Research Project Proposal on Cyber Crime Development and Impact
VerifiedAdded on 2023/04/22
|24
|5700
|394
Project
AI Summary
This research project proposal investigates the escalating issue of cybercrime in Australia, analyzing its development, impact, and potential mitigation strategies. It begins by outlining the aims and objectives, including understanding the concept of cybercrime, identifying reasons for its increase, analyzing its impact, and recommending mitigation strategies. The literature review examines the concept of cybercrime, motivations behind it, current approaches to cybersecurity in Australia, reasons for the increase in cybercrime, and its impact on the country, including financial losses and data breaches. The proposal details the research scope, methodology (including research philosophy, approach, design, data collection, and analysis), ethical considerations, project budget, resources, timeline, team charter, and communication strategy. It highlights the need for enhanced cybersecurity measures and awareness to combat the growing threat of cybercrime in Australia.

Running head: PROPOSAL
Project Title: Development and Impact of Cyber Crime in Australia
Name of Student
Name of University
Author Note
Project Title: Development and Impact of Cyber Crime in Australia
Name of Student
Name of University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
PROPOSAL
Table of Contents
Chapter 1: Introduction........................................................................................................3
1.1. Background...............................................................................................................3
1.2. Research Aims and Objectives.................................................................................3
1.2.1. Aims of the study...............................................................................................3
1.2.2. Objectives of the study......................................................................................4
1.3. Research Questions...................................................................................................4
Chapter 2: Literature Review...............................................................................................5
2.1. Introduction...............................................................................................................5
2.2. Cybercrime: The Concept.........................................................................................5
2.2.1. Motivations for Cybercrime..............................................................................6
2.3. Cybercrime in Australia............................................................................................6
2.3.1. Current Approach to cyber security in Australia...............................................7
2.4. Reasons behind increase in cybercrime in Australia................................................7
2.5. Impact of Cybercrime in Australia...........................................................................8
2.6. Mitigation of the Risks associated with cybercrime...............................................11
Chapter 3: Research Scope................................................................................................12
Chapter 4: Research Method.............................................................................................12
4.1. Introduction.............................................................................................................12
PROPOSAL
Table of Contents
Chapter 1: Introduction........................................................................................................3
1.1. Background...............................................................................................................3
1.2. Research Aims and Objectives.................................................................................3
1.2.1. Aims of the study...............................................................................................3
1.2.2. Objectives of the study......................................................................................4
1.3. Research Questions...................................................................................................4
Chapter 2: Literature Review...............................................................................................5
2.1. Introduction...............................................................................................................5
2.2. Cybercrime: The Concept.........................................................................................5
2.2.1. Motivations for Cybercrime..............................................................................6
2.3. Cybercrime in Australia............................................................................................6
2.3.1. Current Approach to cyber security in Australia...............................................7
2.4. Reasons behind increase in cybercrime in Australia................................................7
2.5. Impact of Cybercrime in Australia...........................................................................8
2.6. Mitigation of the Risks associated with cybercrime...............................................11
Chapter 3: Research Scope................................................................................................12
Chapter 4: Research Method.............................................................................................12
4.1. Introduction.............................................................................................................12

2
PROPOSAL
4.2. Research Philosophy...............................................................................................13
4.3. Research Approach.................................................................................................13
4.4. Research Design.....................................................................................................14
4.5. Data Collection Method..........................................................................................14
4.6. Data Analysis Method............................................................................................16
4.7. Ethical Considerations associated with this research.............................................16
4.8. Evaluation of the Safety and Risks.........................................................................17
Chapter 5: Project Budget, Resources and Timeline.........................................................17
Chapter 6: Team Charter and Communication Strategy....................................................18
Chapter 7: Summary..........................................................................................................19
References..........................................................................................................................20
PROPOSAL
4.2. Research Philosophy...............................................................................................13
4.3. Research Approach.................................................................................................13
4.4. Research Design.....................................................................................................14
4.5. Data Collection Method..........................................................................................14
4.6. Data Analysis Method............................................................................................16
4.7. Ethical Considerations associated with this research.............................................16
4.8. Evaluation of the Safety and Risks.........................................................................17
Chapter 5: Project Budget, Resources and Timeline.........................................................17
Chapter 6: Team Charter and Communication Strategy....................................................18
Chapter 7: Summary..........................................................................................................19
References..........................................................................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
PROPOSAL
Chapter 1: Introduction
1.1. Background
The research is based on one of the most significant issues in the age of technology. The
increase in the use of internet and its applications results in an exponential increase in
cybercrimes. Cybercrime can be described as a computer oriented crime. When computers are
used to commit an offence, the criminal act is termed as cybercrime. Data prove that over 6
million cybercrimes have been registered in Australia in the year 2017, and the number is
growing every year. Therefore, identification of the main causes behind cybercrime and its
impact is necessary so as to understand the risk mitigation approaches that can reduce the
negative impact of cybercrimes in Australia.
The Symantec’s Cyber Security report shows that over six million people have been a
victim of identity theft and credit card frauds in the year 2017. On an average, the rate of
increase in cybercrimes in Australia is near about 31 percent, which is an alarming rate.
Although 73 percent of the Australian has taken measures to make sure that they are safe online.
Despite that, there is an increase in number of cybercrimes every year in Australia. The research
has been undertaken in order to identify the impact of cybercrime in Australia.
1.2. Research Aims and Research Objectives
This section of the proposal report identifies aims and objectives of the research
undertaken. It is vital to identify the aims of the research and objectives of the research in order
to identify the possible roadmap of the research.
1.2.1. Aims of the study
PROPOSAL
Chapter 1: Introduction
1.1. Background
The research is based on one of the most significant issues in the age of technology. The
increase in the use of internet and its applications results in an exponential increase in
cybercrimes. Cybercrime can be described as a computer oriented crime. When computers are
used to commit an offence, the criminal act is termed as cybercrime. Data prove that over 6
million cybercrimes have been registered in Australia in the year 2017, and the number is
growing every year. Therefore, identification of the main causes behind cybercrime and its
impact is necessary so as to understand the risk mitigation approaches that can reduce the
negative impact of cybercrimes in Australia.
The Symantec’s Cyber Security report shows that over six million people have been a
victim of identity theft and credit card frauds in the year 2017. On an average, the rate of
increase in cybercrimes in Australia is near about 31 percent, which is an alarming rate.
Although 73 percent of the Australian has taken measures to make sure that they are safe online.
Despite that, there is an increase in number of cybercrimes every year in Australia. The research
has been undertaken in order to identify the impact of cybercrime in Australia.
1.2. Research Aims and Research Objectives
This section of the proposal report identifies aims and objectives of the research
undertaken. It is vital to identify the aims of the research and objectives of the research in order
to identify the possible roadmap of the research.
1.2.1. Aims of the study
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
PROPOSAL
The aim of the research is to analyse the context of increasing cybercrimes in Australia
and its impact. The reason behind the increase in use of cybercrimes in Australia is needed to be
identified so that the risk mitigation processes of the same can be identified.
1.2.2. Objectives of the study
The identified objectives are as follows-
To understand the concept of cybercrime
To identify the reasons behind the increase in cybercrimes in Australia
To analyse the impact of increase in cybercrime in Australia
To recommend the mitigation strategies against the identified cybercrime
The research will be evaluating all the above identified research objectives.
1.3. Research Questions
The research will be analysing a primary research question, which is as follows-
What is the impact of cybercrime in Australia?
In order to find answers for the above identified research questions, the following
secondary research questions will be evaluated.
What is the reason behind the increase in cybercrimes in Australia?
How are cybercrime conducted?
How can the cyber security risks be mitigated?
PROPOSAL
The aim of the research is to analyse the context of increasing cybercrimes in Australia
and its impact. The reason behind the increase in use of cybercrimes in Australia is needed to be
identified so that the risk mitigation processes of the same can be identified.
1.2.2. Objectives of the study
The identified objectives are as follows-
To understand the concept of cybercrime
To identify the reasons behind the increase in cybercrimes in Australia
To analyse the impact of increase in cybercrime in Australia
To recommend the mitigation strategies against the identified cybercrime
The research will be evaluating all the above identified research objectives.
1.3. Research Questions
The research will be analysing a primary research question, which is as follows-
What is the impact of cybercrime in Australia?
