Verified Document

Cybercrime Modern Scam: A Summary Of The Article Review

Cybercrime Modern Scam:

A Summary of the Seven Most Threatening Scams of our Generation

Intended Audience

Cybercrime:

Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types: Mapping the Terrain of Cybercrime" by Amber Stabek, Paul Watters and Robert Layton at the Internet Commerce Security Laboratory, and will also describe the purpose of the study, its intended audience, and the various details given for the reader, as well as terms and references.

Purpose of the Study

The paper's abstract starts by stating that the threat of cybercrime is a growing danger in today's economy. This is a strong statement, and clarifies the purpose of the paper which the reader can assume is to prove how this is so and what one can do in order to understand this issue better. The paper continues by stating that cybercrime is quite complex, and that it affects many industries and businesses, as well as individuals. However, since cybercrime is such a complex crime (it includes laundering, trafficking and terrorism), these criminals will often target those who can either pay more, or those in the public eye, where they will have most impact.

The study further states that there are various classifications for cybercrime. In order to cement its purpose, it offers the cybercrime classification framework (CCF). The CCF is definitely one of the primary purposes of the paper, as the objective is "to determine a classification system that can be used by various parties to refer to similar types of scams in the international cybercrime." This is because of the fact that "inconsistencies in...

(2010). The Seven Scam Types: Mapping the Terrain of Cybercrime. 2010 Second Cybercrime and Trustworthy Computing Workshop/Internet Commerce Security Laboratory at the University of Ballarat. Retrieved October 7, 2011, from .]
In order to properly fulfill its purpose the paper accepts that it must utilize various scams to both render its classification useful, but also to further examine and refine its framework. For this reason, content analysis is based on 250 scam descriptions, stemming from over 35 scamming categories and over 80 static features. Thus, these can be classified into seven scam types and into four top scamming functions.

The motivation for this study is, as stated briefly above, both a lack of uniformity and a lack of consistency, according to the authors, in scam classification, that has prevented the successful resolution of some cases. The authors there show strong evidence and cite a variety of such cases, including from the Australian Bureau of Statistics, the Internet Crime Complaint Center, and the Environics Research Group, successfully achieving its objective of presenting a framework for this problem, for which more details will be given in the sections below.

Intended Audience

Due to both the purpose of the study and the highly technical terms utilized, one can assume that an intended audience for this is:

1) Students who are also studying and trying to enable the successful placement and…

Sources used in this document:
references, ranging from 1998 and 2010, so most of them are relatively recent. They are, furthermore, all topical, and among them there are some efforts to other studies, and the entities mentioned in the introductions above, i.e. The Australian Bureau of Statistic and the Australian Centre for Policing Research. However, authors also reference themselves, in A., Stabek, S., Brown, and P., Watters, "The case for a consistent cyberscam classification Framework," in First Cybercrime and Trustworthy Computing Workshop, 2009, further cements the authors' authority.

Conclusions

Cybercrime is certainly one of the most serious modern threats in today's world and the paper referenced throughout the paragraphs above only proves this, and does so in a very organized, well-documented way. Thus, by offering a clear strategy and organizational structure, "The Seven Scam Types: Mapping the Terrain of Cybercrime" by Amber Stabek, Paul Watters and Robert Layton at the Internet Commerce Security Laboratory successfully achieves its purpose of introducing a strategy in order to standardize scam incidents.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Online Dating and Identity
Words: 7046 Length: 23 Document Type: Research Paper

Online Dating Scams and Its Role in Identity Theft ONLINE DATING SCAMS AND IDENTITY THEFT The increased use of the Internet in modern communications has contributed to the emergence of cyberspace, which has become an alternative medium for developing and experiencing new relationships. The cyberspace is currently used for various purposes including communication and for developing creative romantic endeavors with less spatio-temporal restrictions. While online love platforms have proliferated and blossomed in

Offshore Financial Centres and Their
Words: 22477 Length: 60 Document Type: Dissertation

Because the home country is not required to reimburse foreign depositors for losses, there is no corresponding financial penalty for lax supervision; there is, though, a benefit to the country with lenient regulatory policies because of increased revenues generated and the employment opportunities these services provide (Edwards 1999). Furthermore, banks seeking to conduct multinational business are attracted to countries where incorporation laws and the regulatory framework offer less regulatory oversight

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now