ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Issues Due To Cyber Technology

Verified

Added on  2023/01/20

|7
|1429
|89
AI Summary
The paper depicts some important aspects of cyber crime and identifies ethical issues arising due to cyber technology. It discusses the impacts of cybercrime on business and society and explores the security issues that arise from sharing personal information on social media apps.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ISSUES DUE TO CYBER TECHNOLOGY
Issues Due To Cyber Technology
Name of the Student
Name of the University
Authors note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ISSUES DUE TO CYBER TECHNOLOGY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Impacts on business and society............................................................................................3
Security issues arise due to sharing personal information on social media Apps..................4
Conclusion..................................................................................................................................4
Prevention and Recommendation..............................................................................................5
References..................................................................................................................................6
Document Page
2ISSUES DUE TO CYBER TECHNOLOGY
Introduction
The paper depicts some important aspects of cyber crime. It identifies ethical issues
arising due to cyber technology. The life of human and internet technology has become
parallel in this world. The use of Information and communication technologies has become
the most vital part in the modern era. Where everything is digitalized, humankind is being
more dependent to these technologies. The tremendous use of internet technology has also
given rise to emerging cyber crimes (Gillespie 2015). Though there are ample benefits
associated with the use if technologies but the increasing threat must not be ignored. ICT has
enhanced the lives of human in the most prominent way. As more advanced technology is
invented, more number of cases associated with cyber crime is encountered. Cybercrime
involves theft of private information, hacking, cyber stalking, cyber bullying, internet scams,
phishing and ransom ware attack (Holt and Bossler 2015). Cyber crime can affect major
sections of the society. The business enterprises, banks and person’s personal comports can
be the potential victims of cyber attack. Cyber crime refers to the act of coming crime using
computer, internet and mobile technology. One of the cybercrime acts involves financial
crime in which the crooks acts as an authorized entity with an intention to theft the money
and frauding them.
Discussion
Cyber bullying can be defined as an act to harass and abuse somebody with the help
of digital technologies like computer, internet and mobile phones. This is performed with an
intention to hurt and humiliate somebody. Cyber bullying can come in many forms (Olweus
and Limber 2018). Cyber bullying includes sending abusive messages in social media sites,
Document Page
3ISSUES DUE TO CYBER TECHNOLOGY
proliferating false information to harm somebody’s reputation, sharing somebody’s personal
images, creating fake profile online, stalking someone and harassening them with threatening
texts and sending of inappropriate images and videos, hacking passwords and much more.
Cyber bulling is a range of criminal activity that is performed online with an intention to
hamper one’s sentiments and reputation. The victim of cyber bulling may feel guilty,
depressed and hopeless. It can embarrass them and make them feel unsafe in public places.
According to (Olweus and Limber 2018), it has been reported that 45% of the victims of
cyber bullying are teenagers and many of them commit suicide because of being victim to
cyber crime. It has been confirmed that 78% of cyber criminals are teenagers who are
responsible for cyber bullying (Riek, Bohme and Moore 2016).
Impacts on business and society
The primary objective of mankind must be is to analyze its impacts in order to
understand the extent of damage cybercrime can cause. It has already effected the major
business organization and society as well. According to surveys, it has been discovered that
47% of business enterprise has fallen to be the victim of cybercrime in the past one year. The
cyber attacks have successfully damaged the reputation of business (Whittaker and Kowalski
2015). The intruders access the private and confidential information if a business and can use
their business strategy as their own. The main aim of the hackers is to gain all the money and
resources of the organization. With the use of internet and technology, it is easy for them to
gain access to the data. They can also unlock the password of the system using some kind if
software that can help the login credential of any employee. The attackers can also practice
the method of spoofing which will make the fraudsters an authorized entity (Eddolls 2016).
Damage to intellectual property: Cyber criminals can leak sensitive information of the
customer which will create a negative impact on the company’s reputation. This will be

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4ISSUES DUE TO CYBER TECHNOLOGY
disadvantageous in context of competitive environment. It may happen that the
cybercriminals can expose or steal the business and marketing ideas of an enterprise which
will hamper the productivity of that business. Intellectual property breaches can be fatal for
business and companies (Yar and Steinmetz 2019). Therefore cyber attacks has a major
impact on the business community which tend to create range of losses for the organization.
Phishing and Brand Imitation: The cyber criminals sets up a fake website and acts as an
authorized user. They steal the brand identity of the enterprise and uses them to represent
their fake company.
Security issues arise due to sharing personal information on social media Apps.
Profile hacking: this is one of the most growing issue arising due to social media.
The hackers can easily hack anyone’s private profile and can easily crack the
passwords.
Fake URL and links: the cyber criminal can create fake links, which upon clicking
hacks all the application on the system. Those links can also be used as a way to
introduce malicious worm or viruses on the computer system which will eventually
disrupt all the files, documents and records.
Stolen identity: They can also create fake profiles of any person and detain their
reputation. The intruders collects images and all the information form the social
media sites and creates a account with same name and personal details. This may help
them to introduce potential virus into the devices.
Document Page
5ISSUES DUE TO CYBER TECHNOLOGY
Conclusion
Therefore, the paper concludes that cyber technology is associated with potential
threats, which needs to be assessed. Therefore, cyber bullying can cause great loss of data as
well as human emotions. Hence, certain preservations must be undertaken to minimize the
cyber crimes and cyber threats.
Prevention and Recommendation
In order to prevent the arising issues due to cyber technology, certain safety measures must
be established.
Limit the sharing of personal information
Report to the authorities if any cyber bullying is witnessed.
Always keep the system updated and keep file backups (Williams and Levi 2017)
Never enter credit card details to the sites that are not safe while purchasing online.
Must keep a strong and complex password so that it cannot be hacked easily.
Install antivirus software in the system.
Do not use open public WI-FI services
Do not open email attachments that are unknown
Download only from authorized websites.
Document Page
6ISSUES DUE TO CYBER TECHNOLOGY
References
Eddolls, M., 2016. Making cybercrime prevention the highest priority. Network
Security, 2016(8), pp.5-8.
Gillespie, A.A., 2015. Cybercrime: key issues and debates. Routledge.
Holt, T.J. and Bossler, A.M., 2015. Cybercrime in progress: Theory and prevention of
technology-enabled offenses. Routledge.
Olweus, D. and Limber, S.P., 2018. Some problems with cyberbullying research. Current
opinion in psychology, 19, pp.139-143.
Riek, M., Bohme, R. and Moore, T., 2016. Measuring the influence of perceived cybercrime
risk on online service avoidance. IEEE Transactions on Dependable and Secure
Computing, 13(2), pp.261-273.
Whittaker, E. and Kowalski, R.M., 2015. Cyberbullying via social media. Journal of School
Violence, 14(1), pp.11-29.
Williams, M.L. and Levi, M., 2017. Cybercrime prevention. Handbook of crime prevention
and community safety, 454.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. SAGE Publications Limited.
1 out of 7
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]