Psychological Effects Of Cybercrime

Improved Essays
Introduction
Statement of the Problem
Cybercrime is a word used to portray criminal action involving computers or computer networks being used as an instrument, an objective, or a setting of unlawful acts and incorporate everything from electronic cracking to denial of service assaults. It is likewise used to describe conventional misdeeds where computers or networks are used to facilitate criminal activity. Cybercrime can involve computer viruses, cyberbullying, cyberstalking, identity theft, malware, and spam. The impacts of a solitary, effective cyberattack can have huge ramifications including economic costs, stolen intellectual property and loss of confidence and trust.
Criminals have been exploiting cyberspace even before the introduction of the personal computer (PC). Phone phreaking began in the late 1950s and hit its golden age in the late 1960s and early 1970s. In 1972, one infamous “phone phreak”, John Draper, also known as Captain Crunch, determined that he could trick AT&T's network with the tone from a
…show more content…
Whether an individual is directly or indirectly exposed to cybercrime, it has a psychological impact. Common psychological responses include stress, nervousness, fear, and/or distress. In addition, the feeling of security is crushed; therefore, victims feel insecure, vulnerable, and powerless and may feel outraged. They may also feel tense or become overly cautious, lose interest in online activities, and have heated outbursts. Other likely responses are isolation, hostility, and depression. Children who have experienced a cybercrime (e.g., cyberbullying) will have comparable responses to adults however they may also have other intense responses, for instance, bedwetting; stammering, or becoming clingy. Older children may have thoughts of revenge or suicide (Whitaker-Augustine,

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Phone phreaking as defined by TechTerms.com states “a slang term that describes the action of experimenting with or manipulating a telephone system, in order to make long-distance phone calls at a discounted rate or totally free.” (TechTerms.com) Kevin, again using only his ingenuity was able to seize control of Pacific Bell telephone company. It was this deed that got him recognition from the FBI. In 1993, after the heat from his phone phreaking scandal became too hot, Mitnick decided it was time to take his skills on the road.…

    • 689 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The working group was tasked with preparing a report identifying which laws were sufficient in investigating and prosecuting crimes conducted via the Internet. Moreover, emphasis was placed on the sale of weapons, illegal narcotics, pharmaceuticals, prescription drugs, fraud, and child pornography. Additionally, the working group was to investigate which new technologies, capabilities, and legal authorities were required to investigate and prosecute those individuals and groups that commit crimes using the Internet. Furthermore, the working group was to identify new and existing tools that could be used to educate, empower parents, teachers, to include public and private sector users to prevent or minimize risk posed by unlawful use of the Internet.…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Several of the statistics in the article address the growth in CyberFraud and thus the article is a strong examination of the crime and quite useful in validating my own research and would specify the likelihood of an individual being targeted by this…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Driverless Car Impact

    • 985 Words
    • 4 Pages

    ISU Part 1 Social Impact – Driverless Cars Driverless cars will change everything. (2016). Ft.com. Retrieved 2 December 2016, from https://www.ft.com/content/042a04f0-958c-11e6-a80e-bcd69f323a8b Page Deaton, J. & Hall-Geisler, K. (2016).…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Rapid decisions and speaking without thinking are just two of many examples of teenagers and their quick actions. When children are online, the computer screen acts like a wall between them and their friends. Since children are not face to face with a person, there is no emotional connection to one another, leaving each other vulnerable to an attack. According to PBS, one in three kids have been cyberbullied, yet only 30% of cyberbullying occurs on social media sites. However, 40% of cyberbullying occurs in online chatrooms (Common).…

    • 1067 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The foundation of computer crimes lies with The Computer Fraud and Abuse Act (CFAA) of 1986, 18 U.S.C. 1030. According to Easttom and Taylor (2011), the CFAA was a federal act which provided protection of computer systems that were part of a federal entity or financial-institution. Over time and through a series of congressional hearings, lawmakers have amended and tailored language in a manner to protect the government's interest in computer crimes while striking a balance with the ability of the states to mount their own initiative in a state's prosecution (Department of Justice, n.d.). Congress has continued to amend the CFAA just as cyber crimes continue to take advantage of the evolution of the computer and cyber communications.…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Case Study: Anonymous

    • 1979 Words
    • 8 Pages

    Case study: Anonymous While the motivation of terrorist acts remains the same, the rapid evolution of technique has provided to those that use terror as a method to attain their goals, new weapons with a potential that is not fully quantified. The database, the measures of protection and security, the equipments meant to reassure our safety are exposed to those new types of weapons, the traditional methods of fight becoming impractical. The cyber-crimes are a supplement for cyber-terrorism in what concerns the methods used although the motivations are different from each person. Many of these attacks are made either to produce anarchy, for amusement, to reaffirm the hacker?s position, or from a political motivation.…

    • 1979 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Why does cyberbully happen? Youngsters may consider it to be an approach to remain prevalent or by harming others influences them to feel capable. Children or teenagers who are less socially fruitful may spook since it causes them effectively manage their own self-assurance. They figure it will enable them to fit in with their associates. Namelessness enables spooks to abstain from confronting their casualties, so it requires less valor and gives the phony picture that harassers won't get got.…

    • 271 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the shifting landscape from criminal elements operating in the traditional physical world to the cyber domain, jurisdictional issues are sure to become a problem for police departments if they are not already. According to one group of researchers, criminals are committing crimes, such as identity theft, from home that previously required teams of people and intense coordination, thus, technology-enabled crime has arrived and will continue to develop (Treverton, Wollman, & Wilke, 2011). As the Internet has changed the way we interact, socialize, shop, and receive our news and politics, so has the criminal elements using it. With that, it is sure to become increasingly challenging for policing the cyber domain from a jurisdictional…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Today, the number of users communicating, make purchases, pay bills, conduct business and to consult with their doctors now exceeds 200 million. Computer criminals are as diverse as their crimes; it may be students, terrorists or organized crime figures. Computer criminals can sabotage computers economic advantage to beat your competitors or threaten to damage systems in order to commit extortion. Hackers manipulate data or operations, either directly or through so-called "worm" or "virus" that can completely paralyze systems or erase all data on the hard disk. In addition to the raids by the particular Web pages, criminals may open their own sites to defraud customers or sell forbidden goods and services such as weapons, drugs, nonprescription or regulation and pornography.…

    • 1419 Words
    • 6 Pages
    Improved Essays