Assessing Harm from Cyber Crime

2021 ◽  
pp. 126-141
Author(s):  
Eva Ignatuschtschenko

This chapter discusses a harm concept that enables a more comprehensive assessment of the consequences of cyber crime. Even though harm resulting from cyber crime is not fundamentally different from harm that is caused by other forms of crime or crime in general, the reach, scope, and volume of crime facilitated by information and communications technology have transformed risks posed to individuals, organizations, and nations, and challenge conventional approaches of crime detection and prevention. Assessments of the impact of cyber crime have been focusing on estimating the cost in monetary value. However, most significant harm might not be experienced as a loss of money, but as a disruption or destabilization of systems that are built on trust. This article advocates for a human-centric approach to cyber security, which emphasizes harm mitigation strategies.

2003 ◽  
Vol 36 (3) ◽  
pp. 165-189 ◽  
Author(s):  
Richard Johnstone

The present review refers to studies published in 2002 in leading research journals. It focuses in particular on learning, teaching and policy in respect of second, modern foreign or additional languages. The comments offered about particular studies are not intended to summarise them (for that, it is best to refer to the actual abstracts which the present journal publishes). What is on offer is a personal selection made because some aspect of a particular article seemed to be of particular interest or to reflect an important trend, and I have attempted to link such elements together to form a narrative. Compared with previous years, two important themes seemed to gather particular momentum in 2002: first, the role of ‘frequency’ in acquisition; and second, the impact of complex and contradictory global factors on everyday pedagogical practice, thinking and attitudes. As in previous years reference is made to the abstracts. Thus, Tarone (2002: 03-158) refers to an article by Tarone published in 2002 and reflected in the 2003 series of this journal as abstract 158. In previous years I have discussed ICT (information and communications technology) in a separate section of its own but this has now been integrated into other sections, reflecting a process of ‘normalisation’.


2018 ◽  
Vol 7 (3.19) ◽  
pp. 39 ◽  
Author(s):  
Moses Adah Agana ◽  
Ruth Wario

This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals. 


2003 ◽  
Vol 184 ◽  
pp. 58-59 ◽  
Author(s):  
Mary O'Mahony

The impact of recent advances in information technology on output and productivity growth has been one of the key research questions in the past few years. A consensus has emerged that the use of information and communications technology (ICT) capital has had a significant impact on aggregate economy-wide labour productivity growth through the capital deepening channel in the United States in the 1990s (see the discussion and references in the papers below). Evidence is also emerging of a delayed but nonetheless significant impact in European and other OECD economies. These findings have stimulated additional research using microeconomic data focusing on both the industry or company level.


Author(s):  
Daniel Heil ◽  
James E. Prieger

The growing use of information and communications technology (ICT) by business—e-business— has a profound impact on the economy. E-business lowers costs and increases the choices available to consumers and firms. These microeconomic changes work their way through the economy and ultimately influence macroeconomic conditions. Overall, e-business benefits the economy in many ways. Nevertheless, not all the effects of e-business on macroeconomic conditions are positive, and some aspects of e-commerce may limit the effectiveness of monetary policy. E-business changes the macroeconomy in several beneficial ways. Some gains are static in nature, arising from the more efficient use of existing resources. For example, increases in productivity increase a nation’s GDP. In addition, by lowering search and transaction costs, e-business unleashes deflationary pressures (Willis, 2004). Other gains are dynamic, altering the path national growth takes. By lowering the cost of transferring and employing knowledge, ICT enables greater R&D and innovation, which is crucial to long-run economic growth.


Author(s):  
Hasan L. Al-Saedy

The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.


Sign in / Sign up

Export Citation Format

Share Document