Home > Free Essays > Tech & Engineering > Cyber Security > Cyber Theft and Internet Security Measures
Rate

Cyber Theft and Internet Security Measures Proposal

Exclusively available on IvyPanda Available only on IvyPanda
Updated: May 6th, 2021

The modern-day world is becoming a global village with expanding usage of the internet. The Internet has now penetrated across the globe even to the developing countries where it is being embraced and used widely. The invention and adoption of the internet have accelerated the growth of the business through improved means of communication but, at the same time, malicious people have invaded the internet making it not so safe for its users.

Statement of the Problem

The development of technology has led to the growth of internet users globally. Many internet users see the internet as the safest means of communication and doing business, thus, there is a need to protect these users from malicious people who conduct cybercrime.

This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer. The research will categorically put more emphasis on cyber theft and its consequences. To conduct and understand this topic clearly, I will research more on cyber theft from updated online articles, books as well as from my general knowledge and understanding. Through these, I believe I will get a better understanding and conduct a proper analysis of cyber theft.

Definition of Terms

Internet. It is the interconnection of computers worldwide for communication.

Cyber. Internet space where internet facilities and connections are available.

Cyber theft. Accessing internet users’ personal information without their knowledge with the intent of stealing from them over the internet.

Theoretical Framework on Cyber Theft and how it Thrives

To work out the research problem in this paper, I will be guided by the emerging trends in technology which highlights the increase in the number of cyber theft incidences reported over some time. According to Siegel (2011), the Federal Trade Commission has put the number of internet users who have fallen prey to identity theft as 9 million. This indicates how vulnerable internet users are in the entire world.

Many internet users use the internet blindly without knowing how dangerous it can be especially where the laid down procedures are not set straight (Carr 2011). Most research studies conducted on cyber theft among online users have failed to cushion internet users on the looming danger they face when using the internet (Cornelius & Hermann 2011). A good example is where some internet users receive emails purporting to have won lotteries and in turn asking for personal information and bank details. The authors of these emails turn out to be cybercriminals who steal from vulnerable internet users (Jaishankar 2011).

To counter the initial research studies done on cyber theft, I will focus more on how internet users can learn safe internet usage that is free from malicious programs and malware.

Method and Design on how to Obtain Crucial Data About Cybertheft

Methodologies to be used to collect data

To expound more on this research topic, primary sources of data will be used. These include online articles and the AUS library. The number of sources will be about ten thus enabling me to come up with the main topics that I will form my argument on.

Expected Findings on Cyber Theft Research

I expect to be enlightened on this topic and get to the bottom of the matter so as learn how this kind of emerging theft is executed. My understanding of this topic will also facilitate me to draw conclusions and come up with ways that can be used to stop this form of technological crime.

References

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. New York: O’Reilly Media.

Cornelius, K., & Hermann, D. (2011). Virtual Worlds and Criminality. New York: Springer.

Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. New York: CRC Press.

Siegel, J. L. (2011). Criminology. New York: Cengage Learning.

This proposal on Cyber Theft and Internet Security Measures was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Proposal sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper

Select a referencing style:

Reference

IvyPanda. (2021, May 6). Cyber Theft and Internet Security Measures. Retrieved from https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/

Work Cited

"Cyber Theft and Internet Security Measures." IvyPanda, 6 May 2021, ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

1. IvyPanda. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.


Bibliography


IvyPanda. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

References

IvyPanda. 2021. "Cyber Theft and Internet Security Measures." May 6, 2021. https://ivypanda.com/essays/cyber-theft-and-internet-security-measures/.

References

IvyPanda. (2021) 'Cyber Theft and Internet Security Measures'. 6 May.

More related papers
Psst... Stuck with your
assignment? 😱
Hellen
Online
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!