Preview

Related Literature and Studies on Cybercrime

Good Essays
Open Document
Open Document
635 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Related Literature and Studies on Cybercrime
CHAPTER II
Review of Related Literature

This chapter presents the different literature and studies that have direct bearing on the topic undertaken. LOCAL LITERATURE 1. What are the common cybercrimes in the Philippines? In the Philippines, 87% of Filipino Internet users have been victims of cybercrimes–DOJ, the primer quoted a 2010 report of the security software firm Symantec that as many as 87 percent of Filipino internet users (nearly nine out of 10) were identified as victims of crimes and malicious activities committed online. These included being victimized in activities such as malware (virus and Trojan) invasion; online or phishing scams; sexual predation; and services in social networking site like Facebook and Twitter (Avendaño,2013). The primer also noted that the first cybercrime case in the country was the controversial case involving Onel de Guzman who in 2000 released the “I Love You” virus (Avendaño,2013). Philippine Daily Inquirer

The Department of Justice categorizes computer crime (cybercrime) in three ways: 1. The computer as the target- attacking the computers (viruses). 2. The computer as a weapon- to commit (traditional crime). 3. The computer as an accessory- to store illegal or stolen information. www.cybercrime.gov

2. What are the effects of this cybercrime? According to Posadas(2013), what many of these little learners (and their parents) do not know, however is that they might be losing a portion of their privacy with each log-in or site visit, e-mail sent, downloaded application, or simply clicking a button. According to Jeff Gould of SafeGov.org, an international organization that helps the public sector make the right choice of the most transparent or ethical technology providers, spoke about the disturbing situation of data privacy not just locally but around the globe and the dangers of data mining.

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    For an individual to fully understand the difference between cybercrime and traditional crime, the individual needs to understand what cybercrime is. The definition of cybercrime is according to "Oxford Dictionaries" (2014), "crime conducted via the internet or some other computer network" (cybercrime). Cybercrime is committed by hackers with the goal of financial gain in min by stealing personal information(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are many different categories for cybercrime but the main four include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are charged on a state law level; however, there are plenty of federal laws that can be violated through committing cybercrime. The main difference that needs to be known is that when cybercrimes are committed, the crimes are done so from the luxury of a hacker 's house or place of business while traditionally crimes are not. Another difference worth noting is that cybercrime criminals have the ability to commit these crimes from different states, even internationally at some levels. When cybercrimes are committed liken that, it makes it hard to prosecute as the laws may vary from place to place. That is usually when federal laws are reviewed for a…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    “American consumers and businesses are the number one target of global cyber crime. For example, the Computer Security Institute and the FBI report that virus attacks have become a leading cause of financial loss by US companies, with businesses reporting an average of more than $160,000 for each security breach. According to the Internet Crime Complaint Center, the total dollar loss from all cases of Internet fraud referred to US law enforcement in 2007 was $239 million. The rapidly evolving world of global cyber crime--and what must be done about it--is described and illustrated with charts and anecdotes in the BSA report, The Fight for Cyber Space. Another recent BSA report, Online Software Scams: A Threat to Your Security describes the links between software piracy and cyber crimes such as identity theft.”(October is National Cyber Security Month, 2008)…

    • 635 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Internet is a system of interconnected networks able to continually amplify its range of sites surpassing its predecessor, the ARPANET (Advanced Research Projects Agency) which was developed by the American military in the 60’s (Abbate, 2000). It has progressed, with the social and economic aspect of its use becoming complex, with illegal activities reaching even the depths of cyberspace – “cybercrime” and the culprits, the “cybercriminals”, have appeared.…

    • 1677 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Social Media and Privacy

    • 1323 Words
    • 6 Pages

    Wright, Joss, and Tom Chatfield. "As Google Acts, the Question Is: Have We Lost Our Privacy to the Internet?" The Guardian. Guardian News and Media, 03 Mar. 2012. Web. 09 Sept. 2012.…

    • 1323 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Cybercrime Law

    • 3073 Words
    • 13 Pages

    Summary: We need law and order in cyberspace, but it must not be used to stifle freedom of expression and intimidate citizens.…

    • 3073 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Every Coin Has Two Sides

    • 360 Words
    • 2 Pages

    Reviewing the statistics of the internet crimes rate which hits records high especially during recent years, people have realized that internet is far more harmful than they expected. No one could deny that they had been the victims of the virus which can disseminate worldwide within minutes, as long as computer has internet access. Those evil virus fool around people’s computer in order to get high priority to access high confidential personal data such as photo, bank account, even password. Afterwards, hackers will sell those personal information to the fraudulent organizations. The fraudulent organizations often use online or telephone cheating which most time are untraceable. In the other word, internet, for being an accomplice, has promoted a number of internet scams and those criminals behind the internet have barely been caught. Most people had the experience that got a phone call which basically told them to remove all their money to a safety bank account since they were suspicious in money laundering. People might doubt “who are you?” and “Are you police?”, however, after those criminals told the exact personal information for example, home address, ID number, and credit history, 60% of people chose to trust them and sent money to the unknown account.…

    • 360 Words
    • 2 Pages
    Good Essays
  • Good Essays

    student

    • 317 Words
    • 2 Pages

    Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual.…

    • 317 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    addressing cybercrime

    • 3009 Words
    • 13 Pages

    Cybercrime goes beyond the technical, transnational dimension and involves offenders who deliberately fashion their attacks to exploit the potential weaknesses present in the infrastructure’s transnational nature. It threatens the substantial and growing reliance of commerce, governments, and the public upon the information infrastructure to conduct business, carry messages, and process information.…

    • 3009 Words
    • 13 Pages
    Powerful Essays