Itech3002 Group Social Computing Issues Answers


  • Internal Code :
  • Subject Code : ITECH3002
  • University : Federation University
  • Subject Name : IT Computer Science

Professionalism and Entrepreneurship

Executive Summary of Group Social Computing Issues

E-commerce is an essential portion of marketing activities. One of the challenges facing cyber-business or e-business is that it is dangerous for e-crime, known as cybercrime. Cybercrime can disrupt corporate marketing activities. This study examined the case study in public trading firms affected by cybercrime as well as its impact in society.

Table of Contents

Introduction.

Social computing issue.

Overview of issue by Combating cybercrime.

Impact on society by Combating cybercrime.

Case study examples by Combating cybercrime.

Ethical issues by Combating cybercrime.

Conclusion.

References.

Introduction to Group Social Computing Issues

Social computing has come to mention three matter, including mining social data, building of system that communicate with human networks, and development of algorithms that use social and personal features. Such three branches have different technical challenges (Abedin & Qahri-Saremi, 2018). This study will provide an overview of combating cybercrime and also examines case study example in public trading firms damaged by cyber criminals and their impact on society. The finding show that the cost of crime outweighs stolen assets, lost business and corporate reputation. This study will also identify ethical issue in combating cybercrime.

Social Computing Issue

Overview of Issue by Combating Cybercrime

Most e-commerce is on the websites of public trading companies. The term "virtual space" usually refers to the electronic devices of computer networks in a web network when performing online networking. Cybercrime can disrupt corporate marketing activities. Cybercrime causes billions of dollars per annum in stolen assets, damaged reputation, and business losses to public trade firms (Jansen & Leukfeldt, 2018). When an organization is a victim of cybercrime, customers may be concerned about the safety of business transaction with the organization. Therefore, if the organization is caught at risk of cybercrime, it may lose business in the future. This vulnerability could lead to a drop in corporate market prices because of concerns from investors, creditors, and financial analysts (Leukfeldt & Yar, 2016).

Impact on Society by Combating Cybercrime

Cybercrime affects people offline or online in many ways. Being a victim of cybercrime can have a long-term effect on life. A common tactic used by scammers is phishing, by sending fake emails to get personal information from banks or other financial institutions. Cybercriminals focus their attacks on both small and large business. Hackers can try to conquest business servers to steal data or use machines for their own purposes, so organization needs to hire employee and update software to save companies alive. Cybercrime can lead to general financial loss (Rathore, 2016). According to the report by Symantec in 2015, above 1.5 million individuals are victims of crime daily, starting to steal passwords that are easy to crack financially irresistible. By the average loss of $198 per victim, it adds up to above $110 billion lost to criminals annually across the world. Cybercriminals have created a new strategy involving social networks and mobile devices to allow these illegal streams to flow as consumers become aware of the potential for traditional ways of attack (Leukfeldt, Lavorgna & Kleemans, 2017).

Case Study Examples by Combating Cybercrime

Massive ransomware attacks have affected more than 16 hospitals across the UK. Between May 12 and May 19, 2017, there were ransomware-related attacks on the NHS that resulted in above 34% of trusts. The attack began at midnight 12.30 PM local time, encrypting files and freezing system according to the report of Guardian. When employees try to access the computer, they were presented with the demand for $300 in Bitcoin, as a classic ransomware strategy. The result is a wave of canceled recruitments and general chaos, because numerous hospitals are not able to access basic medical records. At the very least, a hospital has canceled all non-emergency surgeries (The Verge, 2020).

According to the National Health Service, the criminal was a ransomware strain called Wanna Decryptor (also recognized as the Wannacry). Although operations in hospital have been severely affected, there is no indication that patient data has been compromised. Their focus is on supporting organizations to deal with these incidents decisively and quickly but they will interact with NHS colleagues and share more information as it becomes accessible.

It is not clear how the hospital will recover from the attack. No published decryption key has been issued for WannaCry as well as the costs of infection claimed by the program have exceeded $300. NHS Agency does not report any case of damage to patients or their data being stolen due to The WannaCry. As a result of the ransomware, NHS England has recognized 6,912 appointments with operations, which were cancelled. However, it is assessed that 19,000 appointments may have been affected (The Verge, 2020).

Ethical Issues by Combating Cybercrime

The new world of information communities, including global networks and virtual worlds, will certainly create a variety of political, ethical, and social issues. Although most community activities are conducted in cyberspace, there are many issues related to human and community relationships (Umanailo et al. 2019). The most basic ethical issues related to the use of IT in global networks include the right to access data, personal privacy, and harmful practices on the Internet. These major problems have been partially resolved using technological approaches, for example SSL, encryption techniques, computer firewall, and digital ID. In addition to these security technologies, legislation is needed to address hundreds of countries in cyberspace, including a global network. Strategies and guidelines should be executed so that information can be used globally through social and ethics sensitive to the benefit and the upcoming application. Policy issues and other important issues need to be addressed with businesses, governments, educational institutions, private and public sectors across the world (Van de Weijer & Leukfeldt, 2017).

Conclusion on Group Social Computing Issues

The study identified the cost of cybercrime, how they interfere with marketing and business activities, and also cases where the business entity is officially under criminal activity. Also, the survey analyzes the impact of criminal news coverage on shareholder value. As a result, a publicly traded company will not fall victim to cybercrime and should make every effort to avoid negative impact on marketing activities. To protect against cyber criminals, an intrusion detection technique needs to be developed. Strategies include configuration checking tool, tripwires, and anomaly detection system. As a result of prevention strategies, organizations need to create procedures to investigate and recover from a cybercrime incident.

References for Group Social Computing Issues

Abedin, B., & Qahri-Saremi, H. (2018). Introduction to the special issue—Social computing and service innovation: A framework for research. Journal of Organizational Computing and Electronic Commerce28(1), 1-8.

Jansen, J., & Leukfeldt, R. (2018). Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice and Criminology6(2), 205-228.

Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior37(3), 263-280.

Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research23(3), 287-300.

Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT)5(1), 7-11.

The Verge (2020). UK hospitals hit with massive ransomware attack. [Online] Available at: <https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin> [Accessed on: 18 September 2020].

Umanailo, M. C. B., Fachruddin, I., Mayasari, D., Kurniawan, R., Agustin, D. N., Ganefwati, R. & Sutomo, S. (2019). Cybercrime case as impact development of communication technology that troubling society. Int. J. Sci. Technol. Res8(9), 1224-1228.

Van de Weijer, S. G., & Leukfeldt, E. R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking20(7), 407-412.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help


Book Online Sessions for Itech3002 Group Social Computing Issues Answers Online

Submit Your Assignment Here