In order to find answers for the above identified research questions, the following
secondary research questions will be evaluated.
What is the reason behind the increase in cybercrimes in Australia?
How are cybercrime conducted?
How can the cyber security risks be mitigated?

5
PROPOSAL
Chapter 2: Literature Review
2.1. Introduction
The literature review chapter aims in conducting a secondary analysis of the research
topic and the research problem. A preliminary literature review has been conducted in order get a
basic understanding of the research topic and to collect data that can help in analysis of the
collected data. The literature review chapter is important for a research project as the previously
published literature in the chosen field is evaluated in order to obtain an idea of the identified
research topic. The literature review chapter will analyze the concepts of cybercrime its impact
in Australia.
2.2. Cybercrime: The Concept
According to Ajayi (2016), although cybercrime can be considered as a relatively new
phenomenon, it is able to occupy a global attention mainly because of its exponential increase
across the globe. The Cybercrimes are those act of misconduct or criminal offenses that are
perpetrated with a computer (Tamarkin 2015). These type of crimes are mainly committed
against the hardware of the computer and the materials contained within the computer. A typical
computer crime therefore can include financial frauds, embezzlement, scams and hacking.
Cybercrime as a whole is an umbrella term that encompasses two different types of
crimes, which include the cyber-dependent crimes and cyber-enabled crimes (Faqir, Sharari and
Salameh 2014). The cyber enabled crimes are those crimes that can only be conducted by
making use of a computer, its associated network and other forms of ICT (Feakin, Nevill and
Hawkins 2017). Example of cyber-dependent crime include, the spread of viruses, malicious
software and the distributed denial of service attacks (Ajayi 2016). The cyber enabled crimes on
PROPOSAL
Chapter 2: Literature Review
2.1. Introduction
The literature review chapter aims in conducting a secondary analysis of the research
topic and the research problem. A preliminary literature review has been conducted in order get a
basic understanding of the research topic and to collect data that can help in analysis of the
collected data. The literature review chapter is important for a research project as the previously
published literature in the chosen field is evaluated in order to obtain an idea of the identified
research topic. The literature review chapter will analyze the concepts of cybercrime its impact
in Australia.
2.2. Cybercrime: The Concept
According to Ajayi (2016), although cybercrime can be considered as a relatively new
phenomenon, it is able to occupy a global attention mainly because of its exponential increase
across the globe. The Cybercrimes are those act of misconduct or criminal offenses that are
perpetrated with a computer (Tamarkin 2015). These type of crimes are mainly committed
against the hardware of the computer and the materials contained within the computer. A typical
computer crime therefore can include financial frauds, embezzlement, scams and hacking.
Cybercrime as a whole is an umbrella term that encompasses two different types of
crimes, which include the cyber-dependent crimes and cyber-enabled crimes (Faqir, Sharari and
Salameh 2014). The cyber enabled crimes are those crimes that can only be conducted by
making use of a computer, its associated network and other forms of ICT (Feakin, Nevill and
Hawkins 2017). Example of cyber-dependent crime include, the spread of viruses, malicious
software and the distributed denial of service attacks (Ajayi 2016). The cyber enabled crimes on
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
PROPOSAL
the other hand are mainly directed towards the network of computer and includes e-commerce
frauds, sexual offending and theft of personal information.
The term “cybercrime” therefore involves the criminal offence that is facilitated by
electronic communication or related information systems associated with internet.
2.2.1. Motivations for Cybercrime
The main motive behind conducting a cybercrime is financial and the economic benefits
obtained by the cybercriminals. Therefore, the profit motive can be considered as one of the
major motives behind cybercrime (Harkin, Whelan and Chang 2018). Since the internet provides
wide freedom to all the individuals across the globe and therefore it is quite difficult to trace the
motive of certain individuals in making use of computers and its related resources (Kayode et al.
2014). Therefore, identification of the source of a crime becomes difficult leading to the increase
in cybercrimes.
2.3. Cybercrime in Australia
Cybercrime acts as an epidemic all throughout the world. The number of cybercrimes that
are registered in Australia is quite alarming (Barclay 2014). According to a cybersecurity insight
report, on an average, one out of three Australians have felt victim to the cybersecurity attack in
the year 2017. This number is higher in the following years.
