Discuss the Different types of computer behaviours and topologies, Comparison of the similarities between different types of computer criminal behaviour and topologies and Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies?
According to Gostev (2012), the development of digital technologies represents an opportunity for any business to provide new tools for communication. The online activities become central to the way people live. However, this internet represents opportunities to cyber criminals. Computer crime is an act that is performed by the computer user, sometimes referred to as hacker that browses the company’s private information illegally (Greenbaum, 2015). Additionally, computer crime includes the crimes that are to be conducted using internet such as hate crimes, online fraud, thefts of bank account details; these are considered to be computer or cyber crimes when these illegal activities are to be dedicated through the use of computer (Walker-Osborn & McLeod, 2015).
According to Prasanthi (2015), at a basic level, the types of computer behaviour are divided into the following categories, but there is no such universally accepted typology of the Internet crimes.
Online Assault: It involves the violence that is raised through internet such as the threats that results in emotional response on the victim. The online assaults are of different types such as cyber bullying, online sexual exploitation of children etc. Cyber bullying occurs when the minors use the internet devices to tease as well as harass other minors (Henson, Reyns & Fisher, 2011). The online sexual exploitation occurs when a child by using internet; establish some online relationships with other children. Social networking sites are the place for the offender to make such type of crime (Patel, 2012).
Online Fraud: It uses the online sites in an effort to profit financially. Such types of online fraud are sale fraud, inheritance scams as well as phishing etc. In sale fraud, the selling of products on the online sites is misrepresented by the seller of the products (Walker-Osborne & Price, 2011). Therefore, after the payment of the products, they never delivered those products to the buyer (Keen, 2011). Such that in inheritance scams, a criminal contacted the victim and told that they win some lottery online of a large amount (Al-Agaga, 2012). Then the victim is being instructed to pay an amount to initiate the process to deliver the money. In phishing, the criminal poses as lawful business includes credit card Company, online retailer to convince the victim to give the information related to password; bank details (Sood & Enbody, 2011). Sometimes, it also involves spoofed emails to do the fraud. Such schemes are used to take the personal information of the victim to profit financially by withdrawing funds from the account of that victim (Holt, 2014).
Cyber extortion: It occurs when a website as well as computer system is endangered with repeated denial of service by the malicious hackers. These hackers claim for money in return of promise to stop the attacks and promise to offer protection (Barn, 2012)
Online theft: It is mainly used to steal the information as well as money from the owner. This type of crime often involves the misuse of the victim’s personal information for the purpose of committing theft (Vijaya Geeta, 2011). It consists of online piracy to share intellectual property by using the Internet; the problem of piracy is being compounded by peer-to-peer contribution of files throughout which the resources can be distributed illegally (Edwards, 2014).
Online Intrusion: It involves the use of internet to infect the space of other individual, computer systems (Takieddine & Sun, 2015). It is the act that an individual attempt to surpass a computer system’s safety measures is referred to as hacking. Viruses are designed to spread throughout the whole computer to reduce the efficiency of the system (Raiu, 2012).
The similarities between different types of computer criminal behaviour and topologies are that all the computer crime is being unauthorized access to computer systems or any networks (Caldwell, 2013). Most of the crime includes the stealing of information stored in the computer hard disks or detachable storage media. Normally, this kind of theft is done by getting hold of access of the login id as well as password of the victim (Cornford, 2011). This is one of the reported cases of cyber crime in all over the world. The crime is done against any organization, individuals, individual property (Nuredini, 2014). The offenders focus on the financial gain such as the use of phishing emails to gain access to details of the bank account. At the time of investigating the threat, the law enforcement is challenged while tracing the actions to the source (Barmaki, 2012). In some instances, technological devices are served as repositories for evidence of the cybercrime. All these cyber crimes would be harmful for the organization in the area of financial property as well as transfer of data within the organizations (Bednar, Katos & Hennell, 2014).
Mostly, computer crimes focus on the financial gain but in case of child exploitation, the motive is not always profit. The motive may include intellectual curiosity or challenge, revenge, gaining some respect in online communities etc. The difference between a cyber attacks to commit crime as well as commit terror is found in the intension of the attacker (Mitchell & Chen, 2014). Online frauds as well as online theft are different from each other. Fraud is a lie, if someone allows believing something that is not true and the victim are being fraud. Theft is losing of money from computer crime.
Financial frauds as well as identify theft are conducted by the hackers to evolve into serious threats to the financial services industry and any organization (Vadza, 2011). According to computer crime and security survey, these two are the world’s most cyber crime threat. Most of the organizations are benefited from understanding the different computer criminal behaviour and topologies (Farrington & Ttofi, 2014). From there understanding, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that there is no chance of suffering any data loss in case of hacking (Hörnle, 2012). The company should avoid sending the credit card number to any site that is not safe. The organization must use the latest as well as updated antivirus to prevent their computer’s data against the virus attacks; and use a security programme to give control over cookies (Patel, 2012). An organization should ensure a security awareness that prevent the attack and make the attackers think twice before committing any cyber crime (Hua & Haughton, 2012).
Psychological screening is an extreme step that should be done before the hiring of employees in an organization (Sahu, Maheshwari & Sahu, 2015). Most of the organizations are benefited by the further research in psychological profiling of the hackers (Kumar & Mittal, 2012). Therefore, modelling behaviour can be assisted and it is predictive in nature; providing a criminal justice system as well as information technology industry to prevent the unauthorized use of data (Payne & Hollin, 2014). Although, various qualitative data exist to build the profile of the individuals that may fit the psychological model of the cyber crime (McIntyre, 2014).
