The modern-day world is becoming a global village with expanding usage of the internet. The Internet has now penetrated across the globe even to the developing countries where it is being embraced and used widely. The invention and adoption of the internet have accelerated the growth of the business through improved means of communication but, at the same time, malicious people have invaded the internet making it not so safe for its users.
We will write a custom Proposal on Cyber Theft and Internet Security Measures specifically for you
301 certified writers online
Statement of the Problem
The development of technology has led to the growth of internet users globally. Many internet users see the internet as the safest means of communication and doing business, thus, there is a need to protect these users from malicious people who conduct cybercrime.
This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer. The research will categorically put more emphasis on cyber theft and its consequences. To conduct and understand this topic clearly, I will research more on cyber theft from updated online articles, books as well as from my general knowledge and understanding. Through these, I believe I will get a better understanding and conduct a proper analysis of cyber theft.
Definition of Terms
Internet. It is the interconnection of computers worldwide for communication.
Cyber. Internet space where internet facilities and connections are available.
Cyber theft. Accessing internet users’ personal information without their knowledge with the intent of stealing from them over the internet.
Theoretical Framework on Cyber Theft and how it Thrives
To work out the research problem in this paper, I will be guided by the emerging trends in technology which highlights the increase in the number of cyber theft incidences reported over some time. According to Siegel (2011), the Federal Trade Commission has put the number of internet users who have fallen prey to identity theft as 9 million. This indicates how vulnerable internet users are in the entire world.
Many internet users use the internet blindly without knowing how dangerous it can be especially where the laid down procedures are not set straight (Carr 2011). Most research studies conducted on cyber theft among online users have failed to cushion internet users on the looming danger they face when using the internet (Cornelius & Hermann 2011). A good example is where some internet users receive emails purporting to have won lotteries and in turn asking for personal information and bank details. The authors of these emails turn out to be cybercriminals who steal from vulnerable internet users (Jaishankar 2011).
To counter the initial research studies done on cyber theft, I will focus more on how internet users can learn safe internet usage that is free from malicious programs and malware.
Method and Design on how to Obtain Crucial Data About Cybertheft
Methodologies to be used to collect data
To expound more on this research topic, primary sources of data will be used. These include online articles and the AUS library. The number of sources will be about ten thus enabling me to come up with the main topics that I will form my argument on.
Expected Findings on Cyber Theft Research
I expect to be enlightened on this topic and get to the bottom of the matter so as learn how this kind of emerging theft is executed. My understanding of this topic will also facilitate me to draw conclusions and come up with ways that can be used to stop this form of technological crime.
Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. New York: O’Reilly Media.
Cornelius, K., & Hermann, D. (2011). Virtual Worlds and Criminality. New York: Springer.
Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. New York: CRC Press.
Get your first paper with 15% OFF
Siegel, J. L. (2011). Criminology. New York: Cengage Learning.