Development and Impact of Cyber Crime in Australia
VerifiedAdded on 2023/04/22
|24
|5700
|394
AI Summary
This proposal aims to analyze the context of increasing cybercrimes in Australia and its impact. The research objectives include understanding the concept of cybercrime, identifying the reasons behind the increase in cybercrimes in Australia, analyzing the impact of increase in cybercrime in Australia, and recommending the mitigation strategies against the identified cybercrime.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PROPOSAL
Project Title: Development and Impact of Cyber Crime in Australia
Name of Student
Name of University
Author Note
Project Title: Development and Impact of Cyber Crime in Australia
Name of Student
Name of University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
PROPOSAL
Table of Contents
Chapter 1: Introduction........................................................................................................3
1.1. Background...............................................................................................................3
1.2. Research Aims and Objectives.................................................................................3
1.2.1. Aims of the study...............................................................................................3
1.2.2. Objectives of the study......................................................................................4
1.3. Research Questions...................................................................................................4
Chapter 2: Literature Review...............................................................................................5
2.1. Introduction...............................................................................................................5
2.2. Cybercrime: The Concept.........................................................................................5
2.2.1. Motivations for Cybercrime..............................................................................6
2.3. Cybercrime in Australia............................................................................................6
2.3.1. Current Approach to cyber security in Australia...............................................7
2.4. Reasons behind increase in cybercrime in Australia................................................7
2.5. Impact of Cybercrime in Australia...........................................................................8
2.6. Mitigation of the Risks associated with cybercrime...............................................11
Chapter 3: Research Scope................................................................................................12
Chapter 4: Research Method.............................................................................................12
4.1. Introduction.............................................................................................................12
PROPOSAL
Table of Contents
Chapter 1: Introduction........................................................................................................3
1.1. Background...............................................................................................................3
1.2. Research Aims and Objectives.................................................................................3
1.2.1. Aims of the study...............................................................................................3
1.2.2. Objectives of the study......................................................................................4
1.3. Research Questions...................................................................................................4
Chapter 2: Literature Review...............................................................................................5
2.1. Introduction...............................................................................................................5
2.2. Cybercrime: The Concept.........................................................................................5
2.2.1. Motivations for Cybercrime..............................................................................6
2.3. Cybercrime in Australia............................................................................................6
2.3.1. Current Approach to cyber security in Australia...............................................7
2.4. Reasons behind increase in cybercrime in Australia................................................7
2.5. Impact of Cybercrime in Australia...........................................................................8
2.6. Mitigation of the Risks associated with cybercrime...............................................11
Chapter 3: Research Scope................................................................................................12
Chapter 4: Research Method.............................................................................................12
4.1. Introduction.............................................................................................................12
2
PROPOSAL
4.2. Research Philosophy...............................................................................................13
4.3. Research Approach.................................................................................................13
4.4. Research Design.....................................................................................................14
4.5. Data Collection Method..........................................................................................14
4.6. Data Analysis Method............................................................................................16
4.7. Ethical Considerations associated with this research.............................................16
4.8. Evaluation of the Safety and Risks.........................................................................17
Chapter 5: Project Budget, Resources and Timeline.........................................................17
Chapter 6: Team Charter and Communication Strategy....................................................18
Chapter 7: Summary..........................................................................................................19
References..........................................................................................................................20
PROPOSAL
4.2. Research Philosophy...............................................................................................13
4.3. Research Approach.................................................................................................13
4.4. Research Design.....................................................................................................14
4.5. Data Collection Method..........................................................................................14
4.6. Data Analysis Method............................................................................................16
4.7. Ethical Considerations associated with this research.............................................16
4.8. Evaluation of the Safety and Risks.........................................................................17
Chapter 5: Project Budget, Resources and Timeline.........................................................17
Chapter 6: Team Charter and Communication Strategy....................................................18
Chapter 7: Summary..........................................................................................................19
References..........................................................................................................................20
3
PROPOSAL
Chapter 1: Introduction
1.1. Background
The research is based on one of the most significant issues in the age of technology. The
increase in the use of internet and its applications results in an exponential increase in
cybercrimes. Cybercrime can be described as a computer oriented crime. When computers are
used to commit an offence, the criminal act is termed as cybercrime. Data prove that over 6
million cybercrimes have been registered in Australia in the year 2017, and the number is
growing every year. Therefore, identification of the main causes behind cybercrime and its
impact is necessary so as to understand the risk mitigation approaches that can reduce the
negative impact of cybercrimes in Australia.
The Symantec’s Cyber Security report shows that over six million people have been a
victim of identity theft and credit card frauds in the year 2017. On an average, the rate of
increase in cybercrimes in Australia is near about 31 percent, which is an alarming rate.
Although 73 percent of the Australian has taken measures to make sure that they are safe online.
Despite that, there is an increase in number of cybercrimes every year in Australia. The research
has been undertaken in order to identify the impact of cybercrime in Australia.
1.2. Research Aims and Research Objectives
This section of the proposal report identifies aims and objectives of the research
undertaken. It is vital to identify the aims of the research and objectives of the research in order
to identify the possible roadmap of the research.
1.2.1. Aims of the study
PROPOSAL
Chapter 1: Introduction
1.1. Background
The research is based on one of the most significant issues in the age of technology. The
increase in the use of internet and its applications results in an exponential increase in
cybercrimes. Cybercrime can be described as a computer oriented crime. When computers are
used to commit an offence, the criminal act is termed as cybercrime. Data prove that over 6
million cybercrimes have been registered in Australia in the year 2017, and the number is
growing every year. Therefore, identification of the main causes behind cybercrime and its
impact is necessary so as to understand the risk mitigation approaches that can reduce the
negative impact of cybercrimes in Australia.
The Symantec’s Cyber Security report shows that over six million people have been a
victim of identity theft and credit card frauds in the year 2017. On an average, the rate of
increase in cybercrimes in Australia is near about 31 percent, which is an alarming rate.
Although 73 percent of the Australian has taken measures to make sure that they are safe online.
Despite that, there is an increase in number of cybercrimes every year in Australia. The research
has been undertaken in order to identify the impact of cybercrime in Australia.
1.2. Research Aims and Research Objectives
This section of the proposal report identifies aims and objectives of the research
undertaken. It is vital to identify the aims of the research and objectives of the research in order
to identify the possible roadmap of the research.
1.2.1. Aims of the study
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
PROPOSAL
The aim of the research is to analyse the context of increasing cybercrimes in Australia
and its impact. The reason behind the increase in use of cybercrimes in Australia is needed to be
identified so that the risk mitigation processes of the same can be identified.
1.2.2. Objectives of the study
The identified objectives are as follows-
To understand the concept of cybercrime
To identify the reasons behind the increase in cybercrimes in Australia
To analyse the impact of increase in cybercrime in Australia
To recommend the mitigation strategies against the identified cybercrime
The research will be evaluating all the above identified research objectives.
1.3. Research Questions
The research will be analysing a primary research question, which is as follows-
What is the impact of cybercrime in Australia?
In order to find answers for the above identified research questions, the following
secondary research questions will be evaluated.
What is the reason behind the increase in cybercrimes in Australia?
How are cybercrime conducted?
How can the cyber security risks be mitigated?
PROPOSAL
The aim of the research is to analyse the context of increasing cybercrimes in Australia
and its impact. The reason behind the increase in use of cybercrimes in Australia is needed to be
identified so that the risk mitigation processes of the same can be identified.
1.2.2. Objectives of the study
The identified objectives are as follows-
To understand the concept of cybercrime
To identify the reasons behind the increase in cybercrimes in Australia
To analyse the impact of increase in cybercrime in Australia
To recommend the mitigation strategies against the identified cybercrime
The research will be evaluating all the above identified research objectives.
1.3. Research Questions
The research will be analysing a primary research question, which is as follows-
What is the impact of cybercrime in Australia?
In order to find answers for the above identified research questions, the following
secondary research questions will be evaluated.
What is the reason behind the increase in cybercrimes in Australia?
How are cybercrime conducted?
How can the cyber security risks be mitigated?
5
PROPOSAL
Chapter 2: Literature Review
2.1. Introduction
The literature review chapter aims in conducting a secondary analysis of the research
topic and the research problem. A preliminary literature review has been conducted in order get a
basic understanding of the research topic and to collect data that can help in analysis of the
collected data. The literature review chapter is important for a research project as the previously
published literature in the chosen field is evaluated in order to obtain an idea of the identified
research topic. The literature review chapter will analyze the concepts of cybercrime its impact
in Australia.
2.2. Cybercrime: The Concept
According to Ajayi (2016), although cybercrime can be considered as a relatively new
phenomenon, it is able to occupy a global attention mainly because of its exponential increase
across the globe. The Cybercrimes are those act of misconduct or criminal offenses that are
perpetrated with a computer (Tamarkin 2015). These type of crimes are mainly committed
against the hardware of the computer and the materials contained within the computer. A typical
computer crime therefore can include financial frauds, embezzlement, scams and hacking.
Cybercrime as a whole is an umbrella term that encompasses two different types of
crimes, which include the cyber-dependent crimes and cyber-enabled crimes (Faqir, Sharari and
Salameh 2014). The cyber enabled crimes are those crimes that can only be conducted by
making use of a computer, its associated network and other forms of ICT (Feakin, Nevill and
Hawkins 2017). Example of cyber-dependent crime include, the spread of viruses, malicious
software and the distributed denial of service attacks (Ajayi 2016). The cyber enabled crimes on
PROPOSAL
Chapter 2: Literature Review
2.1. Introduction
The literature review chapter aims in conducting a secondary analysis of the research
topic and the research problem. A preliminary literature review has been conducted in order get a
basic understanding of the research topic and to collect data that can help in analysis of the
collected data. The literature review chapter is important for a research project as the previously
published literature in the chosen field is evaluated in order to obtain an idea of the identified
research topic. The literature review chapter will analyze the concepts of cybercrime its impact
in Australia.
2.2. Cybercrime: The Concept
According to Ajayi (2016), although cybercrime can be considered as a relatively new
phenomenon, it is able to occupy a global attention mainly because of its exponential increase
across the globe. The Cybercrimes are those act of misconduct or criminal offenses that are
perpetrated with a computer (Tamarkin 2015). These type of crimes are mainly committed
against the hardware of the computer and the materials contained within the computer. A typical
computer crime therefore can include financial frauds, embezzlement, scams and hacking.
Cybercrime as a whole is an umbrella term that encompasses two different types of
crimes, which include the cyber-dependent crimes and cyber-enabled crimes (Faqir, Sharari and
Salameh 2014). The cyber enabled crimes are those crimes that can only be conducted by
making use of a computer, its associated network and other forms of ICT (Feakin, Nevill and
Hawkins 2017). Example of cyber-dependent crime include, the spread of viruses, malicious
software and the distributed denial of service attacks (Ajayi 2016). The cyber enabled crimes on
6
PROPOSAL
the other hand are mainly directed towards the network of computer and includes e-commerce
frauds, sexual offending and theft of personal information.
The term “cybercrime” therefore involves the criminal offence that is facilitated by
electronic communication or related information systems associated with internet.
2.2.1. Motivations for Cybercrime
The main motive behind conducting a cybercrime is financial and the economic benefits
obtained by the cybercriminals. Therefore, the profit motive can be considered as one of the
major motives behind cybercrime (Harkin, Whelan and Chang 2018). Since the internet provides
wide freedom to all the individuals across the globe and therefore it is quite difficult to trace the
motive of certain individuals in making use of computers and its related resources (Kayode et al.
2014). Therefore, identification of the source of a crime becomes difficult leading to the increase
in cybercrimes.
2.3. Cybercrime in Australia
Cybercrime acts as an epidemic all throughout the world. The number of cybercrimes that
are registered in Australia is quite alarming (Barclay 2014). According to a cybersecurity insight
report, on an average, one out of three Australians have felt victim to the cybersecurity attack in
the year 2017. This number is higher in the following years.
According to Brookes (2015), cybercrime is one of the leading issues in Australia. The
number of cyber security issues are so huge in Australia that it becomes difficult for the
government of Australia to ensure cyber security capabilities to the businesses and population in
Australia. Therefore, it becomes essential to identify appropriate security measures to enhance
PROPOSAL
the other hand are mainly directed towards the network of computer and includes e-commerce
frauds, sexual offending and theft of personal information.
The term “cybercrime” therefore involves the criminal offence that is facilitated by
electronic communication or related information systems associated with internet.
2.2.1. Motivations for Cybercrime
The main motive behind conducting a cybercrime is financial and the economic benefits
obtained by the cybercriminals. Therefore, the profit motive can be considered as one of the
major motives behind cybercrime (Harkin, Whelan and Chang 2018). Since the internet provides
wide freedom to all the individuals across the globe and therefore it is quite difficult to trace the
motive of certain individuals in making use of computers and its related resources (Kayode et al.
2014). Therefore, identification of the source of a crime becomes difficult leading to the increase
in cybercrimes.
2.3. Cybercrime in Australia
Cybercrime acts as an epidemic all throughout the world. The number of cybercrimes that
are registered in Australia is quite alarming (Barclay 2014). According to a cybersecurity insight
report, on an average, one out of three Australians have felt victim to the cybersecurity attack in
the year 2017. This number is higher in the following years.