Conclusion
The advancement of technology such as Internet provides both the individuals as well as organizations with a mean to commit crimes; therefore millions of people are affected by online crime every day. The computer crime is becoming one of the most threatening crimes for both law enforcement as well as the public. These crimes are hate crimes, internet fraud, thefts of credit card account, and telemarketing fraud, these are measured to be computer or cyber crimes when the illegal actions are to be committed throughout using of both computer and internet. Online assault is the crime that involves the crime of harassment, threats of violence etc. Online fraud or theft is the use of dishonesty as well as violate of confidence online to profit financially. Online intrusion involves using of Internet to damage other individual’s computer programs. Therefore, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that the individual may not suffer from any data loss in case of hacking.
Reference List
Al-Agaga, A. (2012). FACTORS THAT INFLUENCE E-LOYALTY OF INTERNET BANKING USERS. Ijecs, 3(2), 297-304. doi:10.7903/ijecs.1097
Barmaki, R. (2012). Book Review: Computer Crime, Investigation, and the Law. Criminal Justice Review, 37(1), 132-133. doi:10.1177/0734016811405286
Barn, D. (2012). Insuring cyber-assets. Computer Fraud & Security, 2012(9), 5-8. doi:10.1016/s1361-3723(12)70090-8
Bednar, P., Katos, V., & Hennell, C. (2014). On the complexity of collaborative cyber crime investigations. DEESLR, 6(0). doi:10.14296/deeslr.v6i0.1894
Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5-10. doi:10.1016/s1361-3723(13)70062-9
Cornford, A. (2011). Criminalising Anti-Social Behaviour. Criminal Law, Philosophy, 6(1), 1-19. doi:10.1007/s11572-011-9134-9
Edwards, C. (2014). Ending identity theft and cyber crime. Biometric Technology Today, 2014(2), 9-11. doi:10.1016/s0969-4765(14)70033-5
Farrington, D., & Ttofi, M. (2014). Criminal careers in self-reports compared with official records. Criminal Behaviour And Mental Health, 24(4), 225-228. doi:10.1002/cbm.1932
Gostev, A. (2012). Cyber-threat evolution: the year ahead. Computer Fraud & Security, 2012(3), 9-12. doi:10.1016/s1361-3723(12)70052-0
Greenbaum, D. (2015). Cyber crime 2.0. Science, 348(6231), 193-193. doi:10.1126/science.aaa7298
Henson, B., Reyns, B., & Fisher, B. (2011). Crime and Criminal Behavior. Retrieved 12 July 2015, from
Holt, T. (2014). Cyber war will not take place, by Thomas Rid. Global Crime, 15(1-2), 206-208. doi:10.1080/17440572.2014.884235
Hörnle, T. (2012). Criminalizing Behaviour to Protect Human Dignity. Criminal Law, Philosophy, 6(3), 307-325. doi:10.1007/s11572-012-9177-6
Hua, G., & Haughton, D. (2012). A network analysis of an online expertise sharing community. Soc. Netw. Anal. Min., 2(4), 291-303. doi:10.1007/s13278-012-0047-y
Keen, A. (2011). Tracking online fraud across the globe. New Scientist, 211(2831), 62. doi:10.1016/s0262-4079(11)62358-0
Kumar, P., & Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal Of Technoethics, 3(1), 43-52. doi:10.4018/jte.2012010104
McIntyre, L. (2014). Cyber-Takings: The War on Crime Moves into the Cloud. Pittsburgh Journal Of Technology Law And Policy, 14(2). doi:10.5195/tlp.2014.148
Mitchell, R., & Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. CSUR, 46(4), 1-29. doi:10.1145/2542049
Nuredini, A. (2014). CHALLENGES IN COMBATING THE CYBER CRIME. Mediterranean Journal Of Social Sciences. doi:10.5901/mjss.2014.v5n19p592
Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), 28-30. doi:10.15373/22778160/january2014/11
Payne, K., & Hollin, C. (2014). Alexithymia, Asperger’s syndrome and criminal behaviour: a review. Journal Of Criminal Psychology, 4(2), 155-162. doi:10.1108/jcp-11-2013-0030
Prasanthi, M. (2015). Cyber Crime: Prevention & Detection. International Journal Of Advanced Research In Computer And Communication Engineering, 45-48. doi:10.17148/ijarcce.2015.4311
Raiu, C. (2012). Cyber-threat evolution: the past year. Computer Fraud & Security, 2012(3), 5-8. doi:10.1016/s1361-3723(12)70051-9
Sahu, B., Maheshwari, D., & Sahu, N. (2015). Simulation Model for Cyber Crime Reduction. International Journal Of Computer Applications, 115(21), 20-22. doi:10.5120/20275-2693
Sood, A., & Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud & Security, 2011(7), 11-16. doi:10.1016/s1361-3723(11)70073-2
Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research And Applications. doi:10.1016/j.elerap.2015.06.001
Vadza, K. (2011). Cyber Crime & its Categories. IJAR, 3(5), 130-133. doi:10.15373/2249555x/may2013/39
Vijaya Geeta, D. (2011). Online identity theft – an Indian perspective. Journal Of Financial Crime, 18(3), 235-246. doi:10.1108/13590791111147451
Walker-Osborn, C., & McLeod, B. (2015). Getting Tough on Cyber Crime. ITNOW, 57(2), 32-33. doi:10.1093/itnow/bwv042
Walker-Osborne, C., & Price, J. (2011). The War on Cyber Crime. ITNOW, 53(6), 30-31. doi:10.1093/itnow/bwr061
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download