Many organizations experience employee abuse of the internet. This abuse of the internet can be defined as any use of the internet for personal purposes during work hours. This behavior can include accessing personal social media sites, blogging sites, news sites, shopping and accessing inappropriate content such as pornographic sites. Employees need to be aware that there are consequences for this type of abuse. In order for organizations to protect their business interests, policies should be created and enforced in order to protect the business and other employees from any violations or repercussions.
In 2013, a man, investigators named the “Sexual Cyber Terrorist” extorted over 350 women by hacking into their email accounts and baiting them into giving him nude photos. If the women did not comply with his demand he threatened to hack into their social media accounts and posting photos that he allegedly already had of them. Another ploy to obtain these photos from women would be to pose as close friends and get them to send nude photos. After a thorough investigation the FBI found more than 3,000 nude to seminude photos of victims. The “Sexual Cyber Terrorist”, Karen (Gary) Kazaryan was sentenced to 5 years in federal prison after pleading guilty to all charges.
Bennett-Alexander, D., & Hartman, L. (2009). Employment law for business. (6 ed., pp. 247-249). New York, NY: McGraw-Hill/Irwin.
Walsh, D. J. (2013). Employment law for human resource practice (4th ed.). Mason, OH: South-Western Cengage
When talking about cybercrime, we need to understand why it has become a big issue and how it affects all of us and our daily lives. In today’s society, a considerable amount of our daily activities are done over the internet including some on public sites such as social media and others behind password protected portals such as our online bank accounts. We communicate, shop, socialize, and control or manage most of our devices over the internet. With all this information available via the internet it becomes a treasure chest for cyber criminals filled with valuable information that can be stolen. Cybercrime is a
J. (2013). Employment law for human resource practice (4th ed.). Mason, OH: South-Western Cengage Learning.
Bennet-Alexander, Dawn D., Hartman, Laura P. (2003) Employment Law for Business, 4th edition. The McGraw-Hill Companies
In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.
Cyber threats have increased dramatically over the past few years, with large companies such as Amazon, Netflex, PayPal, Wikipedia and most recently Equifax, experiencing high profile breaches. Traditional tools, defenses and responses have been strained with keeping up with the level and sophistication of an very organized and ubiquitous hacking community, which has coalesced into organized crime syndicates that the FBI and law enforcement continues to battle.
Times have changed what was known as organized crime has been replaced by Cybercrimes (Heists: Cybercrimes with Ben Hammersley). Cybercrimes have risen dramatically in recent years and have become a major issue the United States and company’s face today jeopardizing as well as threatening the critical infrastructure of America (Cyberwar Threat, 2005). Sadly, the status quo of cyber security is very unstable with the advancements and growth which has put most individuals and businesses into an enormous threat (Agustina, 2015).
1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu
Bennett-Alexander, D. & Hartman, L. (2015), Employment law for business (8th ed.), New York: McGraw-Hill Education
There are countless instances and types of internet abuse. The possession and distribution of child pornography is an exceptionally alarming problem. Without online monitoring of any kind, those who exploit children will face no consequence. The children themselves will see no justice. We as a nation must decide what we place more value in, whether it be the safety of children or the freedom from government interference online.
The Internet is a global network of vast information. With a few clicks, an individual can have access to up to 200 million web-sites filled with educational and recreational information. The Internet is not regulated in anyway (Carnegie Library 1). It is accessible throughout the entire world from the North to the South, to the early morning sunrise and dark sunsets. Different ethnicity and backgrounds come together linked upon this network resembling a connection of one body in unity. Sadly, issues arise creating concern for users, focusing particularly on minors. Pornography is one of the inappropriate materials on the Internet for minors. This material is harmful to young impressionable minds. Pornography is tearing and
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).