According to Brookes (2015), cybercrime is one of the leading issues in Australia. The
number of cyber security issues are so huge in Australia that it becomes difficult for the
government of Australia to ensure cyber security capabilities to the businesses and population in
Australia. Therefore, it becomes essential to identify appropriate security measures to enhance
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
PROPOSAL
the operational capabilities in reducing the cybersecurity risks and issues in Australia. There are
certain strategies that Australian government needs to acknowledge in order to mitigate the
issues and cybersecurity risks in Australia (Armin et al. 2015). It is necessary to propose an
integrated approach for the entire nation in Australia as the digital age is considered to be an
important aspect of national security and prosperity of Australia. Terrorism and espionage is
increasing at an alarming rate, contributing to the national security threat.
2.3.1. Current Approach to cyber security in Australia
Australian government’s cyber security policy aims in maintaining a secure and trusted e-
operating environment in the country so as to maximize the benefits obtained from digital
economy (Broadhurst 2017). The major ICT systems in Australia that stores and processes the
sensitive and the personal business information and data about the national infrastructure of
Australia are collectively owned by a number of businesses and individuals. Therefore, ensuring
security to these data and the information system becomes quite essential. The approach that is
taken by the Australian government is to educate the ICT system owners on the cybersecurity
and its related threats and vulnerabilities (Kanayamaa 2017). The operational capability of the
Australian government is needed to be enhanced in order to ensure that the cyber security issues
are reduced in Australia.
Apart from the context of Australian government, the risks that the individuals face while
making an ecommerce transaction are needed to be mitigated (Ng 2016). For that, the impact of
the cybercrime in Australia are needed to be identified.
2.4. Reasons behind increase in cybercrime in Australia
PROPOSAL
the operational capabilities in reducing the cybersecurity risks and issues in Australia. There are
certain strategies that Australian government needs to acknowledge in order to mitigate the
issues and cybersecurity risks in Australia (Armin et al. 2015). It is necessary to propose an
integrated approach for the entire nation in Australia as the digital age is considered to be an
important aspect of national security and prosperity of Australia. Terrorism and espionage is
increasing at an alarming rate, contributing to the national security threat.
2.3.1. Current Approach to cyber security in Australia
Australian government’s cyber security policy aims in maintaining a secure and trusted e-
operating environment in the country so as to maximize the benefits obtained from digital
economy (Broadhurst 2017). The major ICT systems in Australia that stores and processes the
sensitive and the personal business information and data about the national infrastructure of
Australia are collectively owned by a number of businesses and individuals. Therefore, ensuring
security to these data and the information system becomes quite essential. The approach that is
taken by the Australian government is to educate the ICT system owners on the cybersecurity
and its related threats and vulnerabilities (Kanayamaa 2017). The operational capability of the
Australian government is needed to be enhanced in order to ensure that the cyber security issues
are reduced in Australia.
Apart from the context of Australian government, the risks that the individuals face while
making an ecommerce transaction are needed to be mitigated (Ng 2016). For that, the impact of
the cybercrime in Australia are needed to be identified.
2.4. Reasons behind increase in cybercrime in Australia
8
PROPOSAL
One of the major reasons behind the increase in cybercrimes in Australia of course is
increase in dependence on internet (Kucera 2015). According to a recent report of the Insurance
Council of Australia, the cybercrime is estimated to cost near about $1 billion to the nation.
Researchers prove that the threats in cybercrime is not going to be disappear anytime soon.
The Australian are needed to be educated on the negative effects of cybercrime in
Australia and the process by which the Australians cab protect themselves from cyber threats
(Christie and Jacobs 2014). The individuals are needed to be educated about cybersecurity
measures that can help in reducing the cybersecurity risks.
On analyzing the reasons behind the increase in cybercrimes in Australia, it is found that
huge disposal of e-wastes is one of the concerning reasons behind the increase in cybercrimes in
Australia. The e-wastes are being used by the hackers as a medium of gathering confidential
information that is crucial for business (Daly 2015). Therefore, in order to reduce the issues
associated with cybercrimes in Australia, it is needed to ensure safe disposal of e-wastes so that
the hackers don’t get an access to the same (Amrin 2014). Furthermore, it is essential to establish
an appropriate process of secure handling of the transactions in order to deal with the issues
associated with cybercrime.
2.5. Impact of Cybercrime in Australia
According to Broadhurst (2017), the decentralized structure of internet provides a global
connectivity and communication facility to all the individuals across the globe. The
cybercriminals and cybercrimes are increased in such a huge rate mainly because it provides
anonymity, which is a characteristic that is critical to success of cybercrime (Persadha, Waskita
and Yazid 2015). In Australia, the effect of cyber warfare is severely disrupting as well. The
PROPOSAL
One of the major reasons behind the increase in cybercrimes in Australia of course is
increase in dependence on internet (Kucera 2015). According to a recent report of the Insurance
Council of Australia, the cybercrime is estimated to cost near about $1 billion to the nation.
Researchers prove that the threats in cybercrime is not going to be disappear anytime soon.
The Australian are needed to be educated on the negative effects of cybercrime in
Australia and the process by which the Australians cab protect themselves from cyber threats
(Christie and Jacobs 2014). The individuals are needed to be educated about cybersecurity
measures that can help in reducing the cybersecurity risks.
On analyzing the reasons behind the increase in cybercrimes in Australia, it is found that
huge disposal of e-wastes is one of the concerning reasons behind the increase in cybercrimes in
Australia. The e-wastes are being used by the hackers as a medium of gathering confidential
information that is crucial for business (Daly 2015). Therefore, in order to reduce the issues
associated with cybercrimes in Australia, it is needed to ensure safe disposal of e-wastes so that
the hackers don’t get an access to the same (Amrin 2014). Furthermore, it is essential to establish
an appropriate process of secure handling of the transactions in order to deal with the issues
associated with cybercrime.
2.5. Impact of Cybercrime in Australia
According to Broadhurst (2017), the decentralized structure of internet provides a global
connectivity and communication facility to all the individuals across the globe. The
cybercriminals and cybercrimes are increased in such a huge rate mainly because it provides
anonymity, which is a characteristic that is critical to success of cybercrime (Persadha, Waskita
and Yazid 2015). In Australia, the effect of cyber warfare is severely disrupting as well. The
9
PROPOSAL
cybercrime activities seem to overlap with the espionage that poses a threat to nation states and
corporation. In this context, the impact of cybercrime in Australia is needed to be analysed.
The common cybercrimes that is registered in Australia include online scams, hacking,
and fraud such as identity theft and attacks (Al-Alawi 2014). The cybercrime in Australia
therefore is a growing threat as the cybercriminals make use of computer and the resources to
steal the information and money thus disrupting the business.
The main impact of cybercrime is the financial loss and the loss personal information
such as information of the credit card and personal details of the individuals. The cyber threats
are associated with the illegal data collection that can be used against the individual leading to
financial loss (Viano 2017). Hacking of the data and identity theft that can prove to be quite
dangerous is one significant cybercrime that is prevalent in Australia. The cybercrimes in
Australia is growing at an alarming rate. The cybercrimes in Australia is a growing threat mainly
because of the sophistication of attacks that are being implemented.
Cybercrime has a large impact on global trade and commerce. It is quite evident that
exchange of goods and services are important in human life (Ajayi 2016). As the trading
activities is now mostly implemented in form of digital commerce, the risk of cybercrime
increases as well. The risk of hacking into the system can be quite crucial and is needed to be
addressed (Ajayi 2016). Therefore, cybercrime enforces a certain amount of risks in global
commerce associated with Australia and is therefore needed to be addressed.
Businesses and individuals can suffer a significant financial loss as a result of
cybercrime. Cybercriminals not only attacks the individuals but also can enforce an attack on the
high profile and valuable data (Phelps and Watt 2014). This type of attacks are mainly
PROPOSAL
cybercrime activities seem to overlap with the espionage that poses a threat to nation states and
corporation. In this context, the impact of cybercrime in Australia is needed to be analysed.
The common cybercrimes that is registered in Australia include online scams, hacking,
and fraud such as identity theft and attacks (Al-Alawi 2014). The cybercrime in Australia
therefore is a growing threat as the cybercriminals make use of computer and the resources to
steal the information and money thus disrupting the business.
The main impact of cybercrime is the financial loss and the loss personal information
such as information of the credit card and personal details of the individuals. The cyber threats
are associated with the illegal data collection that can be used against the individual leading to
financial loss (Viano 2017). Hacking of the data and identity theft that can prove to be quite
dangerous is one significant cybercrime that is prevalent in Australia. The cybercrimes in
Australia is growing at an alarming rate. The cybercrimes in Australia is a growing threat mainly
because of the sophistication of attacks that are being implemented.
Cybercrime has a large impact on global trade and commerce. It is quite evident that
exchange of goods and services are important in human life (Ajayi 2016). As the trading
activities is now mostly implemented in form of digital commerce, the risk of cybercrime
increases as well. The risk of hacking into the system can be quite crucial and is needed to be
addressed (Ajayi 2016). Therefore, cybercrime enforces a certain amount of risks in global
commerce associated with Australia and is therefore needed to be addressed.
Businesses and individuals can suffer a significant financial loss as a result of
cybercrime. Cybercriminals not only attacks the individuals but also can enforce an attack on the
high profile and valuable data (Phelps and Watt 2014). This type of attacks are mainly
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
PROPOSAL
opportunistic and the cybercrimes are mainly conducted by exploiting the vulnerabilities that can
be present in a system or a network. Therefore, it is needed to ensure appropriate protection of
the computer devices and protection of the network.
Cybercriminals attack the individuals by luring them into something which is not real.
This might include certain promotional offers or huge prize money (Armin, Thompson and
Kijewski 2016). These scams lures an individual in providing certain information to the hackers
involuntarily. This can result in huge financial loss.
The economic impact of cybercrime is quite significant as cybercrimes are mainly aimed
in financial gain (Broadhurst 2017). This is a serious problem that is persistence not only in
Australia but in different areas across the globe (Martellozzo and Jane 2017). It is essential to
identify the processes that can help in easier mitigation of the risks associated with cyber
security.
It is essential to identify the impact of the cybersecurity and the risks associated with the
cybersecurity in order to ensure that the financial losses associated with cybercrimes are
minimized (Brookes 2015). In this digital world, it is essential to protect the IT systems and
investments in order to deal with the economic impact associated with a cybercrime (Kader and
Minnaar 2015). In order to ensure appropriate protection against the cybercrimes, it is quite
essential to educate the individuals regarding the major issues in cybercrimes. It is quite integral
that financial information and IT risks associated with cybercrime are addressed. Complete
elimination of the cybercrime is not possible in a less span of time, however, the reduction of the
alarming rate of cybercrime in Australia can be possible by educating the citizens about safe use
of online resources.
PROPOSAL
opportunistic and the cybercrimes are mainly conducted by exploiting the vulnerabilities that can
be present in a system or a network. Therefore, it is needed to ensure appropriate protection of
the computer devices and protection of the network.
Cybercriminals attack the individuals by luring them into something which is not real.
This might include certain promotional offers or huge prize money (Armin, Thompson and
Kijewski 2016). These scams lures an individual in providing certain information to the hackers
involuntarily. This can result in huge financial loss.
The economic impact of cybercrime is quite significant as cybercrimes are mainly aimed
in financial gain (Broadhurst 2017). This is a serious problem that is persistence not only in
Australia but in different areas across the globe (Martellozzo and Jane 2017). It is essential to
identify the processes that can help in easier mitigation of the risks associated with cyber
security.
It is essential to identify the impact of the cybersecurity and the risks associated with the
cybersecurity in order to ensure that the financial losses associated with cybercrimes are
minimized (Brookes 2015). In this digital world, it is essential to protect the IT systems and
investments in order to deal with the economic impact associated with a cybercrime (Kader and
Minnaar 2015). In order to ensure appropriate protection against the cybercrimes, it is quite
essential to educate the individuals regarding the major issues in cybercrimes. It is quite integral
that financial information and IT risks associated with cybercrime are addressed. Complete
elimination of the cybercrime is not possible in a less span of time, however, the reduction of the
alarming rate of cybercrime in Australia can be possible by educating the citizens about safe use
of online resources.
11
PROPOSAL
2.6. Mitigation of the Risks associated with cybercrime
Cybercrime is a huge risk in Australia and therefore, identification of the appropriate risk
mitigation strategy is essential (Ajayi 2016). Recommendation of the major risk mitigation
strategies include taking appropriate measures in ensuring that any data associated with online
transaction is not hacked. Much attention is now paid in order to ensure that secure transactions
are executed in terms of ecommerce and related transactions (Asamoah-Okyere 2014). E-
commerce can be a tremendous boon for the business and can help and individual in improving
their ecommerce presence. It is therefore necessary to ensure that the data associated with the
ecommerce is securely transferred.
There are a number of strategies that can help in easier mitigation of the risks related to
ecommerce. The recommended strategies of mitigation of the risks in ecommerce are as follows-
1. From a business point of view, it is quite essential for the business organization to train
its staffs regarding the safe use of ecommerce and internet while dealing with an organizational
business.
2. From an individual’s perspective, maintaining the confidentiality of the information
that has been shared in an unsecure platform such an internet becomes essential. Use of
appropriate firewalls and antivirus is recommended so that the risks associated with an
ecommerce website can be mitigated (Tait 2015). It is quite essential for an individual to make
use of a secure website in case of payment processing so that the risks of the data loss can be
minimized.
