Saturday, February 1, 2020

Research methods applied to the cyber crime like identity theft( use a Thesis

Research methods applied to the cyber crime like identity theft( use a proper name if you want) - Thesis Example Such developments has made communication a second’s task, where a large amount of data and information can be collected and used for a number of purposes easily. However, these developments can be seen as positive for human beings, but these can also be seen as a negative phenomenon. It is usually called as the â€Å"double edged sword†, where it has both bright and dark sides. Though computer and information technology has proved to be much useful for communication and business development, but it has also created new ways for doing illegal or criminal activities (Gordon, Hosmer, Siedsma, & Rebovich, 2003). A number of commercial websites are performing business activities online, or others using computers to gather and accumulate critical information in order to use it for business purposes. Such businesses have been nowadays facing the issues of misuse of information or other kinds of crimes with regard to the sensitive information. In order to combat these criminal and delinquent activities, they have to perform overwhelming, and expensive job of safeguarding their critical information, which can be used for delinquent actions. In these days, it is easier to do crime, as criminals are able to encode the data, which is showing some proofs against their delinquent actions, and also transfer such data regardless of having fear of being noticed from Police side or Law agencies. Such criminal activities has made it more complex to detect any corruption. As the internet has astonishing effects on this area, where it is being impossible to detect a person due to the fact that the crime can be held regardless of any geographical area. This situation has convoluted the enquiry of cybercrime to the greater extent (Gordon, Hosmer, Siedsma, & Rebovich, 2003). In this regard, there are a number of new studies and fields of a study are emerging, and among these a Cybercrime Science is such an evolving field of study targeting to thwart the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.