According to Brookes (2015), cybercrime is one of the leading issues in Australia. The
number of cyber security issues are so huge in Australia that it becomes difficult for the
government of Australia to ensure cyber security capabilities to the businesses and population in
Australia. Therefore, it becomes essential to identify appropriate security measures to enhance
PROPOSAL
the other hand are mainly directed towards the network of computer and includes e-commerce
frauds, sexual offending and theft of personal information.
The term “cybercrime” therefore involves the criminal offence that is facilitated by
electronic communication or related information systems associated with internet.
2.2.1. Motivations for Cybercrime
The main motive behind conducting a cybercrime is financial and the economic benefits
obtained by the cybercriminals. Therefore, the profit motive can be considered as one of the
major motives behind cybercrime (Harkin, Whelan and Chang 2018). Since the internet provides
wide freedom to all the individuals across the globe and therefore it is quite difficult to trace the
motive of certain individuals in making use of computers and its related resources (Kayode et al.
2014). Therefore, identification of the source of a crime becomes difficult leading to the increase
in cybercrimes.
2.3. Cybercrime in Australia
Cybercrime acts as an epidemic all throughout the world. The number of cybercrimes that
are registered in Australia is quite alarming (Barclay 2014). According to a cybersecurity insight
report, on an average, one out of three Australians have felt victim to the cybersecurity attack in
the year 2017. This number is higher in the following years.
According to Brookes (2015), cybercrime is one of the leading issues in Australia. The
number of cyber security issues are so huge in Australia that it becomes difficult for the
government of Australia to ensure cyber security capabilities to the businesses and population in
Australia. Therefore, it becomes essential to identify appropriate security measures to enhance
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
PROPOSAL
the operational capabilities in reducing the cybersecurity risks and issues in Australia. There are
certain strategies that Australian government needs to acknowledge in order to mitigate the
issues and cybersecurity risks in Australia (Armin et al. 2015). It is necessary to propose an
integrated approach for the entire nation in Australia as the digital age is considered to be an
important aspect of national security and prosperity of Australia. Terrorism and espionage is
increasing at an alarming rate, contributing to the national security threat.
2.3.1. Current Approach to cyber security in Australia
Australian government’s cyber security policy aims in maintaining a secure and trusted e-
operating environment in the country so as to maximize the benefits obtained from digital
economy (Broadhurst 2017). The major ICT systems in Australia that stores and processes the
sensitive and the personal business information and data about the national infrastructure of
Australia are collectively owned by a number of businesses and individuals. Therefore, ensuring
security to these data and the information system becomes quite essential. The approach that is
taken by the Australian government is to educate the ICT system owners on the cybersecurity
and its related threats and vulnerabilities (Kanayamaa 2017). The operational capability of the
Australian government is needed to be enhanced in order to ensure that the cyber security issues
are reduced in Australia.
Apart from the context of Australian government, the risks that the individuals face while
making an ecommerce transaction are needed to be mitigated (Ng 2016). For that, the impact of
the cybercrime in Australia are needed to be identified.
2.4. Reasons behind increase in cybercrime in Australia
PROPOSAL
the operational capabilities in reducing the cybersecurity risks and issues in Australia. There are
certain strategies that Australian government needs to acknowledge in order to mitigate the
issues and cybersecurity risks in Australia (Armin et al. 2015). It is necessary to propose an
integrated approach for the entire nation in Australia as the digital age is considered to be an
important aspect of national security and prosperity of Australia. Terrorism and espionage is
increasing at an alarming rate, contributing to the national security threat.
2.3.1. Current Approach to cyber security in Australia
Australian government’s cyber security policy aims in maintaining a secure and trusted e-
operating environment in the country so as to maximize the benefits obtained from digital
economy (Broadhurst 2017). The major ICT systems in Australia that stores and processes the
sensitive and the personal business information and data about the national infrastructure of
Australia are collectively owned by a number of businesses and individuals. Therefore, ensuring
security to these data and the information system becomes quite essential. The approach that is
taken by the Australian government is to educate the ICT system owners on the cybersecurity
and its related threats and vulnerabilities (Kanayamaa 2017). The operational capability of the
Australian government is needed to be enhanced in order to ensure that the cyber security issues
are reduced in Australia.