3. Making use of fraud prevention tools are recommended in order to address the major
issues related to cybercrime. There are a number of fraud prevention tools that can be used in this
PROPOSAL
2.6. Mitigation of the Risks associated with cybercrime
Cybercrime is a huge risk in Australia and therefore, identification of the appropriate risk
mitigation strategy is essential (Ajayi 2016). Recommendation of the major risk mitigation
strategies include taking appropriate measures in ensuring that any data associated with online
transaction is not hacked. Much attention is now paid in order to ensure that secure transactions
are executed in terms of ecommerce and related transactions (Asamoah-Okyere 2014). E-
commerce can be a tremendous boon for the business and can help and individual in improving
their ecommerce presence. It is therefore necessary to ensure that the data associated with the
ecommerce is securely transferred.
There are a number of strategies that can help in easier mitigation of the risks related to
ecommerce. The recommended strategies of mitigation of the risks in ecommerce are as follows-
1. From a business point of view, it is quite essential for the business organization to train
its staffs regarding the safe use of ecommerce and internet while dealing with an organizational
business.
2. From an individual’s perspective, maintaining the confidentiality of the information
that has been shared in an unsecure platform such an internet becomes essential. Use of
appropriate firewalls and antivirus is recommended so that the risks associated with an
ecommerce website can be mitigated (Tait 2015). It is quite essential for an individual to make
use of a secure website in case of payment processing so that the risks of the data loss can be
minimized.
3. Making use of fraud prevention tools are recommended in order to address the major
issues related to cybercrime. There are a number of fraud prevention tools that can be used in this
12
PROPOSAL
context. Examples of fraud prevention tools include Address verification service, card security
code and others.
4. It is essential to protect the merchant account from intrusion. Making use of
appropriate intrusion detection system can help in easier identification of cybersecurity issues.
Therefore, it is essential for an individual to be educated about different cybercrimes and
the mitigation approaches of cybercrimes that an individual can face (Duah and Kwabena 2015).
It is essential to establish an effective process of dealing with the cybersecurity risks so that the
cyber security threats in Australia can be addressed.
Chapter 3: Research Scope
The research scope is to find appropriate mitigation strategies against the cyber risks in
Australia so that the number of cybercrimes can be reduced. The topic of the research is to
analyse the development and impact of cybercrime in Australia. Accordingly, research questions
and objectives are identified (Viano 2017). The research will be evaluating the major issues
related to cybercrime and the measures that should be taken by the individuals for reducing the
risks and the issues related with cybercrime. The major scope that are identified for this research
therefore include analysis of the impact of cybercrimes in Australia and the process by which
these risks can be mitigated.
Chapter 4: Research Method
4.1. Introduction
Research methodology chapter is essential to define the appropriate approach that is
needed to be adopted in attaining an appropriate results in a research. Research methodology
PROPOSAL
context. Examples of fraud prevention tools include Address verification service, card security
code and others.
4. It is essential to protect the merchant account from intrusion. Making use of
appropriate intrusion detection system can help in easier identification of cybersecurity issues.
Therefore, it is essential for an individual to be educated about different cybercrimes and
the mitigation approaches of cybercrimes that an individual can face (Duah and Kwabena 2015).
It is essential to establish an effective process of dealing with the cybersecurity risks so that the
cyber security threats in Australia can be addressed.
Chapter 3: Research Scope
The research scope is to find appropriate mitigation strategies against the cyber risks in
Australia so that the number of cybercrimes can be reduced. The topic of the research is to
analyse the development and impact of cybercrime in Australia. Accordingly, research questions
and objectives are identified (Viano 2017). The research will be evaluating the major issues
related to cybercrime and the measures that should be taken by the individuals for reducing the
risks and the issues related with cybercrime. The major scope that are identified for this research
therefore include analysis of the impact of cybercrimes in Australia and the process by which
these risks can be mitigated.
Chapter 4: Research Method
4.1. Introduction
Research methodology chapter is essential to define the appropriate approach that is
needed to be adopted in attaining an appropriate results in a research. Research methodology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
PROPOSAL
chapter therefore identifies the most distinguishing processes of a research that can help in better
analysis of the research problem. The research aims in identifying the impact of cybercrime in
Australia. Identification of appropriate tools and processes are therefore necessary for ensuring
that the research is being conducted in an appropriate manner (Bell, Bryman and Harley 2018). It
is quite important to analyze the research problem by selecting appropriate tools for the research.
This section of the research proposal will be identifying the major tools and the processes related
to this research. These include appropriate selection of the research design, research philosophy
and research approaches. This section of the research report will be analyzing the method of data
collection and analysis of data that can help the researcher in better analysis and identification of
the research problem.
4.2. Research Philosophy
Research philosophy is important as it helps in obtaining the details associated with a
particular research. The research philosophy helps in undertaking and conducting a research in
an appropriate manner. The philosophy of research that is chosen is positivism philosophy.
Positivism philosophy helps in better application of logic to the identified research problem
(Bryman 2016). The use of positivism research philosophy is proposed mainly because it helps
in easier identification of the logic and further helps in better analysis of the hidden facts.
Therefore, for analyzing the impact of increasing cases of cybercrimes in Australia, the use of
positivism research philosophy is proposed.
4.3. Research Approach
Identification of the research approach is required to conduct a research in a chosen
format. The two research approaches that should be considered include and deductive research
PROPOSAL
chapter therefore identifies the most distinguishing processes of a research that can help in better
analysis of the research problem. The research aims in identifying the impact of cybercrime in
Australia. Identification of appropriate tools and processes are therefore necessary for ensuring
that the research is being conducted in an appropriate manner (Bell, Bryman and Harley 2018). It
is quite important to analyze the research problem by selecting appropriate tools for the research.
This section of the research proposal will be identifying the major tools and the processes related
to this research. These include appropriate selection of the research design, research philosophy
and research approaches. This section of the research report will be analyzing the method of data
collection and analysis of data that can help the researcher in better analysis and identification of
the research problem.
4.2. Research Philosophy
Research philosophy is important as it helps in obtaining the details associated with a
particular research. The research philosophy helps in undertaking and conducting a research in
an appropriate manner. The philosophy of research that is chosen is positivism philosophy.
Positivism philosophy helps in better application of logic to the identified research problem
(Bryman 2016). The use of positivism research philosophy is proposed mainly because it helps
in easier identification of the logic and further helps in better analysis of the hidden facts.
Therefore, for analyzing the impact of increasing cases of cybercrimes in Australia, the use of
positivism research philosophy is proposed.
