Describe an instance of which you are aware in which an act of internet crime took place.

  1. Answer to the following discussion question: (Minimum 250 words with 2 APA references)

Please describe an instance of which you are aware in which an act of internet crime took place.

  1. Respond to the following discussion post which was posted by another student (minimum 100 words) – Zhiwei Zhao

A very clear incident is the facebook data leak.

The US Federal Trade Commission is reportedly investigating social media giant Facebook, whose personal data of 50 million users was accused of being abused by Cambridge Analytica, a British political consultancy.

The “Cambridge Analysis” company is facing the use of personal data to influence the US 2016 presidential election and the UK Brexit referendum survey.

What kind of company is “Cambridge Analysis”? The company’s website boasted that it has supported and conducted more than 100 events on five continents, covering much more than the United Kingdom and the United States.

“Cambridge Analytical” has suspended the position of CEO Alexander Nix. On Channel 4 of British TV on Monday (March 19), a video of a secret filming of a Knicks undercover interview was broadcast on the station. The Knicks exemplified how the company can influence elections by tricks, such as smearing candidates or applying traps or temptations.

The UK-based company denied any wrongdoing. “Cambridge Analysis” has a lot of activity records around the world, let’s take a look at what:

Knicks, CEO of “Cambridge Analysis”, was filmed by undercover reporter on Channel 4 TV

Europe

“Cambridge Analysis” company executives said in a video program broadcast on Channel 4 TV that “Cambridge Analysis” and its parent company “Strategic Communications Lab” have participated in more than 200 elections held around the world, including Czech Republic.

Company director Mark Turnbull said, “We just used an agency to operate a very, very successful project in Eastern European countries, and no one even knows they were there.”

The “Cambridge Analysis” website also stated that the company represented the “Revival Party that was successful in the 1980s” in the 2012 Italian political campaign.

“In the turbulent Italian political arena, the ‘Cambridge Analysis’ company’s reform proposals made the party’s performance exceed the original expectations.”

But the role of the “strategic communication lab” can be traced back further. It claimed to have helped Ukraine launch a color revolution in 2014, bringing pro-Western President Viktor Yushenchenko to power.

An old article published on the “Strategic Communications Lab” website said, “The ‘Strategic Communications Lab’ successfully maintained the cohesiveness of the alliance and ensured a hard-won victory.”

The “Strategic Communications Laboratory” recently stated that the Ukrainian government has hired it to provide “localized publicity campaigns” to help the Ukrainian side regain control of Donetsk in the eastern conflict.

The company said, “The final project report has been handed over to the President of Ukraine. This report will play a key role in future national decision-making.”

The “Strategic Communications Laboratory” stated that during the conflict in eastern Ukraine, it was employed to launch an “erosion and weaken” Donetsk anti-government organization.

  1. Respond to the following discussion post which was posted by another student (minimum 100 words) – Atilla Genc

With the dynamic nature of technology in the modern world, there seems to be a continuous rise in internet crimes. Internet crime basically refers to any crime in which illegal activity or crime is committed on the internet. (Chan, Ghose & Seamans, 2016). Internet criminals usually target a specific system in an organization information system to gain access to sensitive information or alter the working of that particular system to suit their ill motives. Internet crimes are conducted by a third party who is not legally allowed to access information or tamper with the information system of an organization or an individual. Organizations and individuals should therefore be aware of various ways through which their information systems may be prone to unauthorized access and influence.

Internet crime has been on the rise due to increasing computer literacy in most parts of the world. Though internet crime takes many shapes, the most common cases involve hacking, tracking, malware infection, and spying (Stalans, & Finn, 2016). In one of my previous place of work, we experienced a particular incidence of internet crime. The head of the IT department detected some changes made into a file containing some of the most sensitive information of our organization. The department head informed the management about the case, and investigations on what happened were launched. After the investigation, it was found that the criminal was a former IT head who had been fired before. It was due to the omission of the IT department and the management because they had forgotten to change passwords and lock employees account after termination. Had they practiced usual practice of locking employee accounts and changing systems passwords, this incidence could have been avoided.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: