Cyber Theft and Internet Security Measures Proposal Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The modern-day world is becoming a global village with expanding usage of the internet. The Internet has now penetrated across the globe even to the developing countries where it is being embraced and used widely. The invention and adoption of the internet have accelerated the growth of the business through improved means of communication but, at the same time, malicious people have invaded the internet making it not so safe for its users.

Statement of the Problem

The development of technology has led to the growth of internet users globally. Many internet users see the internet as the safest means of communication and doing business, thus, there is a need to protect these users from malicious people who conduct cybercrime.

This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer. The research will categorically put more emphasis on cyber theft and its consequences. To conduct and understand this topic clearly, I will research more on cyber theft from updated online articles, books as well as from my general knowledge and understanding. Through these, I believe I will get a better understanding and conduct a proper analysis of cyber theft.

Definition of Terms

Internet. It is the interconnection of computers worldwide for communication.

Cyber. Internet space where internet facilities and connections are available.

Cyber theft. Accessing internet users’ personal information without their knowledge with the intent of stealing from them over the internet.

Theoretical Framework on Cyber Theft and how it Thrives

To work out the research problem in this paper, I will be guided by the emerging trends in technology which highlights the increase in the number of cyber theft incidences reported over some time. According to Siegel (2011), the Federal Trade Commission has put the number of internet users who have fallen prey to identity theft as 9 million. This indicates how vulnerable internet users are in the entire world.

Many internet users use the internet blindly without knowing how dangerous it can be especially where the laid down procedures are not set straight (Carr 2011). Most research studies conducted on cyber theft among online users have failed to cushion internet users on the looming danger they face when using the internet (Cornelius & Hermann 2011). A good example is where some internet users receive emails purporting to have won lotteries and in turn asking for personal information and bank details. The authors of these emails turn out to be cybercriminals who steal from vulnerable internet users (Jaishankar 2011).

To counter the initial research studies done on cyber theft, I will focus more on how internet users can learn safe internet usage that is free from malicious programs and malware.

Method and Design on how to Obtain Crucial Data About Cybertheft

Methodologies to be used to collect data

To expound more on this research topic, primary sources of data will be used. These include online articles and the AUS library. The number of sources will be about ten thus enabling me to come up with the main topics that I will form my argument on.

Expected Findings on Cyber Theft Research

I expect to be enlightened on this topic and get to the bottom of the matter so as learn how this kind of emerging theft is executed. My understanding of this topic will also facilitate me to draw conclusions and come up with ways that can be used to stop this form of technological crime.

References

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. New York: O’Reilly Media.

Cornelius, K., & Hermann, D. (2011). Virtual Worlds and Criminality. New York: Springer.

Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. New York: CRC Press.

Siegel, J. L. (2011). Criminology. New York: Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, May 6). Cyber Theft and Internet Security Measures. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/

Work Cited

"Cyber Theft and Internet Security Measures." IvyPanda, 6 May 2021, ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

References

IvyPanda. (2021) 'Cyber Theft and Internet Security Measures'. 6 May.

References

IvyPanda. 2021. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

1. IvyPanda. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.


Bibliography


IvyPanda. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1