4.3. Research Approach
Identification of the research approach is required to conduct a research in a chosen
format. The two research approaches that should be considered include and deductive research
14
PROPOSAL
approach. The approach that is proposed, is deductive approach. This research approach is
justified for the research project has it applies various theories associated with the research topic.
The inductive research approach is not chosen for this research as the research study deals with
analysis of the impact of cybercrimes in Australia. The use of deductive approach will help in
better understanding of the research topic by evaluating the research problems in a more detailed
manner in comparison to the inductive research approach.
4.4. Research Design
The research design is needed to explain the framework associated with a research. The
research design helps in better analysis of the data collection processes and analysis of the
different patterns associated with the research. There are three types of design which includes
exploratory research design, explanatory research design and descriptive research design. Use of
a descriptive research design is proposed for this research as it will help in better analysis of the
impact of cybercrime in Australia.
4.5. Data Collection Method
A research study is associated with the acquiring of data. The collected data is required to
be analyzed in order to find specific answers to the research questions identified. Data collection
is one of the most significant aspect of this research as the data regarding the impact of
cybercrime in Australia is needed to be collected from primary sources (McCusker and
Gunaydin 2015). There are mainly two types of data collection processes, which include
collection of data from primary sources and collection of secondary data.
The primary data collection enables a researcher to collect data from the sources or
individuals who have a direct experience or firsthand knowledge about the research problem.
PROPOSAL
approach. The approach that is proposed, is deductive approach. This research approach is
justified for the research project has it applies various theories associated with the research topic.
The inductive research approach is not chosen for this research as the research study deals with
analysis of the impact of cybercrimes in Australia. The use of deductive approach will help in
better understanding of the research topic by evaluating the research problems in a more detailed
manner in comparison to the inductive research approach.
4.4. Research Design
The research design is needed to explain the framework associated with a research. The
research design helps in better analysis of the data collection processes and analysis of the
different patterns associated with the research. There are three types of design which includes
exploratory research design, explanatory research design and descriptive research design. Use of
a descriptive research design is proposed for this research as it will help in better analysis of the
impact of cybercrime in Australia.
4.5. Data Collection Method
A research study is associated with the acquiring of data. The collected data is required to
be analyzed in order to find specific answers to the research questions identified. Data collection
is one of the most significant aspect of this research as the data regarding the impact of
cybercrime in Australia is needed to be collected from primary sources (McCusker and
Gunaydin 2015). There are mainly two types of data collection processes, which include
collection of data from primary sources and collection of secondary data.
The primary data collection enables a researcher to collect data from the sources or
individuals who have a direct experience or firsthand knowledge about the research problem.
15
PROPOSAL
The primary data is mainly gathered to a number of approaches which includes interviews and
observations. Interview is one of the valid sources of collection of data from primary resources.
Apart from that, the primary data can be collected with the help of surveys. A certain number of
open and close ended questions can be circulated to the individuals for collection of the data
associated with the research
Another method of data collection is secondary data collection method. The secondary
data collection incorporates data collection from secondary sources which includes, books,
research journal and previously published literature in this field. Secondary data collection
method is found to be favorable for the researchers mainly because a large amount of data can be
collected from the secondary data sources. One of the most significant advantages of making use
of secondary data collection methodology in a research is that, credibility and the reliability of
the collected data can be maintained. The data collected from the secondary sources cannot be
termed an unreliable which is another major advantage of making use of secondary data sources.
The data collection method that is proposed for this research is primary data collection
method. For collection of primary data, an online survey will be conducted with 50 research
respondents. A random probability sampling will be chosen as a sampling method which will
help in indicating the research participants. Prior to that the permission of the research
participants will be taken in order to ascertain that the project has been conducted ethically.
4.6. Data Analysis Method
There are two types of data analysis methods that are common for better analysis of the
collected data and information. This include qualitative data analysis and quantitative data
analysis.
PROPOSAL
The primary data is mainly gathered to a number of approaches which includes interviews and
observations. Interview is one of the valid sources of collection of data from primary resources.
Apart from that, the primary data can be collected with the help of surveys. A certain number of
open and close ended questions can be circulated to the individuals for collection of the data
associated with the research
Another method of data collection is secondary data collection method. The secondary
data collection incorporates data collection from secondary sources which includes, books,
research journal and previously published literature in this field. Secondary data collection
method is found to be favorable for the researchers mainly because a large amount of data can be
collected from the secondary data sources. One of the most significant advantages of making use
of secondary data collection methodology in a research is that, credibility and the reliability of
the collected data can be maintained. The data collected from the secondary sources cannot be
termed an unreliable which is another major advantage of making use of secondary data sources.
The data collection method that is proposed for this research is primary data collection
method. For collection of primary data, an online survey will be conducted with 50 research
respondents. A random probability sampling will be chosen as a sampling method which will
help in indicating the research participants. Prior to that the permission of the research
participants will be taken in order to ascertain that the project has been conducted ethically.
4.6. Data Analysis Method
There are two types of data analysis methods that are common for better analysis of the
collected data and information. This include qualitative data analysis and quantitative data
analysis.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
PROPOSAL
The qualitative data analysis method does not involve any mathematical or statistical
calculation is collection and analysis of the research data that is collection (Brannen 2017). The
qualitative data analysis method make use of a number of theories and concepts in better analysis
of the research topic.
The quantitative data analysis is associated with the statistical analysis of the collected
data. Excel spreadsheet and SPSS are two effective tools for analysis of data. The quantitative
analysis therefore helps in analyzing the data in a more accurate manner.
The data analysis process that is chosen for the project include that quantitative data
analysis technique. The quantitative data analysis is appropriate for this topic as it will help in
finding answers to the identified research questions in a most accurate manner. The use of excel
is recommended as one of the effective techniques of data analysis.
4.7. Ethical Considerations associated with this research
The major ethical considerations of this research are discussed below-
1. It is essential to respect privacy of the all the participants of a research.
2. It is the responsibility of the researcher to ensure that the privacy and the
confidentiality of the research participants are maintained.
3. It is needed to obtain the permission of each and every research participants associated
with a research prior to collection of data and analysis of data.
4. The safety of the individuals are needed to be ensured for better analysis of the
research project.
PROPOSAL
The qualitative data analysis method does not involve any mathematical or statistical
calculation is collection and analysis of the research data that is collection (Brannen 2017). The
qualitative data analysis method make use of a number of theories and concepts in better analysis
of the research topic.
The quantitative data analysis is associated with the statistical analysis of the collected
data. Excel spreadsheet and SPSS are two effective tools for analysis of data. The quantitative
analysis therefore helps in analyzing the data in a more accurate manner.
The data analysis process that is chosen for the project include that quantitative data
analysis technique. The quantitative data analysis is appropriate for this topic as it will help in
finding answers to the identified research questions in a most accurate manner. The use of excel
is recommended as one of the effective techniques of data analysis.