Apart from the context of Australian government, the risks that the individuals face while
making an ecommerce transaction are needed to be mitigated (Ng 2016). For that, the impact of
the cybercrime in Australia are needed to be identified.
2.4. Reasons behind increase in cybercrime in Australia

8
PROPOSAL
One of the major reasons behind the increase in cybercrimes in Australia of course is
increase in dependence on internet (Kucera 2015). According to a recent report of the Insurance
Council of Australia, the cybercrime is estimated to cost near about $1 billion to the nation.
Researchers prove that the threats in cybercrime is not going to be disappear anytime soon.
The Australian are needed to be educated on the negative effects of cybercrime in
Australia and the process by which the Australians cab protect themselves from cyber threats
(Christie and Jacobs 2014). The individuals are needed to be educated about cybersecurity
measures that can help in reducing the cybersecurity risks.
On analyzing the reasons behind the increase in cybercrimes in Australia, it is found that
huge disposal of e-wastes is one of the concerning reasons behind the increase in cybercrimes in
Australia. The e-wastes are being used by the hackers as a medium of gathering confidential
information that is crucial for business (Daly 2015). Therefore, in order to reduce the issues
associated with cybercrimes in Australia, it is needed to ensure safe disposal of e-wastes so that
the hackers don’t get an access to the same (Amrin 2014). Furthermore, it is essential to establish
an appropriate process of secure handling of the transactions in order to deal with the issues
associated with cybercrime.
2.5. Impact of Cybercrime in Australia
According to Broadhurst (2017), the decentralized structure of internet provides a global
connectivity and communication facility to all the individuals across the globe. The
cybercriminals and cybercrimes are increased in such a huge rate mainly because it provides
anonymity, which is a characteristic that is critical to success of cybercrime (Persadha, Waskita
and Yazid 2015). In Australia, the effect of cyber warfare is severely disrupting as well. The
PROPOSAL
One of the major reasons behind the increase in cybercrimes in Australia of course is
increase in dependence on internet (Kucera 2015). According to a recent report of the Insurance
Council of Australia, the cybercrime is estimated to cost near about $1 billion to the nation.
Researchers prove that the threats in cybercrime is not going to be disappear anytime soon.
The Australian are needed to be educated on the negative effects of cybercrime in
Australia and the process by which the Australians cab protect themselves from cyber threats
(Christie and Jacobs 2014). The individuals are needed to be educated about cybersecurity
measures that can help in reducing the cybersecurity risks.
On analyzing the reasons behind the increase in cybercrimes in Australia, it is found that
huge disposal of e-wastes is one of the concerning reasons behind the increase in cybercrimes in
Australia. The e-wastes are being used by the hackers as a medium of gathering confidential
information that is crucial for business (Daly 2015). Therefore, in order to reduce the issues
associated with cybercrimes in Australia, it is needed to ensure safe disposal of e-wastes so that
the hackers don’t get an access to the same (Amrin 2014). Furthermore, it is essential to establish
an appropriate process of secure handling of the transactions in order to deal with the issues
associated with cybercrime.
2.5. Impact of Cybercrime in Australia
According to Broadhurst (2017), the decentralized structure of internet provides a global
connectivity and communication facility to all the individuals across the globe. The
cybercriminals and cybercrimes are increased in such a huge rate mainly because it provides
anonymity, which is a characteristic that is critical to success of cybercrime (Persadha, Waskita
and Yazid 2015). In Australia, the effect of cyber warfare is severely disrupting as well. The
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
PROPOSAL
cybercrime activities seem to overlap with the espionage that poses a threat to nation states and
corporation. In this context, the impact of cybercrime in Australia is needed to be analysed.
The common cybercrimes that is registered in Australia include online scams, hacking,
and fraud such as identity theft and attacks (Al-Alawi 2014). The cybercrime in Australia
therefore is a growing threat as the cybercriminals make use of computer and the resources to
steal the information and money thus disrupting the business.
