Monday, June 17, 2019
Cybercrime Research Paper Example | Topics and Well Written Essays - 2000 words
Cybercrime - Research Paper ExampleThis IP operated similar to a house address and stand for a specific group or a company. therefore there was an automatic controls system on the internet IP could be traced. This stopped battalion from trying to use internet as a means of stealing money or another fraud activity because they k rude(a) that it could be traced back to them. In the last decade however the growth of internet has been phenomenal. From a mere few million users of the nineties it has grown in to billions. This growth has made it unachievable to maintain the old system. Moreover the wireless internet system has made it even more difficult to track internet criminals. This is because airports, bus terminals and even Starbucks burnt umber shops all have wireless internet facilities. These facilities operate on temporary IPs. This therefore means that each time you connect to the internet a new IP address is assigned to your computer. Thus it becomes almost impossible to track and convict criminals on internet fraud. The conviction becomes even more difficult as it is not easy to prove anything in the court of law.One of the most popular cyber crimes is the Credit Card frauds. This type of fraud has increased over the eld with the increase in usage of credit cards. The availability of all types of services through credit cards ensures that they become an attractive option for fraud, especially when it comes to online purchases. There are millions of business in US and Europe which only accept payments through credit cards. This is no longer restricted to online services as it did in the nineties. Businesses like Netflix have ensured that customers rely completely on credits cards for all types of consumer items.Credit card fraud is the term used for describing the fraud or theft of money committed by using the credit cards in illegal payments and money transactions to obtain illegal goods and services or to illegally transfer funds from others acco unts. They are among
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.