Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

a

vi
ed
ar
Final Project Part Two

sh
as
w
m e
co rc
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Issue
 Origin
 Cybercrimes date back to the 1970s. Back then, hackers targeted

a
computerized phones. They used codes that helped them

vi
impersonate operators and find critical information and steal

ed
telephone time. The worst crime of that era came when a worm

ar
virus damaged more than six thousand computers and resulted in the

sh
loss of millions of dollars.

as
w
m e
co rc
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Issue (cont.)
 Impact
 Due to advancements in technology, hackers and cybercriminals

a
vi
have developed sophisticated malware that they apply in conducting
cybercrimes. Some widespread cybercrimes include fraudulent

ed
attempts to obtain sensitive data such as passwords or social

ar
security numbers in order to gain access to a victim’s accounts.

sh
These crimes may happen via sent emails, messages, and other

as
social networks such as Facebook (Ghosh, 2010). The impacts of a

w
single, successful cyber attack can have far-reaching implications

m e
including financial losses, theft of intellectual property, and loss of
co rc
consumer confidence and trust. The overall monetary impact of
o. sou
cyber crime on society and government is estimated to be billions of
dollars a year (Rahaman, 2017).
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Self
 Perception
 Computer Technologies growing rapidly has become an

a
indispensable part of modern life. While making social life easier,

vi
the changes that technology has brought also bring forth some

ed
security issues. Thus, it is easier to commit crimes and we are faced

ar
with cyber-crimes (Solak & Topaloglu, 2015). Conversely,

sh
cybersecurity and cyber awareness is high, with informative
advertisements and services like LifeLock.

as
w
m e
co rc
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Self (cont.)
 Profession
 In my personal and professional life, I am more aware and therefore

a
guarded to spying threats and the danger of my identity being

vi
copied and utilized by other individuals. Due to artificial

ed
intelligence, the culture created within my profession changed due

ar
to the integration of robots and artificial intelligence. Therefore, due

sh
to the combination of robots and artificial intelligence in my career,
I am left with duties that cannot be performed by robotics.

as
Eventually, I get forced to seek new knowledge and techniques that

w
cannot be used by robots or technology to remain relevant in the job

m e
market.
co rc
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Society
 Interact
 Cybercrime can get portrayed as an individual and social problem.

a
When cybercrime or cybersecurity is presented as a standard issue

vi
to get solved by society, it is challenging for policymakers and

ed
politicians. The reason is that the policymakers and politicians get

ar
left with nothing to achieve by talking about cybercrime. The

sh
impacts of the cybersecurity are mostly invisible to society.
Politicians accept that cybercrime is significant and portray it as a

as
technological problem that should get solved. Further, the attacks

w
remind society of the need to enact fundamental protective

m e
strategies on tablets, desktops, phones, and laptops.
co rc
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Society (cont.)

 Strategy

a
vi
 Technology is a big part of society, and can be perceived as both

ed
positive and negative. Cybersecurity and cybercrime are a field that

ar
is often highlighted in situations where there are technology and a

sh
possible data breach. The cybersecurity field is directly correlated
with cybercrime since its primary purpose is to defend the

as
computerized systems and network from malicious attacks.

w
According to Yar & Steinmetz (2019), extensive and sustained

m e
social cybercrime education campaigns are essential for raising
co rc
social awareness of the dangers and the effects of cyber activities.
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Conclusion
 Challenge
 Through the four academic lenses, cybercrimes are clearly a

a
vi
significant socioeconomic issue. The historical lens is focused on
earlier evidence of cybercrime development to help understand the

ed
current issue in society. It also focused on the humanities lens and

ar
how cybercrimes affect societies' and individuals' relationships. The

sh
natural and applied science lens evaluated how cybercrimes relate to

as
the physical world. The lens of social science evaluated how

w
cybercrimes have affected the social relationship among internet

m e
users. Governments and other stakeholders should come together to
co rc
create awareness of cyber-attacks and develop averting strategy.
o. sou
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Conclusion (cont.)
 Value
 Cybersecurity is a broad field that can be approached from different

a
vi
perspectives, and entails different unique aspects. There are also
other phenomena, such as adversarial behavior and environment

ed
evolution. The nature of the cybersecurity field, which mainly

ar
involves fighting cybercrimes through a preventive measure,

sh
borrows scientific knowledge extensively. Through natural and

as
applied sciences, practical applications are safely developed.

w
Criminology is a social science, and it relates to cybersecurity since

m e
it focuses on legal reforms. Moreover, the use of social sciences
co rc
provides a unique perspective of the issues; therefore, powerful
o. sou
counteractions are employed.
re
dy

This study source was downloaded by 100000804749361 from CourseHero.com on 05-29-2021 14:35:12 GMT -05:00
Powered by TCPDF (www.tcpdf.org)

You might also like