The main impact of cybercrime is the financial loss and the loss personal information
such as information of the credit card and personal details of the individuals. The cyber threats
are associated with the illegal data collection that can be used against the individual leading to
financial loss (Viano 2017). Hacking of the data and identity theft that can prove to be quite
dangerous is one significant cybercrime that is prevalent in Australia. The cybercrimes in
Australia is growing at an alarming rate. The cybercrimes in Australia is a growing threat mainly
because of the sophistication of attacks that are being implemented.
Cybercrime has a large impact on global trade and commerce. It is quite evident that
exchange of goods and services are important in human life (Ajayi 2016). As the trading
activities is now mostly implemented in form of digital commerce, the risk of cybercrime
increases as well. The risk of hacking into the system can be quite crucial and is needed to be
addressed (Ajayi 2016). Therefore, cybercrime enforces a certain amount of risks in global
commerce associated with Australia and is therefore needed to be addressed.
Businesses and individuals can suffer a significant financial loss as a result of
cybercrime. Cybercriminals not only attacks the individuals but also can enforce an attack on the
high profile and valuable data (Phelps and Watt 2014). This type of attacks are mainly
PROPOSAL
cybercrime activities seem to overlap with the espionage that poses a threat to nation states and
corporation. In this context, the impact of cybercrime in Australia is needed to be analysed.
The common cybercrimes that is registered in Australia include online scams, hacking,
and fraud such as identity theft and attacks (Al-Alawi 2014). The cybercrime in Australia
therefore is a growing threat as the cybercriminals make use of computer and the resources to
steal the information and money thus disrupting the business.
The main impact of cybercrime is the financial loss and the loss personal information
such as information of the credit card and personal details of the individuals. The cyber threats
are associated with the illegal data collection that can be used against the individual leading to
financial loss (Viano 2017). Hacking of the data and identity theft that can prove to be quite
dangerous is one significant cybercrime that is prevalent in Australia. The cybercrimes in
Australia is growing at an alarming rate. The cybercrimes in Australia is a growing threat mainly
because of the sophistication of attacks that are being implemented.
Cybercrime has a large impact on global trade and commerce. It is quite evident that
exchange of goods and services are important in human life (Ajayi 2016). As the trading
activities is now mostly implemented in form of digital commerce, the risk of cybercrime
increases as well. The risk of hacking into the system can be quite crucial and is needed to be
addressed (Ajayi 2016). Therefore, cybercrime enforces a certain amount of risks in global
commerce associated with Australia and is therefore needed to be addressed.
Businesses and individuals can suffer a significant financial loss as a result of
cybercrime. Cybercriminals not only attacks the individuals but also can enforce an attack on the
high profile and valuable data (Phelps and Watt 2014). This type of attacks are mainly
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
PROPOSAL
opportunistic and the cybercrimes are mainly conducted by exploiting the vulnerabilities that can
be present in a system or a network. Therefore, it is needed to ensure appropriate protection of
the computer devices and protection of the network.
Cybercriminals attack the individuals by luring them into something which is not real.
This might include certain promotional offers or huge prize money (Armin, Thompson and
Kijewski 2016). These scams lures an individual in providing certain information to the hackers
involuntarily. This can result in huge financial loss.
The economic impact of cybercrime is quite significant as cybercrimes are mainly aimed
in financial gain (Broadhurst 2017). This is a serious problem that is persistence not only in
Australia but in different areas across the globe (Martellozzo and Jane 2017). It is essential to
identify the processes that can help in easier mitigation of the risks associated with cyber
security.
It is essential to identify the impact of the cybersecurity and the risks associated with the
cybersecurity in order to ensure that the financial losses associated with cybercrimes are
minimized (Brookes 2015). In this digital world, it is essential to protect the IT systems and
investments in order to deal with the economic impact associated with a cybercrime (Kader and
Minnaar 2015). In order to ensure appropriate protection against the cybercrimes, it is quite
essential to educate the individuals regarding the major issues in cybercrimes. It is quite integral
that financial information and IT risks associated with cybercrime are addressed. Complete
elimination of the cybercrime is not possible in a less span of time, however, the reduction of the
alarming rate of cybercrime in Australia can be possible by educating the citizens about safe use
of online resources.
PROPOSAL
opportunistic and the cybercrimes are mainly conducted by exploiting the vulnerabilities that can
be present in a system or a network. Therefore, it is needed to ensure appropriate protection of
the computer devices and protection of the network.
