Cyber technology impacts interactions between offenders and victims in countless ways. This all depends on the category of cybercrime but non the less the individuals involved are all greatly affected. Starting out with cyber fraud. When a perpetrator commits cyber fraud by either stealing an individuals identify or in a new term ‘catfishing’, the victim…
Journal #11
The overlap between criminal justice and cyber-crime seem to wax and wane depending on how a typical crime is described. For instance, some cyber-crimes are considered to be a white-collar crime, but not all white-collar crimes are considered cyber-crimes. Cyber-crime can be described as a crime or any wrongdoing with the use of a computer….
Journal #10
Engineers make cyber networks safer by having an engineering mindset. I say an engineering mindset in that the engineer sees a problem that needs to be solved or an existing issue needing to be corrected and they begin to work on such a solution. Starting with communication in the form of emails or messaging applications….
Journal #9
There is no doubt that computers have made the world safer. On the other side of the figurative coin, they have also made the world less safe. With the advance of technology, computers are everywhere and even in our pockets. This enables us to have a plethora of information and means of communication at our…
Journal #8
Taking the pessimistic approach, there is truly no one way to tell if your computer is safe. There is also no one true way to keep your computer safe. Of course, an individual could keep their computer safeguarded by being locked in a secure vault, surrounded by a Faraday Cage, Bluetooth and Wi-Fi turned off,…
Journal #7
There are many costs and benefits of developing cybersecurity programs in business. Some businesses might look at having cybersecurity programs as “you are damned if you do, you are damned if you do not”. I think the benefits of a cybersecurity program far outweigh their costs. First, comes the legal ramifications if a business system…
Journal #6
With the dictionary definition of deviance being “the fact or state of departing from usual or accepted standards.” In essence, what is considered workplace deviance can still be left open for interpretation. Boss “A” might view the situation, “as long as they get the work done, I do not care how they do it.” Boss…
Journal #5
Legal ways to make money in cybersecurity. Create app that rates software. Yacht GPS software that is secure. BMI database that keeps clients information confidential. Earnings report card for businesses that is kept confidential. Research and development team. Search and rescue database to keep records of emergency incidents. EMS staffing software protection from hacking. Crime…
Journal #4
With well over 150 countries world-wide, cyber-crime spans the globe and effects each one differently. “The count of countries can range from between 193 and 200. The Bureau of Intelligence and Research (2009) estimates the count to be 194” (Bureau of Intelligence and Research, 2009). Studies show that wealth and “the degree of internet connectivity…
Journal #3
Four ethical issues that arise when storing electronic information about individuals are privacy concern, anonymity, intellectual property, and globalization. With more and more personal information and data being stored electronically there is a greater concern for it to be easily transmitted and shared with a click of a computer mouse. Its an ethical decision for…