Cloud Crime and Fraud

2018 ◽  
pp. 1334-1350
Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.

2019 ◽  
pp. 1159-1175
Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


Genome ◽  
2015 ◽  
Vol 58 (12) ◽  
pp. 527-540 ◽  
Author(s):  
Naazish S. Bashir ◽  
Wendy J. Ungar

The 3-I framework of analyzing the ideas, interests, and institutions around a topic has been used by political scientists to guide public policy development. In Canada, there is a lack of policy governing pharmacogenomics (PGx) testing compared to other developed nations. The goal of this study was to use the 3-I framework, a policy development tool, and apply it to PGx testing to identify and analyze areas where current policy is limited and challenges exist in bringing PGx testing into wide-spread clinical practice in Canada. A scoping review of the literature was conducted to determine the extent and challenges of PGx policy implementation at federal and provincial levels. Based on the 3-I analysis, contentious ideas related to PGx are (i) genetic discrimination, (ii) informed consent, (iii) the lack of knowledge about PGx in health care, (iv) the value of PGx testing, (v) the roles of health care workers in the coordination of PGx services, and (vi) confidentiality and privacy. The 3-I framework is a useful tool for policy makers, and applying it to PGx policy development is a new approach in Canadian genomics. Policy makers at every organizational level can use this analysis to help develop targeted PGx policies.


2021 ◽  
Vol 1 (6) ◽  
pp. 39-47
Author(s):  
Tonui Paul Kiprugut ◽  
Panuel Mwaeke ◽  
Wokabi Mwangi

This paper established prevalence of the characteristics in the shoplifting crimes and determined the supermarket operators’ perception of the effects of shoplifting crimes on society. The study was guided by three objectives: to establish offender characteristics of the shoplifting crimes, to establish prevalence of the characteristics in the shoplifting crimes and to determine the supermarket operators’ perception of the effects of shoplifting crimes on society. The study was guided by Rational Choice and the Routine Activity Theories. The study used a census sampling technique with a sample size of a hundred respondents. These included 90 junior employees of Tuskys, Uchumi and Naivas Supermarkets, 3 branch managers, 3 police officers within the area of the study and 4 officials of the Nairobi Supermarkets Association. Interview schedule was used to collect data. Data collected was organized, summarized and interpreted thematically by use of graphs, frequency tables, and percentages. The findings revealed that the prevalence of shoplifting was 1-2 incidences in a week. The results also revealed that the most commonly used method was concealing of items which were majorly done by women. Further, whereas there are other types of shoplifters, a concern raised by 30% of the respondents is that significant number of criminals has made shoplifting a career. This should inform policy makers, especially in this era of unprecedented unemployment. Additionally, as indicated by 55% of the respondents, staff colluded with criminals to steal from the supermarkets. This should appeal to supermarket operators as this may have an implication on supermarket businesses in the CBD. The study recommends several target hardening strategies to counter shoplifting crimes that included using high Radio-frequency identification (RFID) and Electronic Article Surveillance (EAS) programmed surveillance and records linked to the law enforcement through alarm trigger alerts in case of suspicious activities, with high-quality identifiable traceable images of shoplifters, to local law enforcement agencies.


Crime Science ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Abigail C. O’Hara ◽  
Ryan K. L. Ko ◽  
Lorraine Mazerolle ◽  
Jonah R. Rimer

Abstract Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and unauthorised access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) unauthorised access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.


2009 ◽  
Vol 20 (3) ◽  
pp. 261-273 ◽  
Author(s):  
William V. Pelfrey

As an artifact of the war on terror, local law enforcement agencies have been asked to serve as the “eyes and ears” of federal intelligence agencies. The federal Office of Domestic Preparedness (ODP) has assembled a set of guidelines to assist agencies in terrorism prevention and weapons of mass destruction identification. However, there is a dearth of metrics and measurement tools available to assess preparedness. Based on ODP guidelines, a methodology to tap preparedness levels is defined. Additionally, preliminary findings from an assessment of a large law enforcement agency are presented. Application of this methodology will enhance the preparedness of local agencies by identifying areas of strength and those areas which require attention. Once these deficit areas are defined, policy makers can define appropriate training and programmatic changes.


2017 ◽  
Vol 20 (4) ◽  
pp. 397-419 ◽  
Author(s):  
Matthew J. Giblin ◽  
Phillip M. Galli

In 2008, state and local law enforcement agencies hired 61,000 new full-time sworn personnel. To develop a sufficient applicant pool, organizations may use a variety of attraction strategies, including financial inducements, especially when broader factors lessen the appeal of a job. Using data from the 2007 and 2013 Law Enforcement Management and Administrative Statistics survey, the present study tests whether unfavorable contingencies (e.g., high cost of living, rigorous application standards) are related to officer compensation—pay, supplemental incentives, and reimbursements—within a sample of large metropolitan police agencies. Results are generally consistent with contingency theory, at least with respect to salaries. Departments offer higher salaries to offset more rigorous hiring standards, high costs of living, and other unfavorable contingencies. The implications of the findings for police officer recruitment are discussed.


Author(s):  
Yuriy Parshyn ◽  
Marharyta Parshyna ◽  
Liudmila Yarmolenko

The importance of the use of the information technologies at the present stage of human development in all spheres of activity has been noted. Their use can significantly increase the efficiency of tasks related to the processing of the large amounts of information, its storage, transmission, retrieval, etc. Implementation and use of the information technologies in the activities of the Internal Affairs will allow to increase productivity. Development and implementation of the modern information technologies are taking place in many areas, and comprehension of their application will help to avoid unnecessary costs and more effectively implement them in the activities of the Internal Affairs. It has been noted that influence of factors both at the macrolevel and at the global level derives the system from its relative equilibrium state and encourages to decision-making relative to bringing the system to a new level with a relatively stable state. Such a factor is the global pandemic, and the tools to overcome it are the latest information systems and technologies. Emphasis has been placed on the development of new areas and technologies in global communication between different areas of activity, and the use of digital platforms has been proved to be promising, which provides a number of opportunities. The evolution of law enforcement agencies has been provided and macrolevel tendencies which determine their development have been stood out. Innovations in the practical activities of law enforcement agencies have been shown, which translate the processes to a higher technological and organizational level through the use of the information technologies. Global trends in the development of new information technologies have been investigated, and in terms of the benefit of their use in law enforcement agencies, their sequence has been provided. Priority of their use can be represented as follows: big data analytics, artificial intelligence, cloud solutions, Internet of Things and so on. It has been emphasized that the urgent needs of the present time act as factors in the development of the new information technologies, and, in the same time, the information sphere acquires systemically formative significance for society.


2002 ◽  
Vol 48 (3) ◽  
pp. 355-379 ◽  
Author(s):  
John L. Worrall

This study tests the hypothesis that when law enforcement agencies make improvements in their citizen complaint review procedures, a likely consequence is more complaints. Findings from a survey of 700 law enforcement agencies suggest that improvements in citizen complaint procedures result in a higher incidence of complaints. Additionally, certain combinations of citizen complaint review procedures are highly associated with the incidence of complaints. Two recommendations are made: (a) researchers and policy makers need to be attuned to the fact that more complaints will be filed when complaint procedures are reformed, and (b) law enforcement agencies need to be “careful what they ask for;” a higher complaint rate, although a desirable consequence of improved complaint review procedures, could result in unanticipated consequences.


Sign in / Sign up

Export Citation Format

Share Document