Social Effects Of Cyber Crime

Decent Essays
Cyber crimes have become a much more common occurrence in the recent years. They are alike normal crimes in the fact they are intended to harm others, but are conducted through a computing device. Cyber crimes are having an ever-increasing impact on society. Cyber crimes cause financial losses, intellectual property theft, and consumer/customer distrust. In recent years, large corporations and businesses are targeted in attempts to steal valuable information. Cyber attacks account for an estimated $445 billion of annual losses each year. This is nearly 1 percent of the global GDP (Nakashima and Peterson). Despite this significant number, society still fails to successfully manage this risk.
Many programs and organizations exist to stop the illegal use and sale of narcotics. Narcotics account for 0.9 percent of the global depreciation of the GDP while cyber crimes are at 0.8 percent of that figure and growing (Lewis and Baker 11). As a result, cyber crimes are becoming a serious economic threat. According to a recent study, the internet economy generates $2 to $3 trillion and increases annually. At this rate, cyber crimes are set to deprecate this value by 15-20 percent in the upcoming years (Lewis and Baker 7). Not only is
…show more content…
From 2013-2015, approximately 3.5 billion accounts of personal information were compromised in the world due to “data security incidents” (Walker). That figure is nearly half of the world population. According to a survey conducted by Zach Walker, nearly 95 percent of respondents stated they would take legal action against the company responsible for their data loss. Further complicating matters for the company, nearly two-thirds stated they would not conduct business with the organization after losing their information (Walker). Losing trust in a corporation or business is detrimental to its’ growth and

Related Documents

  • Decent Essays

    The following case study is based on a company called Target, which experienced a security breach in 2013 (Aguilar, 2014). Hackers penetrated the Target’s system through their web server (Aguilar, 2014). The hack exposed 40 million credit card and debit card details such as CCV numbers, credit card numbers, etc. as a result, employees lost their jobs, and board members were threatened with retrenchment (Aguilar, 2014). After that 140 lawsuits followed (Aguilar, 2014).…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Odds are that in one’s lifetime a consumer will be a victim of a security breach at some point. Data breaches are on the rise, and businesses need to ensure that they have sufficient security defenses in place to protect their data. Data breaches can have both direct and indirect financial consequences for a business. After a breach, businesses must resolve the problem leading to the breach, deal with the repercussions and come up with ways to limit risks in the future. When a security breach occurs in a business, it can have many negative affects on the business, such as negative press, loss of consumer loyalty, diminished brand reputation and even lawsuits.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    ABSTRACT This research paper is based on cyber-terrorism. Cyber-terrorism is committed by terrorists who perform acts of violence to influence the behavior of those who have different opinions from their own, with the use of computer based systems. The US government has been targeted by various terrorist groups though cyber-attacks. The nature of organizations which employ the use of Data-Controlled Systems enables such threats to have a great impact on organizations.…

    • 951 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    White Collar Crime Paper

    • 1009 Words
    • 5 Pages

    For instance, in 2015, researchers estimated that 43 percent of the world population are using the Internet. A year later, the number increased from 43 percent to 47 percent (Taylor, 2016). The fact that more people are using the Internet, the more technocrimes, and other form of white-collar crimes would be committed. As it is stated on the text (Trusted Criminals), “Computers and other forms of modern technology play an increasingly central role in many white-collar crimes, and this role will surely expand in the future” (Friedrichs, 2010). With that say, certain form of white-collar crimes will continue to be increasing as world population getting to involve more on the…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target. Experts in cyber terrorism have pointed out that the potential harm posed by these threats may be exaggerated, but there is some disagreement. If it was to succeed, our outdated computer networks owned by the national government could be comprised.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Every day, we have seen technology advanced dramatically in the past years. Many of those advances include smart phones, smart TVs, computers, tables, watches, and so much more. We even have faster internet and network access. Many companies and civilians take advantages of such advancements by providing and selling “access” to several applications to watch movies and TV shows, listening and access music, and using a faster way to network with many people (both near and far) in social media. However, such advancements can be affected and misused.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    CI Principle I (threat awareness): “Continuously analyze the strategies and tools that cyber adversaries use.” Julisch (2013) argues that the adversaries’ strategies will change, and in response, firms’ maturity regarding the Principle I will be dependent upon the firms’ responsiveness to adapt accordingly.2. CI Principle II (preparedness): “Minimize your attack surface, i.e. the number of vulnerabilities that the threat can exploit.” Julisch (2013) provides several opportunities to apply this principle: assessing and managing ‘cyber footprint’, more restrictive spam filtering, the outright deletion of high-risk attachments, and identifying and blocking malicious Web pages and outgoing command and control channels. 3.…

    • 1505 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The field of law enforcement in America has seen numerous changes and challenges over the last century from the radio communications equipment, the advent of the automobile and their employment in patrol practices, to modern advanced smart phones that can employ combined technologies that can triangulate with near precision accuracy the location of gun fire and then notify an officer through an app on his or hers smart phone. The continuously changing security environment over the years since 9/11, combined with the acceleration of advancing technologies in both the physical and virtual domains, have already begun to change the dynamics of traditional law enforcement in American. Additionally, the threat environment, societal shifts and bending of cultural norms, incivility and unrest, combined with rising budget and resource constraints present large hurdles for many police departments to overcome in the future. Nevertheless, while the attacks of 9/11 exerted major social and political influences within America; they had a limited enduring influence…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays