Mitigating Computer Fraud in the Online Environment

2273 Words10 Pages
Mitigating Computer Fraud in the Online Environment Introduction Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch & Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledge to safeguard themselves and the institutions they attend or work for, cost those institutions and themselves billions of dollars every year, and the cost is rising (Custer, 2010; Internet Crime Complaint Center, 2009). This lack of…show more content…
The greatest percentage of thefts of private information is from incorrectly stored backup tapes, external hard drives, or laptops. Existing laws order companies to alert affected individuals of a potential breach of their data. It is expected that the price tag of the typical breach of educational data will span from $210,000 to as much as $4 million from the costs of notifying affected individuals alone (Custer, 2010). Still, another type of cybercrime concerning human error is scams. In 2011 more than 20,000 recorded infringements involved four types of crime (Internet Crime Complaint Center, 2011). One of these types was FBI-related scams, in which someone impersonates a FBI agent to cheat victims, while another is personal identity theft, in which someone uses the victim’s personal identifying data to perpetrate a crime. The other two types are advanced fee fraud, in which a perpetrator persuades the victim to pay a fee to acquire something of value but without ever providing it and the non-delivery of products, in which the victim pays for merchandise that never arrives (Internet Crime Complaint Center, 2011; Ivan et al., 2012). Increasingly, information breaches happen because of resentful or dissatisfied employees (Custer, 2010). Presently, the main risk to data’s confidentiality, availability, and integrity within a company is careless treatment or purposeful destruction by in-house
Open Document