Sunday, April 5, 2009

ConLude The DisCussioN

Hello....
This time I want to conclude the overall discussion of our topic- Internet Crime.

There are about six types of internet crime. The must most common of internet crime are identity theft, child pornography and privacy. Nowadays, computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through wares, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise By knowing the ways to expose to the internet crime, there can make us always be careful while using the internet. The public also can get the information of the ways we can be exposed to the internet crime by magazines, television, internet and article. The computer crime such as phishing scams, cyber stalking, fraud harassment, drug trafficking stalking and cyber terrorism give the bad effect to society and also the government in aspect politic, social and economy.

So, we must know the ways how to protect ourselves from the risk of internet crime. There are seven basic step on how we can reduce the risk from being victim of internet crime. All you need is just to be alert bad be aware while you are online. The government especially must take the action to control the crime activities by computer crime. For example the action by the Department of Justice doing about the internet crime when in 1999, the Department of Justice established its Internet Fraud Initiative, the federal government has been expanding its efforts to combine criminal prosecution with coordinated analysis and investigation as part of a comprehensive approach to combating Internet fraud.

yATIe..---

To Sum Up....

I agree with you nani...
Although the internet
has made life easier in many ways, it’s smart to be concerned about Internet crimes. Internet crime is becoming a growing problem for law enforcement officials around the world. Unfortunately, since Internet crimes typically involve people from many different geographic areas, catching and punishing the guilty parties is a difficult task. So we ourselves need to be aware of what happen while online. This blog has giving you the information about how the use of internet sometimes can harm us. It's all in your hand to made up your mind, start to be aware and act rasionally while online. We hope this blog will help you to protect youself from becoming victims of internet abuse. Thank you..

Hyedah~

cONClusion++

Salam.....
Ok...along the discussion on this blog about almost one semester,
we have discussed about the situation of the phenomenon internet crime, the types of internet crime, the ways we can be exposed to the internet crime, the effects of internet crime and the prevention tips on internet crime.
So,,now let we conclude and give opinion about our topic- Internet Crime.

With computer technology permeating every aspect of our lives, there is little wonder that crimes involving the Internet have increased. Whether related to criminal sexual behavior or fraudulent actions, the consequences for a conviction can be serious. Having attorneys with the savvy and understanding of legal processes can make a vital difference in the outcome of your case.The Internet has changed everyday life in ways too numerous to count. Instantaneous communication with people all over the world has become commonplace. The new technology has also created new legal issues, particularly in the area of criminal law. Sometimes a simple mistake as opening a window or clicking a button on your computer screen can result in unwanted and unasked-for material. If you have been charged with possession of child pornography.

Computer crimes cover a broad range of potentially illegal activities. These crimes are usually divided into two categories:

  • Crimes that target computer networks or devices directly, such as malware and malicious code or viruses.
  • Crimes enabled by computer networks or devices with the primary target being independent of the computer network or device, such as cyber stalking, fraud and identity theft or phishing scams.
New types of crime, and new theories for criminal prosecution, will be implemented to meet the continually evolving state of the online world. Internet crime is undergoing constant change. If you have been charged with an Internet crime, seek legal advice from an attorney who is knowledgeable in this area of the law. So, beware in anywhere u are as while you are online.
Get much knowledge about internet crime as you don't expose to the internet crime or being a victim. Easily cheated, easily lost!

naniey~

Friday, April 3, 2009

The Economics Impact Of Cyber Attacks

The importance of electronic information systems is obvious to all participants in the modern economy. When information fails to circulate, whole sectors of the economy are vulnerable. Finance, wholesale and retail trade, transportation, much of manufacturing, and many service industries would slow to a crawl without computers. Vital public services – utilities, national defense, and medicine – are equally dependent.


Information security – the safeguarding of computer systems and the integrity, confidentiality, and availability of the data they contain – has long been recognized as a critical national policy issue. Two current trends indicate that its importance is growing. First, the integration of computers into more and more aspects of moder life continues. Second, cyber-attacks, or breaches of information security, appear to be increasing in frequency, and few observers are willing to ignore the possibility that future attacks could have much more severe consequences than what has been observed to date.


The core issue, in both public and private sectors, is whether we are devoting enough resources to information security. Part of the answer must come from economic analysis. What are the costs, both historical and potential, of security breaches? How frequently can attacks be expected? Can these factors be quantified precisely, so that business firms and other organizations can determine the optimal amount to spend on information security and measure the effectiveness of that spending?


This report surveys the state of knowledge on the cost of cyber-attacks and the economics of information security. First, we summarize several studies that use stock market capitalization as a measure of the cost of cyber-attacks to victim firms. The studies find substantial short-term drops in the prices of shares of firms following the announcement of an information security breach: between 1% and 5% of market capitalization, with greater losses (up to 15%) recorded by some financial institutions where attackers had gained access to confidential customer records.


