Cybercrime and International Organizations Term Paper

Cybercrime and International Organizations
A review of a study on the definition and scope of cybercrime based on perceptions and experiences of law enforcement officials in the UK.
# 149456 | 2,205 words | 63 sources | APA | 2011 | PK
Published on Dec 18, 2011 in Computer and Technology (Internet) , Business (General) , Criminology (General)


$19.95 Buy and instantly download this paper now

Description:

The paper discusses how the lack of a precise definition of cybercrime, as well as the lack of trained personnel, has made investigations regarding cybercrime difficult. The paper asserts that once cybercrime is categorized and defined, improvements can be made in training law enforcement personnel. The paper then examines a research study on law enforcement personnel in UK that aimed to obtain a definition of cybercrime. The paper addresses the significance of the study, the appropriateness of the research design, the research questions and the limitations and delimitations of the study.

Outline:
Introduction
Background of the Problem
Statement of the Problem
Purpose of the Study
Significance of Study
Proposed Research Design Appropriateness
Research Questions
Limitations and Delimitations

From the Paper:

"Cybercrime originated at a time prior to Microsoft Windows, the Internet, or the personal computer (PC) (Thomas, 2008, pp 11-19). The first recorded incident of cybercrime occurred in 1964 when a Massachusetts Institute of Technology (MIT) student used an MIT computer to mimic the tones necessary to access the long distance phone service (Thomas, 2008). Since 1964, crimes committed over the Internet have become more sophisticated and entail the perpetrator taking bigger risks to commit the crime. In 1978, the Bulletin Board System (BBS) was established (Thomas, 2008, pp 121-190). The system, using a modem and telephone, allowed computers throughout the world to talk to each other. As the BBS grew, so did the number of computer gurus and computer hackers (Thomas, 2008, pp 21-60).
"In the early 1990s, in the early stages of Internet use, when Win3.X was the primary operating system of personal computers, the user needed to configure the settings in a text editor, using computer jargon (Thomas, 2008, pp 121-190). To access the Internet a certain amount of hacking and programming was necessary (Thomas, 2008, pp 121-190), which resulted in the true beginnings of cybercrime. Soon afterward, unauthorized access, denial of service attacks (DoS), cyberterrorism, cyberstalking, identity theft, and phishing came into existence. The number of reported cybercrimes has continued to increase. In 2007, more than 90,000 of the 206,884 Internet crimes were referred to law enforcement agencies across the UK (IC3, 2008). Two thousand and seven also saw a $40 million increase in financial losses from the prior year (IC3, 2008)."

Sample of Sources Used:

  • Aronson, J. (1994). A pragmatic view of thematic analysis. The Qualitative Report, 2(1). Retrieved August 6, 2009, from, www.nova.edu/ssss/QR/BackIssues?QR2-1/arson.html
  • Babu, M., & Parishat, M. (2004). What is cybercrime? Retrieved December 27, 2007, from http://www.crime-research.org/analytics/702/
  • Bineham, G. (2003). Qualitative research. Retrieved July 15, 2010, from http://www.thh.nhs.uk/documents/_Departments/Research/InfoSheets/15_qualitat ive_research.pdf
  • Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina. Communications of the ACM, 49(2), 81-83.
  • Boetig, B. (2006). The routine activity theory. A model for addressing specific crime issues. FBI Law Enforcement Bulletin, 75(6), 12-19.

Cite this Term Paper:

APA Format

Cybercrime and International Organizations (2011, December 18) Retrieved May 10, 2021, from https://www.academon.com/term-paper/cybercrime-and-international-organizations-149456/

MLA Format

"Cybercrime and International Organizations" 18 December 2011. Web. 10 May. 2021. <https://www.academon.com/term-paper/cybercrime-and-international-organizations-149456/>

Comments