4.7. Ethical Considerations associated with this research
The major ethical considerations of this research are discussed below-
1. It is essential to respect privacy of the all the participants of a research.
2. It is the responsibility of the researcher to ensure that the privacy and the
confidentiality of the research participants are maintained.
3. It is needed to obtain the permission of each and every research participants associated
with a research prior to collection of data and analysis of data.
4. The safety of the individuals are needed to be ensured for better analysis of the
research project.
17
PROPOSAL
5. Communication among the research participants should be transparent and misquoting
of any information associated with the research should be prohibited.
4.8. Evaluation of the Safety and Risks
It is research personnel’s responsibility to make sure of appropriate security of all the
research participants. For that, the research will be conducted in a planned manner. The major
issues associated with the research is needed to be identified by making use of an appropriate
risk management framework. For ensuring that the risks related to the project are appropriately
communicated, a communication plan has been developed. The risk management framework
involves identification and analysis of the risks along with the identification of the risks
mitigation approaches that can help in mitigation of the risks.
Chapter 5: Project Budget, Resources and Timeline
The project budget, resources and the timeline of the research is indicated in the
following figure-
PROPOSAL
5. Communication among the research participants should be transparent and misquoting
of any information associated with the research should be prohibited.
4.8. Evaluation of the Safety and Risks
It is research personnel’s responsibility to make sure of appropriate security of all the
research participants. For that, the research will be conducted in a planned manner. The major
issues associated with the research is needed to be identified by making use of an appropriate
risk management framework. For ensuring that the risks related to the project are appropriately
communicated, a communication plan has been developed. The risk management framework
involves identification and analysis of the risks along with the identification of the risks
mitigation approaches that can help in mitigation of the risks.
Chapter 5: Project Budget, Resources and Timeline
The project budget, resources and the timeline of the research is indicated in the
following figure-
18
PROPOSAL
Figure 1: Representing the research schedule, resources and cost
Chapter 6: Team Charter and Communication Strategy
The details of the team members and their communication strategy is identified in the
table below-
Team Member Purpose Communication
Vehicle
Frequency
Researcher To discuss the issues in
research
Email and Phone Daily
Data collection To Communicate the
needs and issues related
Email Weekly
PROPOSAL
Figure 1: Representing the research schedule, resources and cost
Chapter 6: Team Charter and Communication Strategy
The details of the team members and their communication strategy is identified in the
table below-
Team Member Purpose Communication
Vehicle
Frequency
Researcher To discuss the issues in
research
Email and Phone Daily
Data collection To Communicate the
needs and issues related
Email Weekly
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
PROPOSAL
to data collection
Schedule manager To communicate the
scheduling needs
Phone and email Weekly
Resource Manager To communicate the
resource allocation
needs
Email Bi weekly
As per the communication strategy, the team members will follow the communication
plan provided above in order to ensure that regular communication among the team members are
established.
Chapter 7: Summary
The aim of the proposal is to propose the implementation approach of the research related
to analysis of the impact of cybercrime in Australia. For that, a preliminary literature review has
been undertaken and a feasible schedule and resource needs are proposed. The research will be
collecting primary data for the research which will undergo quantitative data analysis.
PROPOSAL
to data collection
Schedule manager To communicate the
scheduling needs
Phone and email Weekly
Resource Manager To communicate the
resource allocation
needs
Email Bi weekly
As per the communication strategy, the team members will follow the communication
plan provided above in order to ensure that regular communication among the team members are
established.
Chapter 7: Summary
The aim of the proposal is to propose the implementation approach of the research related
to analysis of the impact of cybercrime in Australia. For that, a preliminary literature review has
been undertaken and a feasible schedule and resource needs are proposed. The research will be
collecting primary data for the research which will undergo quantitative data analysis.
20
PROPOSAL
References
Ajayi, E.F.G., 2016. Challenges to enforcement of cyber-crimes laws and policy. Journal of
Internet and Information Systems, 6(1), pp.1-12.
Ajayi, E.F.G., 2016. The Impact of Cyber Crimes on Global Trade and Commerce. Available at
SSRN.
Al-Alawi, A.I., 2014. Cybercrimes, computer forensics and their impact in business climate:
Bahrain status. Research Journal of Business Management, 8(3), pp.139-156.
Amrin, N., 2014. The Impact of Cyber Security on SMEs(Master's thesis, University of Twente).
Armin, J., Thompson, B. and Kijewski, P., 2016. Cybercrime economic costs: No measure no
solution. In Combatting cybercrime and cyberterrorism (pp. 135-155). Springer, Cham.
Armin, J., Thompson, B., Ariu, D., Giacinto, G., Roli, F. and Kijewski, P., 2015, August. 2020
cybercrime economic costs: No measure no solution. In availability, reliability and security
(ares), 2015 10th international conference on (pp. 701-710). IEEE.
Asamoah-Okyere, E.M.M.A.N.U.E.L., 2014. The changing face of Cybercrime: How mobile
devices have changed the approach to committing cybercrime.
Barclay, C., 2014. Using frugal innovations to support cybercrime legislations in small
developing states: introducing the cyber-legislation development and implementation process
model (CyberLeg-DPM). Information Technology for Development, 20(2), pp.165-195.
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university press.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
PROPOSAL
References
Ajayi, E.F.G., 2016. Challenges to enforcement of cyber-crimes laws and policy. Journal of
Internet and Information Systems, 6(1), pp.1-12.
Ajayi, E.F.G., 2016. The Impact of Cyber Crimes on Global Trade and Commerce. Available at
SSRN.
Al-Alawi, A.I., 2014. Cybercrimes, computer forensics and their impact in business climate:
Bahrain status. Research Journal of Business Management, 8(3), pp.139-156.
Amrin, N., 2014. The Impact of Cyber Security on SMEs(Master's thesis, University of Twente).
Armin, J., Thompson, B. and Kijewski, P., 2016. Cybercrime economic costs: No measure no
solution. In Combatting cybercrime and cyberterrorism (pp. 135-155). Springer, Cham.
Armin, J., Thompson, B., Ariu, D., Giacinto, G., Roli, F. and Kijewski, P., 2015, August. 2020
cybercrime economic costs: No measure no solution. In availability, reliability and security
(ares), 2015 10th international conference on (pp. 701-710). IEEE.
Asamoah-Okyere, E.M.M.A.N.U.E.L., 2014. The changing face of Cybercrime: How mobile
devices have changed the approach to committing cybercrime.
Barclay, C., 2014. Using frugal innovations to support cybercrime legislations in small
developing states: introducing the cyber-legislation development and implementation process
model (CyberLeg-DPM). Information Technology for Development, 20(2), pp.165-195.