Second, we present summaries of the existing empirical data on costs attributable to cyber-crime and computer worms and viruses. What is available is a limited amount of survey data, which is frankly described by its compilers anecdotal, but is nonetheless widely reported in the press. Third, we analyze the reasons for the lack o statistical data: firms and organizations have strong incentives to conceal information about cyber-attacks, and there are significant uncertainties and measurement difficulties that limit our ability to specify the dollar amount at risk from information security breaches. Theoretical models that describe the returns to spending on information security shed some light on the size of potential losses, but – in the absence of better statistical data – assigning an overall figure to the cost of cyber-attacks remains highly speculative.



NANIEY++

Thursday, April 2, 2009

Cybercrime And The Effect On Small Businesses

Small businesses lose an average of 800 GBP a year to internet fraud and other online crimes, according to a survey by the Federation of Small Businesses (FSB).

The FSB's report, "Inhibiting Enterprise: Fraud and online crime against small businesses" (2009) revealed that 54% of UK businesses have fallen victim to online crime in the last twelve months, with 15% being affected by viruses and hackers, and 37% being exposed to phishing emails, where fraudsters attempt to obtain sensitive information by posing as legitimate sources.

According to the FSB, such crimes typically cost small businesses between 500 GBP and 5,000 GBP, while the average cost is 768 GBP a year, yet the report revealed that around one third of small firms do not report online crime to the police or their banks because of "a lack of faith in the system".

However, 85% of respondents in Scotland and England said they would report fraud if a designated reporting centre were set up to gather data and use it to fight the crime and follow through with prosecutions - a system similar to that already established in Wales. The report also revealed overall weaknesses in businesses understanding of how online crime is policed, with 53% stating that they needed clearer information about how and where to report this type of crime.

Mike Cherry, Federation of Small Businesses Home Affairs Chairman, said, "E-crime is becoming an increasingly serious issue for small firms, which are losing up to 800 GBP a year to fraud and online crime - a cost which could have a significant impact on a small business."

When a business is hit by computer crime, it generally stands a much better chance of recovery if backed up by a strong and well enforced incident response policy. Core to this is prompt reporting of the incident so that experts can be called in to gather evidence. Such evidence must be obtained by qualified professionals, known as computer forensics experts, who conduct their investigations in line with guidelines set out by the Association of Chief Police Officers. If computer equipment is examined by untrained IT staff, or there is a delay in reporting the crime, evidence could be lost, corrupted or contaminated, making perpetrators harder to trace and reducing the chances of successfully securing a conviction.

Mr Cherry added, "The internet is a huge and unregulated area but businesses have to have confidence that there are at least some structures there to support them. It is important that the Met Police E Crime Unit and the National Fraud Reporting Centre must work hand in hand to set up an effective system to gather intelligence and use it to investigate and prosecute when this crime occurs. Businesses are currently simply being left very exposed."

This article can be one of the example on how internet and cyber crime can harm us. This evidence show us that we need to keep inform about the effect of this crime so that we will be aware.

~hyedah~

Wednesday, April 1, 2009

EFFECT INTERNET CRIME TO CHILDREN AND ADOLESCENTS

Hai everyone...
Do you know that internet crime give a bad impact to development of children and adolescents??
for example the child pornography which is familiar in young generation today...
Now I want to share with you all about some information that I found in internet...

It is critical to view the Internet as a new social environment in which universal adolescent issues pertaining to identity formation, sexuality, and self-worth are explored in a virtual world (Subrahmanyam et al.). As a social context, the Internet enables multiple communication functions, such as e-mail, instant messaging (IM), chat, and blogs, to allow adolescents
to participate and co-construct their own environments (Greenfield & Yan, 2006). According to data from the Pew Internet and American Life Project, the vast majority (89%)
of teens use e-mail; 75% use IM, which allows them to have multiple simultaneous conversations with a defined group of peers. Over 50% of teens possess more than one e-mail
address or screen name, which they can use to send private messages to friends or to participate anonymously in online forums, such as chat rooms.

Easy and continuous access to the Internet provides tremendous opportunities for adolescent socialization, allowing them to connect with their peers as well as with completestrangers from across the world. Clearly, the Internet is transforming the social world of adolescents by influencing how they communicate, establish and maintain relationships,and find social support. Therefore, it is essential to gainawareness of both the potential benefits and risks of teen
Internet use, and provide strategies to guide safe and positive practice.

RISK FACTORS OF TEENS INTERNET USE

Although the Internet has consistent positive impacts on modern society, it has also caused various societal concerns about privacy, security, pornography, Internet crime, and
virtual community (Greenfield & Yan, 2006). Its easy accessibility poses greater risks and dangers for youth as compared to other forms of media. According to the
National Altitudinal Poll, the number one media concern for parents has shifted from television to the Internet: 85% of parents reported that among all forms of media, the Internet
posed the greatest risk to their children (Common Sense Media, 2006). Parental concerns are valid, especially considering that teens are essentially free to view and post whatever they choose and communicate with whomever they want. Hand in hand with this, the Internet has become a highly effective and profitable means of distributing sexually explicit
material, as well as a sophisticated channel for compulsive sexual behavior, sex trafficking, and sex crimes (Galbreath & Berlin, 2002). According to a survey performed by the
London School of Economics (2002), 90% of children between ages 8 and 16 have viewed pornography on the Internet. In most cases, the sex sites were accessed unintentionally when
a child, often in the process of doing homework, used aninnocuous word to search for information or pictures.Such free access and exposure to this information byadolescents who have not yet developed a full maturitycould pose negative impacts on adolescent developmentand could potentially manifest in their social interactionswith peers, their sexual activity, and their emotionaldevelopment.


yatie@hayati~~~

Effect internet crime in Politics

hellO everyone...(yatie)^^
Thanks nani, now I want to share about the effect of internet crime in Politics...


~The Internet began in the 1970s as an academic computer science experiment funded by the U.S. Department of Defense. It proved valuable to researchers, and that value was recognised by research funding agencies, which continued to directly support it well into the 1990s. A time-line of Internet development is provided by RFC2235.

~Academic usage of the Internet came to extend well beyond the computer science discipline. In Australia, the Internet migrated at the end of 1989 from a mere research object to a fully professional service, AARNet. Gradual uptake by new communities (at first of scholars, and later in government, in industry and among society generally), together with successive new protocols and tools, has resulted in exponential growth in connected nodes, in traffic, and in users, being sustained over more than two decades.

~Because such a substantial proportion of the population of computers and users has already been attracted onto the `net, growth in those measures will necessarily gradually assume the shape of the logistics curve, i.e. with growth rates flattening out. Traffic, on the other hand, appears set to continue its rapid growth, as more people spend more time generating more messages; and as bandwidth-hungry image, sound and video-transmissions become more common. Statistical information is available on Internet growth-rates up to 1995 at Georgia Institute of Technology, and on subsequent host-count growth-rates at NetWizard.

~The innovation that brought the Internet squarely into public focus was the World-Wide Web, which began its explosive growth in 1993. The Web enables organisations and people everywhere to become publishers, and has resulted in a vast leap in the public availability of information. Retrospectively, many newcomers have discovered the benefits of pre-existing services, particularly email, but also file-transfer and newsgroups.

~In addition to the wide range of valuable services that it supports, the Internet in general, and particular Internet services, have been co-opted to meet the needs of less tasteful purposes. The result has been a reaction by some socially conservative people and organisations against the Internet per se.

Examples of areas in which public concern has been stimulated include:

  • pornography generally, circulation of which is quite common using FTP and newsgroups;
  • child pornography in particular; and
  • the incitement of racial hatred / `hate-speech'.

In some countries, the Internet has generated even deeper reactionary feelings. Some governments have sought to stifle, and even prevent, the use of the Internet, because of its potential to support:

  • the infiltration of foreign, western, secular, english-language and/or American culture, resulting in the erosion of traditional culture and values; and/or
  • political activism (particularly in countries with traditions of limited freedom of speech, or with dictatorial regimes).

~Meanwhile, it is reasonably argued that `organised crime', terrorists, and `subversives' more generally, are using, or will soon use, the Internet for their own purposes. Law enforcement agencies are accordingly taking a closer look at the `net. They are seeking means of limiting its use for illegal purposes, as well as applying it to their own needs.

~A further initiative of relevance is the U.S. President's Commission on Critical Infrastructure Protection, which is concerned not only with energy, water, transportation and essential services, but also with communications. It was particularly concerned about `new cyber threats'. Its report of 20 October 1997 identified `a wide spectrum of threats', including:
  • natural events and accidents;
  • blunders, errors, and omissions;
  • insiders;
  • recreational hackers;
  • criminal activity;
  • industrial espionage;
  • terrorism;
  • (foreign) national intelligence; and
  • information warfare.

~The threats to Internet freedom have, predictably enough, stimulated reactions by individuals and organisations who are opposed to the exercise of power by nation-states. The intellectually and technically most virile of these are loose coalitions associated with the terms `crypto-anarchist' and `cypherpunk'. Their arguments vary from the inevitability of the collapse of the nation-state as a result of cryptography, to the need for crypto-armed rebellion to destroy the nation-state.


~yatie@hayati~ A124337