Cybercriminals attack the individuals by luring them into something which is not real.
This might include certain promotional offers or huge prize money (Armin, Thompson and
Kijewski 2016). These scams lures an individual in providing certain information to the hackers
involuntarily. This can result in huge financial loss.
The economic impact of cybercrime is quite significant as cybercrimes are mainly aimed
in financial gain (Broadhurst 2017). This is a serious problem that is persistence not only in
Australia but in different areas across the globe (Martellozzo and Jane 2017). It is essential to
identify the processes that can help in easier mitigation of the risks associated with cyber
security.
It is essential to identify the impact of the cybersecurity and the risks associated with the
cybersecurity in order to ensure that the financial losses associated with cybercrimes are
minimized (Brookes 2015). In this digital world, it is essential to protect the IT systems and
investments in order to deal with the economic impact associated with a cybercrime (Kader and
Minnaar 2015). In order to ensure appropriate protection against the cybercrimes, it is quite
essential to educate the individuals regarding the major issues in cybercrimes. It is quite integral
that financial information and IT risks associated with cybercrime are addressed. Complete
elimination of the cybercrime is not possible in a less span of time, however, the reduction of the
alarming rate of cybercrime in Australia can be possible by educating the citizens about safe use
of online resources.

11
PROPOSAL
2.6. Mitigation of the Risks associated with cybercrime
Cybercrime is a huge risk in Australia and therefore, identification of the appropriate risk
mitigation strategy is essential (Ajayi 2016). Recommendation of the major risk mitigation
strategies include taking appropriate measures in ensuring that any data associated with online
transaction is not hacked. Much attention is now paid in order to ensure that secure transactions
are executed in terms of ecommerce and related transactions (Asamoah-Okyere 2014). E-
commerce can be a tremendous boon for the business and can help and individual in improving
their ecommerce presence. It is therefore necessary to ensure that the data associated with the
ecommerce is securely transferred.
There are a number of strategies that can help in easier mitigation of the risks related to
ecommerce. The recommended strategies of mitigation of the risks in ecommerce are as follows-
1. From a business point of view, it is quite essential for the business organization to train
its staffs regarding the safe use of ecommerce and internet while dealing with an organizational
business.
2. From an individual’s perspective, maintaining the confidentiality of the information
that has been shared in an unsecure platform such an internet becomes essential. Use of
appropriate firewalls and antivirus is recommended so that the risks associated with an
ecommerce website can be mitigated (Tait 2015). It is quite essential for an individual to make
use of a secure website in case of payment processing so that the risks of the data loss can be
minimized.
3. Making use of fraud prevention tools are recommended in order to address the major
issues related to cybercrime. There are a number of fraud prevention tools that can be used in this
PROPOSAL
2.6. Mitigation of the Risks associated with cybercrime
Cybercrime is a huge risk in Australia and therefore, identification of the appropriate risk
mitigation strategy is essential (Ajayi 2016). Recommendation of the major risk mitigation
strategies include taking appropriate measures in ensuring that any data associated with online
transaction is not hacked. Much attention is now paid in order to ensure that secure transactions
are executed in terms of ecommerce and related transactions (Asamoah-Okyere 2014). E-
commerce can be a tremendous boon for the business and can help and individual in improving
their ecommerce presence. It is therefore necessary to ensure that the data associated with the
ecommerce is securely transferred.
There are a number of strategies that can help in easier mitigation of the risks related to
ecommerce. The recommended strategies of mitigation of the risks in ecommerce are as follows-
1. From a business point of view, it is quite essential for the business organization to train
its staffs regarding the safe use of ecommerce and internet while dealing with an organizational
business.
2. From an individual’s perspective, maintaining the confidentiality of the information
that has been shared in an unsecure platform such an internet becomes essential. Use of
appropriate firewalls and antivirus is recommended so that the risks associated with an
ecommerce website can be mitigated (Tait 2015). It is quite essential for an individual to make
use of a secure website in case of payment processing so that the risks of the data loss can be
minimized.
3. Making use of fraud prevention tools are recommended in order to address the major
issues related to cybercrime. There are a number of fraud prevention tools that can be used in this
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 24
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





