Summary
The proliferation of computer-based technologies over the past half century has changed the world in fundamental ways. In sharp contrast to just a few decades ago, computer-based technologies have transformed the ways in which people live, work, recreate, shop and receive an education and current signs indicate that this digital transformation continues apace. These same trends, though, have also introduced countless new opportunities that can be exploited for illegal purposes by cyber criminals. The purpose of this paper is to examine the rising threat of cybercrimes and the increased use of technology in modern society to show how these types of crimes will continue to increase in frequency, scope and severity in the future unless appropriate, integrated security precautions are taken today. The research will show that although the precise costs of cybercrimes remain unclear, some estimates place these costs as high as $1 trillion annually, and these estimates may not be including all of the costs that are associated with cybercrimes at present. Finally, following the review of the relevant literature, a summary of the research and key findings concerning the foregoing issues are presented in the papers conclusion.
Cybercrimes and the Increased Use of Technology in Society
Today, some of the most serious crimes were not even illegal a few years ago because they involve computer-based technologies that did not exist. The situation at present, however, is characterized by the proliferation of a bewildering array of computer-based technologies in virtually every aspect of modern human life. Moreover, current trends indicate that this ubiquity will continue to increase well into the foreseeable future. Against this backdrop, it is not surprising that nefarious actors are also exploiting these trends by engaging in various cybercriminal activities that defy easy detection and prevention. The purpose of this paper is to provide a review of the relevant literature concerning cybercrimes and the increased use of technology in modern society to demonstrate that these types of crimes will continue to increase in frequency, scope and severity unless and until substantive actions are taken at the international level to combat cybercrimes. Following this review, a summary of the research and important findings concerning the current state of knowledge about cybercrimes and the increased use of technology in society are presented in the conclusion.
Review and Discussion
The world has become an increasingly interconnected place where computers facilitate global communications in ways that were unimaginable just a few years ago (Sarre, Lau & Chang, 2018). Indeed, the emergence of the so-called Internet of Things has made it possible for cybercriminals to gain access to consumers homes and even their kitchen appliances. In this regard, Stalans and Finn (2018) report that, The permeating presence of information technology and cyberspace in the connection of things such as cars, phones, home security, and home temperature controls and its role as critical infrastructure for societal institutions highlights the potential serious harmful effects of cybercrime (p. 501).
Further, a veritable cornucopia of Internet-enabled digital devices has transformed the manner in which people socialize, recreate, shop, keep informed about important events in their lives, earn a living and receive an education (Bossler & Berenblum, 2019). In addition, governments and business of all sizes and types have applied computer-based applications to many aspects of their operations to the point where they are absolutely mission critical. In sum, the world has become a highly interconnected place where digital technologies make modern civilization possible.
While these innovations in computer-based technologies have fundamentally changed the world for the better, there is a corresponding downside to these trends in the form of increased opportunities for cybercriminal activities. In this regard, Bossler and Berenblum...
…some far more sinister outcomes that are possible as well given the current trajectory of cybercrime trends. The potential for state-sponsored and non-state actors attacks the nations critical infrastructure has intensified in recent years, and the fact that the United States and its allies have not suffered another 9/11-level attack to date should not lull anyone into a false sense of security because there are untold numbers of nefarious actors on the global stage, just waiting for the perfect chance to attack yet again.Conclusion
Even as the world struggles to cope with an ongoing Covid-19 pandemic and economic downturn, cybercriminals of all ilk are masterminding new ways to defeat existing security measures in ways that harm their victims. The research was consistent in showing that virtually anyone can be victimized by cybercrimes, but businesses and governments represents the most lucrative targets, especially for state-sponsored actors that seek to leverage asymmetrical cyber warfare tactics to gain an advantage over countries such as the United States and its Western allies. The studies reviewed were also consistent in stressing the need for a coordinated, multinational response to the growing threat of cybercrimes, but there was also a general consensus that forging and maintaining viable security relationships with other countries and private sector actors was a daunting enterprise that demands additional scholarship. Like traditional crime, cybercrime will never be actually solved, so security specialists, software engineers and national lawmakers must remain vigilant to discover new types of cyber threats as well as novel uses of existing cybercrime strategies for the foreseeable future. In the final analysis, it is reasonable to conclude that security specialists a century ago could not conceptualize the types of cyber threats that are increasingly commonplace today, so it is also likely that an even greater threat will emerge in the future tht…
References
Bossler, A.M. & Berenblum, T. (2019). Introduction: New directions in cybercrime research. Journal of Crime and Justice, 42(5), 495-499.
Cavelty, M.D. & Wenger, A. (2020). Cybersecurity meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5-32.
Harkin, D., Whelan, C. & Chang, L. (2018). The challenges facing specialist police cybercrime units: An empirical analysis. Police Practice and Research, 19(6), 519-536.
Kalkman, J.P. & Wieskamp, L. (2019). Cyber intelligence networks: A typology. The International Journal of Intelligence, Security and Public Affairs, 21(1), 4-24.
Kranenbarg, M.W., Holt, T.J. & Gelder, J. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only, and the victimization-offending overlap. Deviant Behavior, 40(1), 40-55.
Leukfeldt, E.R. & Yar, M. (2014). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.
Sarre, R., Lau, L.Y. & Chang, L.Y.C. (2018). Responding to cybercrime: Current trends. Police Practice and Research: An International Journal, 19(6), 515-518.
Stalans, L.J. & Finn, M.A. (2016). Understanding how the internet facilitates crime and deviance. Victims and Offenders: An International Journal of Evidence-based Research, Policy, and Practice. 11(4), 501-508.
Weber, V. (2018). Linking cyber strategy with grand strategy: The case of United States. Journal of Cyber Policy, 3(2), 236-257.
Wu, Y., Xiang, D., Gao, J. & Wu, Y. (2019). Research on investigation and evidence collection of cybercrime cases. IOP Conference Series: Journal of Physics, Series 1176.
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now