Bell, E., Bryman, A. and Harley, B., 2018. Business research methods. Oxford university press.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
21
PROPOSAL
Broadhurst, R., 2017. Cybercrime in Australia. In The Palgrave Handbook of Australian and
New Zealand Criminology, Crime and Justice (pp. 221-235). Palgrave Macmillan, Cham.
Brookes, C., 2015. Cyber Security: Time for an integrated whole-of-nation approach in
Australia. Centre for Defence and Strategic Studies,(March 2015). Retrieved from:.
Bryman, A., 2016. Social research methods. Oxford university press.
Christie, A. and Jacobs, J., 2014. The regulatory and legal risks of cyber crime. Company
Director, 30(5), p.46.
Daly, A., 2015. The Legal Framework in Australia Around the Use of Encryption and
Anonymity in Digital Communications.
Duah, F.A. and Kwabena, A.M., 2015. The impact of cyber crime on the development of
electronic business in ghana. European Journal of Business and Social Sciences, 4(01), pp.22-
34.
Faqir, R.S., Sharari, S. and Salameh, S.A., 2014. Cyber crimes and technical issues under the
Jordanian information system crimes law. J. Pol. & L., 7, p.94.
Feakin, T., Nevill, L. and Hawkins, Z., 2017. The Australia-US Cyber Security Dialogue.
Australian Strategic Policy Institute.
Harkin, D., Whelan, C. and Chang, L., 2018. The challenges facing specialist police cyber-crime
units: an empirical analysis. Police Practice and Research, 19(6), pp.519-536.
PROPOSAL
Broadhurst, R., 2017. Cybercrime in Australia. In The Palgrave Handbook of Australian and
New Zealand Criminology, Crime and Justice (pp. 221-235). Palgrave Macmillan, Cham.
Brookes, C., 2015. Cyber Security: Time for an integrated whole-of-nation approach in
Australia. Centre for Defence and Strategic Studies,(March 2015). Retrieved from:.
Bryman, A., 2016. Social research methods. Oxford university press.
Christie, A. and Jacobs, J., 2014. The regulatory and legal risks of cyber crime. Company
Director, 30(5), p.46.
Daly, A., 2015. The Legal Framework in Australia Around the Use of Encryption and
Anonymity in Digital Communications.
Duah, F.A. and Kwabena, A.M., 2015. The impact of cyber crime on the development of
electronic business in ghana. European Journal of Business and Social Sciences, 4(01), pp.22-
34.
Faqir, R.S., Sharari, S. and Salameh, S.A., 2014. Cyber crimes and technical issues under the
Jordanian information system crimes law. J. Pol. & L., 7, p.94.
Feakin, T., Nevill, L. and Hawkins, Z., 2017. The Australia-US Cyber Security Dialogue.
Australian Strategic Policy Institute.
Harkin, D., Whelan, C. and Chang, L., 2018. The challenges facing specialist police cyber-crime
units: an empirical analysis. Police Practice and Research, 19(6), pp.519-536.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22
PROPOSAL
Kader, S. and Minnaar, A., 2015. Cybercrime investigations: Cyber-processes for detecting of
cybercriminal activities, cyber-intelligence and evidence gathering. Acta Criminologica:
Southern African Journal of Criminology, 2015(Special Edition 5), pp.67-81.
Kanayamaa, T., 2017. Impact of Cybercrime in Japan—Findings of Cybercrime Victimization
Survey. Sociology, 7(6), pp.331-340.
Kayode, A.B., Arome, G.J., Oluwatoyin, O. and OA, D., 2014. Modelling of risk management
procedures for cybercrime control systems. In Proceedings of the World Congress on
Engineering (Vol. 1).
Kucera, W., 2015. The national security dimension of cybercrime: Legislative responses in
Australia and Singapore. Journal of the Australian Institute of Professional Intelligence
Officers, 23(1), p.35.
Martellozzo, E. and Jane, E.A. eds., 2017. Cybercrime and its victims. Taylor & Francis.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Ng, J., 2016. International cybercrime, transnational evidence gathering and the challenges in
Australia: finding the delicate balance. International Journal of Information and Communication
Technology, 9(2), pp.177-198.
Persadha, P.D., Waskita, A.A. and Yazid, S., 2015, October. Comparative Study of Cyber
Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. In Cyber
Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015 Fourth International
Conference on (pp. 146-150). IEEE.
PROPOSAL
Kader, S. and Minnaar, A., 2015. Cybercrime investigations: Cyber-processes for detecting of
cybercriminal activities, cyber-intelligence and evidence gathering. Acta Criminologica:
Southern African Journal of Criminology, 2015(Special Edition 5), pp.67-81.
Kanayamaa, T., 2017. Impact of Cybercrime in Japan—Findings of Cybercrime Victimization
Survey. Sociology, 7(6), pp.331-340.
Kayode, A.B., Arome, G.J., Oluwatoyin, O. and OA, D., 2014. Modelling of risk management
procedures for cybercrime control systems. In Proceedings of the World Congress on
Engineering (Vol. 1).
Kucera, W., 2015. The national security dimension of cybercrime: Legislative responses in
Australia and Singapore. Journal of the Australian Institute of Professional Intelligence
Officers, 23(1), p.35.
Martellozzo, E. and Jane, E.A. eds., 2017. Cybercrime and its victims. Taylor & Francis.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Ng, J., 2016. International cybercrime, transnational evidence gathering and the challenges in
Australia: finding the delicate balance. International Journal of Information and Communication
Technology, 9(2), pp.177-198.
Persadha, P.D., Waskita, A.A. and Yazid, S., 2015, October. Comparative Study of Cyber
Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. In Cyber
Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015 Fourth International
Conference on (pp. 146-150). IEEE.
23
PROPOSAL
Phelps, A. and Watt, A., 2014. I shop online–recreationally! Internet anonymity and Silk Road
enabling drug use in Australia. Digital Investigation, 11(4), pp.261-272.
Tait, D., 2015. Cybercrime: Innovative approaches to an unprecedented
challenge. Commonwealth Governance Handbook.
Tamarkin, E., 2015. The AU’s cybercrime response: A positive start, but substantial challenges
ahead.
Viano, E.C., 2017. Cybercrime, Organized Crime, and Societal Responses. Springer
International Publishing.
PROPOSAL
Phelps, A. and Watt, A., 2014. I shop online–recreationally! Internet anonymity and Silk Road
enabling drug use in Australia. Digital Investigation, 11(4), pp.261-272.
Tait, D., 2015. Cybercrime: Innovative approaches to an unprecedented
challenge. Commonwealth Governance Handbook.
Tamarkin, E., 2015. The AU’s cybercrime response: A positive start, but substantial challenges
ahead.
Viano, E.C., 2017. Cybercrime, Organized Crime, and Societal Responses. Springer
International Publishing.
1 out of 24
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.