SlideShare uma empresa Scribd logo
1 de 10
By Raphael May u3035761
Internet crime is
everywhere
• In the year ending of July 2010 more than 1.3
million people lost an average of $1,000 to
cyber crime (Thom, 2010). According to an
online survey carried out by Norton
Cybercrime report, 7 in 10 Australians have
been affected by Internet crime.
• Viruses and malware make
up 51 per cent of online
crime and phishing accounts
for nine per cent. Phishing
involves the theft of user
names password etc for
various accounts
Types of cyber crime
• Cyber Staking is made possible through
the massive increase in popularity of
social networking sites like Facebook
and MySpace. This year (2010)
Generation Y will outnumber baby
boomers and 96% of generation Y is a
member of at least one social network
site. Social media has recently overtake
porn as the number one activity on the
Internet
Types of cyber crime
• It can be argued that
Cyberterrorism is the most
dangerous form of Cyber Crime
as it has the intention of
causing physical harm to
people. Cyberterrorism can
take many different forms, but
usually involves the unsolicited
access to classified websites,
mainly Government sites, with
the goal of stealing classified
information or cause general
trouble for the website owner
and/or users.
Types of cyber crime
• Cyber scams can take the
form of banking and account
scams, chain letters and
pyramid scams, health and
medical scams, investment
scams, job and employment
scams and money transfer
scams. Of course Internet
scams are not just limited to
these. Bank related scams in
America almost doubled in
2009 costing $559.7 million.
Cyber crime and its social implications
• Cyber crime has many affects
on society and the way that
people take part in society
and even the way that they
spend their moneys. One of
the most obvious impacts of
Cyber Crime and all of its
forms is the financial issues
that it brings with it. This is
not only associated with
scams, or bank account fraud
it also goes hand in hand with
acts of Cyberterrorism as-well.
• Cyber Crime can also affect big business. Bidgoli
states that Cyber crime has the potential to
“disrupt plants, factories, distribution networks or
critical infrastructure and lessen economic
stability” (Bidgoli, pg 363. 2004). Stability is one
of the biggest determining factors of big business
success and growth because without it there is no
predictability in the market.
• when people are directly
or in-directly affected by
cyber crime it effects their
trust in participating in the
digital economy and
without this trust people
will cease to take part,
causing the death or at-
least the slowing down of
the digital economy as we
know it.
• For more details on cyber crime see full
report.

Mais conteúdo relacionado

Mais procurados

Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
The Gray Area: Article and News Examination towards Informed Decisions
The Gray Area: Article and News Examination towards Informed DecisionsThe Gray Area: Article and News Examination towards Informed Decisions
The Gray Area: Article and News Examination towards Informed DecisionsDamar Juniarto
 

Mais procurados (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Facebook
FacebookFacebook
Facebook
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report 2012 Data Breach Investigations Report
2012 Data Breach Investigations Report
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
The Gray Area: Article and News Examination towards Informed Decisions
The Gray Area: Article and News Examination towards Informed DecisionsThe Gray Area: Article and News Examination towards Informed Decisions
The Gray Area: Article and News Examination towards Informed Decisions
 
Stalking2
Stalking2Stalking2
Stalking2
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Semelhante a Comtechchange

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Marcio Kanamaru
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 

Semelhante a Comtechchange (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 

Comtechchange

  • 1. By Raphael May u3035761
  • 2. Internet crime is everywhere • In the year ending of July 2010 more than 1.3 million people lost an average of $1,000 to cyber crime (Thom, 2010). According to an online survey carried out by Norton Cybercrime report, 7 in 10 Australians have been affected by Internet crime.
  • 3. • Viruses and malware make up 51 per cent of online crime and phishing accounts for nine per cent. Phishing involves the theft of user names password etc for various accounts
  • 4. Types of cyber crime • Cyber Staking is made possible through the massive increase in popularity of social networking sites like Facebook and MySpace. This year (2010) Generation Y will outnumber baby boomers and 96% of generation Y is a member of at least one social network site. Social media has recently overtake porn as the number one activity on the Internet
  • 5. Types of cyber crime • It can be argued that Cyberterrorism is the most dangerous form of Cyber Crime as it has the intention of causing physical harm to people. Cyberterrorism can take many different forms, but usually involves the unsolicited access to classified websites, mainly Government sites, with the goal of stealing classified information or cause general trouble for the website owner and/or users.
  • 6. Types of cyber crime • Cyber scams can take the form of banking and account scams, chain letters and pyramid scams, health and medical scams, investment scams, job and employment scams and money transfer scams. Of course Internet scams are not just limited to these. Bank related scams in America almost doubled in 2009 costing $559.7 million.
  • 7. Cyber crime and its social implications • Cyber crime has many affects on society and the way that people take part in society and even the way that they spend their moneys. One of the most obvious impacts of Cyber Crime and all of its forms is the financial issues that it brings with it. This is not only associated with scams, or bank account fraud it also goes hand in hand with acts of Cyberterrorism as-well.
  • 8. • Cyber Crime can also affect big business. Bidgoli states that Cyber crime has the potential to “disrupt plants, factories, distribution networks or critical infrastructure and lessen economic stability” (Bidgoli, pg 363. 2004). Stability is one of the biggest determining factors of big business success and growth because without it there is no predictability in the market.
  • 9. • when people are directly or in-directly affected by cyber crime it effects their trust in participating in the digital economy and without this trust people will cease to take part, causing the death or at- least the slowing down of the digital economy as we know it.
  • 10. • For more details on cyber crime see full report.