruption in global financial sectors is
increasingly augmenting at a faster rate.
Corruption Fueled Cybercrime Activities_2

Corruption Fueled Cybercrime Activities 3
In reference to a report from the investigation and prevention of financial crime (2010),
international corruption, global openness, levels countries in the world thus finding out that the
rate of corruption is great. Therefore, corruption is utilized vastly in expediting cybercrime levels
in the world, as customary planned crime consortia is currently focusing the cyber security
interface therefore posing great risks of financial accounts. Graycar & Sidebottom (2012),
explain the legal act between the corruptee and the corrupter is always of mutual benefit.
Although, its seen that the real essence is that each individual always has a price, although not all
prices is said to be corrupt, reflecting to the advantages and the dangers against one’s family
inclusive other elements.
Consequently, in the present markets there is no improvised hacking techniques, although, the
corrupt insider is the one who assists the fraudulent acts despite having refined firewalls.
Actually, corruption fueled financial and cybercrime has led in inside staffs letting cyber-
criminal entry to vital organizational data. Therefore, this makes the inside staff effectively
circumvent the security arrangements in which most firms have employed. According to Ivanov
(2013), there is no necessity of enacting great and sophisticated hacking equipment as corruption
is always a silent offence, thus becoming very hard identifying.
Liu, G., & Liu, S. (2017), focuses in the ways and strategies that should be enacted in order to
counter effect cybercrime activities. Based on his recent research $7500 sums up the amount
taken from financial institutions with help from corrupted staffs in organizations. In the end
insider staffs cook financial statements so that the awful activity ends up unnoticed by the
company’s top executives. The authors states that the most probable solution to get rid of
Corruption Fueled Cybercrime Activities_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents