Human Factor in Enabling and Facilitating E-Crimes Report

Exclusively available on Available only on IvyPanda® Written by Human No AI

Despite the increased integration of security measures in information and communication technology infrastructures, incidences of e-crime have grown exponentially over the years. The rapid internet penetration and accelerated digitization have created numerous opportunities for the perpetration of crimes through cyberspace. Although numerous initiatives have been developed to counteract e-crime, Akdemir and Lawless (2020) argue that computer and internet-enabled offenses are rising. In the article “Exploring the Human Factor in Cyber-Enabled and Cyber-Dependent Crime Victimization: A Lifestyle Routine Activities Approach,” the authors suggest that human behavior is the weakest link in the entire computer security arrangement. According to Akdmeir and Lawless (2020), external manipulators exploit the reasoning of technology users to penetrate information and technology establishments, thereby facilitating the orchestration of cybercrimes. Victims of e-crimes inadvertently contribute to the occurrence of cyberattacks through their behaviors, which neutralize the effectiveness of various security features, such as firewalls, antimalware, and antiviruses. Therefore, the human factor is the greatest enabler and facilitator of cybercrimes as it permits cybercriminals to infiltrate and compromise previously secure systems.

The characteristics and actions of internet users are fundamental components of computer security. According to Akdemir and Lawless (2020), there is a direct correlation between the risk of experiencing cyberattacks and the victim’s online activities. Fraudsters often profile their targets by evaluating the specific factors exhibited by the victims’ routine activities. Cybercrimes are primarily motivated and influenced by the casualties’ online presence (Jansen & Leukfeldt, 2016). Accordingly, Internet victimization is not randomly distributed but reflects potential targets’ successful profiling through their suitability, degree of exposure, and absence of deterring capacities (Akdmeir & Lawless, 2020). For instance, the utilization of networked internet technologies, surfing on public computers, voluntary and involuntary disclosure of personal information, and deviant online activities, exacerbate the occurrence of e-crimes.

Reaction

Cybersecurity is emerging as a prominent consideration in this era of rapid progress in information technology and internet penetration. Despite the integration of advanced protective measures, incidences of e-crimes have been skyrocketing. Although the exploitation of the inherent gaps in internet security is dynamic, human behavior and online characteristics play an influential role in increasing the risk of cyberattacks. I concur with the authors’ arguments that the traits and activities people manifest online amplify their potential of falling victim to e-crimes. For instance, using shared or interconnected network infrastructure drastically increases online users’ suitability and attractiveness to cybercriminals. Notably, no cybersecurity installations can mitigate the extensive exposure created through public connectivity. Therefore, the utilization of devices with technological vulnerabilities and susceptibilities, such as public computers and Wi-Fi networks, has been identified as prime avenues exploited by cybercriminals to perpetrate attacks.

Conclusively, the conduct and interests of the Internet facilitate the orchestration of e-crimes. Fraudsters rely on the reasoning of computer users whose activities and interests create entry points into protected devices. Using insecure and vulnerable internet connections, disclosing sensitive personal information, and engaging in deviant online activities, can be exploited by scammers and trigger subsequent compromise on the integrity of technology devices. As a result, victimization is disproportionately influenced by the behavioral disposition of internet users. The installation of anti-viruses and other cybersecurity software, such as firewalls, cannot protect individuals from e-crimes without a corresponding behavioral change. Therefore, the likelihood of falling victim to cyber-dependent and cyber-enabled crimes can be substantially mitigated by adopting a double-pronged plan, which combines personal conduct and cybersecurity strategies.

References

Akdemir, N., & Lawless, C. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimization: A lifestyle routine activities approach. Internet Research. Web.

Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79-91. Web.

Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, February 23). Human Factor in Enabling and Facilitating E-Crimes. https://ivypanda.com/essays/human-factor-in-enabling-and-facilitating-e-crimes/

Work Cited

"Human Factor in Enabling and Facilitating E-Crimes." IvyPanda, 23 Feb. 2022, ivypanda.com/essays/human-factor-in-enabling-and-facilitating-e-crimes/.

References

IvyPanda. (2022) 'Human Factor in Enabling and Facilitating E-Crimes'. 23 February.

References

IvyPanda. 2022. "Human Factor in Enabling and Facilitating E-Crimes." February 23, 2022. https://ivypanda.com/essays/human-factor-in-enabling-and-facilitating-e-crimes/.

1. IvyPanda. "Human Factor in Enabling and Facilitating E-Crimes." February 23, 2022. https://ivypanda.com/essays/human-factor-in-enabling-and-facilitating-e-crimes/.


Bibliography


IvyPanda. "Human Factor in Enabling and Facilitating E-Crimes." February 23, 2022. https://ivypanda.com/essays/human-factor-in-enabling-and-facilitating-e-crimes/.

More Essays on Cyber Security
If, for any reason, you believe that this content should not be published on our website, you can request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1