Cyber Crime Online Predators Essay

2467 words - 10 pages

Running Head: Cyber Crime- Online Predators 1

Cyber Crime
A Study of Online Predators
Amber Ellis
Ivy Tech Community College

CRIM 101
David De La Cruz
December 4, 2012

Running Head: Cyber Crime- Online Predators 2
I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed ...view middle of the document...

These include attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, internet auction fraud, the penetration of online financial services, as well as the deployment of viruses, Botnets, and various email scams such as phishing.( INTERPOL 2012) The global nature of the Internet a
Running Head: Cyber Crime- Online Predators 3
allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Here are a few examples of the types of Cybercrime:
I. Financial Claims:
• This would include cheating, credit card frauds, money laundering etc.
II. Cyber Pornography:
• This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.)
III. Sale of illegal articles:
 • This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications.
IV. Online gambling:
• There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.
In the past, cybercrime has been committed by individuals or small groups of individuals. However, we are now seeing an emerging trend with traditional organized crime syndicates and
Running Head: Cyber Crime- Online Predators 4
criminally minded technology professionals working together and pooling their resources and expertise. This approach has been very effective for the criminals involved. In 2007 and 2008 the cost of cybercrime worldwide was estimated at approximately USD 8 billion. As for corporate cyber espionage, cyber criminals have stolen intellectual property from businesses worldwide worth up to USD 1 trillion. Even more distressing and difficult to combat is the fact that some in the media portray the computer criminal as a modern day Robin Hood. Nothing could be further from the truth. ( cybercitizenship.org) Many smaller businesses find themselves vulnerable to cyber thieves, mainly because they have limited budgets for Web security and few or no technology experts on staff. "Small businesses feel like they're immune from cybercrime, and they're wrong. They are absolutely on the list of potential targets of cybercriminals," said Larry Ponemon, chairman of the Ponemon Institute, a privacy think tank in Traverse City, Mich. The average U.S. data breach cost companies $194 per compromised record last year, he added. About 72% of the 855 data...

Other Papers Like Cyber Crime- Online Predators

Comm/156 Research Essay

838 words - 4 pages criminals online. The newest form of cyber crime was during this holiday season on Black Friday after Thanksgiving. NBC news reported that Target said Thursday that the credit and debit card information of as many as 40 million customers was compromised over three weeks of the holiday shopping season — one of the largest breaches ever of American consumer data. This sent the United State into a panic as we never

Computer Crimes Essay

1006 words - 5 pages around her neck and was beaten and terrified. Her biggest challenge would be to find a way to get over what had happened. (Allman, Toney. ©2007) He was like many other predators. No one has guessed what he was really like until it was too late. There are six strategies to help decrease the rate of computer crimes: making the crime less likely to occur, increasing the difficulty of successfully committing the fraud, improve detection methods

Cyber Security: Cyber Terrorism

1810 words - 8 pages terrorism will be vital. Such a situation will make it is easier for anti-cyber terrorism authorities to develop effective applications that could detect cyber terrorism. For example, the decision to set up a cyber space security apparatus by former president Bush was ambiguous. This is because such an office could not be effective towards cyber terrorism because it had other duties such as fighting other forms of cyber crime. The indication here is

Cyber Security And Its Challenges To Society

3707 words - 15 pages a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber-crime and there are laws that prevent people from illegal downloading. Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages

Computer Crime

1301 words - 6 pages researchers and 25 support staff – total 55 Cyber crime research Research questions • • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles

Cyberpest

3043 words - 13 pages , Security & Law, 4(4). Kraft, E. M., & Jinchang, W. (2009). Effectiveness of Cyber bullying Prevention Strategies: A Study on Students' Perspectives. International Journal of Cyber Criminology, 3(2). Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2010). Policing possession of child pornography online: investigating the training and resources dedicated to the investigation of cyber crime. International Journal of Police Science & Management, 12(4). Mishna, F. F., Saini, M. M., & Solomon, S. S. (2009). Ongoing and online: Children and youth's perceptions of cyber bullying. Children and Youth Services Review, 31(12).

Trends in Cybercrime-"Sextortion" in Teens and Children

2188 words - 9 pages ” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the

Cyber Bullying

1314 words - 6 pages According to the National Crime Prevention Council, cyber bullying is a problem that affects almost half of all American teens. In a September 2004 survey of 1,500 students between grades 4-8 by iSafe.org it was reported that 42 percent of kids said they have been bullied while online. One in four have had it happen more than once. 35% of kids have been threatened online. Nearly one in five have had it happen more than once. 21% of kids have

Th Importance of Deleting Cyber-Bullying

723 words - 3 pages becoming more sophisticated, allowing us immediate access to information, which could greatly benefit our lives, it could also potentially provide individuals with the means to exploit personal information, commit cyber-crimes, or even inflict injury to others. One type of cyber-crime in particular is Cyber-bullying. Fact is, that an overwhelming majority of teenagers believe that this type of bullying is a joke, not realizing the devastating

Week 3 Paper

902 words - 4 pages User: How to Prevent a Cyber Attack (2009) and other sources Cyber Attack: What It Is A cyber attack is “an attempt to undermine or compromise the function of a computer-based system, or an attempt to track the online movements of individuals without their permission” (WiseGeek, 2011). The easier way to describe a cyber attack would be the targeting something electronic to make it malfunction so that someone is able to

Cyberbullying

1473 words - 6 pages percent of adolescents have visited a web site that allows student-bashing. Girls are also twice as likely to be victims. Coolidge 3 There are many steps parents can take to prevent cyber-bullying. According to www.cyberbullying.us parents need to establish that when interacting with a person online is the same as interacting with someone in person or over the phone. Also parents have to make sure that their school has a Internet safety

Related Essays

Disadvantages Of Internet Essay

2042 words - 9 pages the coin. The Internet is dangerous despite being beneficial to the people. People of all age can surf the Internet regardless of their gender, age, or races. Hence, the Internet can be dangerous towards the unawared children and adults. The Internet can be dangerous because people can encounter sexual online predators and lose social interaction skills. Besides these, cyber-bullying occurs and one’s reputation may be compromised. In addition

Letter To The Editor Essay

642 words - 3 pages affects the daily’s lives of our youth which can eventually lead to suicide. Cyber bullying can be defined as any communication posted or sent by a minor online, by instant messenger, e-mail, website, diary site, online profile, interactive game, handheld device, cell phone or other interactive device that is intended to frighten, embarrass, harass or otherwise target another minor. Even though America needs to take affirmative action in the

Cyber Crime Team Essay

1543 words - 7 pages activity and seek financial gain. (fbi.gov)” Combating Cyber-Crime To improve the global fight against cyber-crime, law enforcement officers should be trained rigorously and continued training should be implemented. Because new computer and high-technology crimes arise frequently, they need to be trained and educated on what is going on and ways to combat it. To enforce substantive laws that apply to online conduct effectively, law

Cyber Crime In The World Essay

1824 words - 8 pages came up with intellectual property as a means to cover these intangibles. Snow (2011) the Assistant Director, Cyber Division Federal Bureau of Investigation (FBI) stated, “Cyber threats affect every single one of us in some shape or form”. Cyber crime is not just the typical hacker trying to put a virus on your computer or steal your personal information. but also Ccomputers are also being used by sexual predators to locate possible victims