Topic > Cybercrime and Internet influences - 1396

IntroductionHistory allows us to understand that criminals have always existed. The only variable in their existence is time, which inevitably subjects them to initiating changes in their methodology, unique to each generation. Our generation exists in a fallacy where the application of information communication technology, proliferated by the Internet, has become an integral part of our daily lives. The Internet influences the way we live, work and play as part of our daily routine. It is this unavoidable dilemma that has provided criminals with a new frontier for their activities; one in which they can operate with absolute stealth and the cunning of a fox. This is the age of cybercriminals, individuals who specialize in stealing people's identities and personal information by hacking into their computers or Internet-based accounts. Their rise has presented security challenges for both the public and private sectors, but especially for the public under government, which is ultimately tasked with protecting every single citizen. With the government admitting to a severe shortage of cyber professionals everywhere, should the government consider hiring cybercriminals as cybersecurity watchdogs? Research Problem The problem this paper will seek to address is that of cybersecurity or the lack thereof, characterized by the cybernetics of our lives, which has increased our vulnerability to cyber attacks. The scope of the threat posed by cyber insecurity will be addressed. How serious is the threat posed by cybercriminals? How do they work? The ramifications of cybercrimes and their impact on the economy are undoubtedly grounds for government intervention. In addressing the problem, however, the government faces the dilemma of acce...... middle of paper ......%20cyber%20crime%20pov%20jan252010.pdfMaelnkovich, S. (2012). What motivates cybercriminals? Money, obviously. Kaspersky Lab. Accessed May 29, 2014, from http://blog.kaspersky.com/what-motivates-cybercriminals-money-of-course/The Carnegie Mellon University. (2014). How cyber criminals operate. On Carnegiecyberacademy.com. Accessed May 29, 2014, from http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/operate.htmlTobias, W. M. (2014). Your cybersecurity: Don't count on the government. Forbes. Accessed May 29, 2014, from http://www.forbes.com/sites/marcwebertobias/2014/05/12/your-cybersecurity-dont-count-on-the-government/The US House of Representatives. (2014). Recommendations from the House Republican Cybersecurity Task Force. Congress. Accessed May 29, 2014, from http://thornberry.house.gov/uploadedfiles/cstf_final_recommendations.pdf