Scientific Causal Model: Cybercrime Related to Terrorism, Economy, Privacy and Hacking
Autor: Rahi Kumar • April 23, 2015 • Research Paper • 4,353 Words (18 Pages) • 885 Views
Title: Cybercrime
[pic 1]
Academic Report of Research Process
Cybercrime
Submitted to: Prof. Christian Bach
Student Name: Rahi Kumar
Student ID: 0988027
Major: Technology Management
Section: TCMG-400-6T1
Cybercrime
Identify 30 articles and list the variables:
Dependent variable | Quote | Reference | |
Cybercrime | Cybercrime is hard to detect, thus giving the perpetrators plenty of time to flee the area in which the crime was committed, because of this fact the criminals can be in another country far away from the scene of the crime by the time it is detected. | (Cassim, 2011) |
Independent variable | Quote | Reference | |
Terrorism | The serious implications of the phenomenon are further underscored by Goodman and Mariano-Florentino Cuéllar who argue that hacking, given its potentially astronomic costs, maybe viewed as a form of terrorism. | (Granville, 2003) | |
Economy | The United States and its allies have dismissed the proposals as the desperate posturing of a nation with a weak information economy that is losing the cyber-war. | (Adams, 2001) | |
Privacy | Privacy and confidentiality, the method by which access to the content of information is available only to authorized recipients. | ( | |
Hacking | Hacking is a descriptive term used to describe the attitude and behavior of group of people who are greatly involved in technical activities which, more commonly today than in previous years, result in gaining unauthorized access. | ( | |
Power | |||
Gender-Base | |||
Internet | |||
Social Media | |||
Computers | |||
Government | |||
Nuclear Threat | |||
Youth | |||
Developing Countries | |||
Scientific Causal Model: Cybercrime related to terrorism, economy, privacy and hacking.
[pic 2]
Figure 1: Cybercrime and its Independent Variable.
Cyber Crime
Goal-0: “Cybercrime or 'computer crime' appears to have no precise definition. On the one hand, a computer may become the 'object' of a crime when theft of a computer hardware or software occurs. On the other hand, a computer may become the 'subject' of a crime when it is used as an 'instrument' to commit traditional crimes such as fraud, theft, extortion, 'new' types of criminal activity such as denial of service attacks and malware, identity theft, child pornography, or copyright infringement (Cassim, 2011) p. 124.”
...