Answered You can hire a professional tutor to get the answer.

QUESTION

Create a 3 pages page paper that discusses the elimination of it crimes by knowledge management approaches.

Create a 3 pages page paper that discusses the elimination of it crimes by knowledge management approaches. The Elimination of IT Crimes by Knowledge Management Approaches Background Criminal groups across the globe are benefitted from modern technology asthe integration of various communication channels enables them to maintain strong relationships between each other. According to Arreymbi (2005, pp.289-291), since the modern banking business widely employs innovative computing techniques and most modern information technologies, it assists criminal groups to close international delinquent transactions easily. Longe, Ngwa, Wada, Mbarika, Kvasny (2009) also point out that the revolutionary developments in the field of electronics have greatly aided the criminal groups to get easy access to the new technical means, and thus embezzle huge funds, avoid tax barriers, and launder large sum of illegal money. These types of information technology crimes have become one of the major concerns for government and other legal authorities. Cherkasov opines that the IT crimes can be eliminated to a large extent through knowledge management approaches. An IT crime specifically refers to “an unlawful act wherein the computer is either a tool or a target or both” (Darjeeling Police). Hence, the computer users must be aware of the cyber threats while logging on to their accounts. Firstly, physical security is an important factor. In the view of Newman (2010, p.228), organisations and other government authorities must ensure that their computer network is protected from the access of unauthorized persons. A well designed access control system would also prevent IT crimes to some extent as it does not allow unauthorized communications between internal and external network. In the words of Proctor, Lien, Vu, Schultz, Salvendy (2002), since organizations or other governmental institutions may have large volume of data to store, it is better to set username and password for secret data. The timely changing of passwords increases the safety of organizational data, and protects firms from the threats of computer hackers. Similarly, the system managers must detect the weaknesses in the network ‘before the intruders do’ (The economic times). It is identified that holes in the network is a crucial factor that enables the hackers to access organizational information. As Manzuik, Pfeil, Gold, and Gatford (2007, pp.88-90), cyber defense agencies have suggested that network scanning programs would be of great help to minimise the IT crime rates. UNIX, a security administration’s tool freely available on internet, scans and collects information about host on a network if there exists any. This utility examines different threats including bugs, inadequate password protection, and other security weaknesses. Horwitz (2003) suggests computer Oracle and Password System (COPS) as another network scanning program that mainly scans for threatening file permissions and poor passwords. Recently, some effective intrusion alert program have been developed in order to identify suspicious activities and thereby to take immediate preventive measures. These programs operate constantly so that suspicious activities on network are identified immediately. Usage of encryption would also be a very effective method to prevent IT crimes. Research aims This research aims to identify effective tactics that can eliminate major IT crimes. The Computer Security Institute (as cited by Cherkasov) reports that 90% US companies were under the threat of computer attacks in 2002 and almost 80% of them suffered minor and major damages as a result of hackers’ activity . This data indicates the intensity of IT crimes. However, it seems that most of the organisations are still unaware of the threats regarding information safety. This condition further helps criminal groups or hackers to get access into firms’ weaker networks. UK’s Parliamentary Office of Science and Technology (2006), reports in ‘Postnote: Computer crime’ that IT crimes have adversely affected the nation’s economic interests during the last few years. the major role of increasing crime is attributed to the ignorance of computer users. In short, IT crimes and associated impacts can be mitigated notably, provided that organisations practice knowledge management approaches effectively. This paper will suggest some immediate steps that can be effectively practiced to address the issues related to IT crimes. Research objectives The research intends to propose a potential action plan that can effectively give recommendations to the beneficiaries. It is possible only by enhancing knowledge management practices across the firm. In brief, it is advisable for the cyber defense agencies to conduct security awareness programs for organisations and other beneficiaries. Media can be widely utilised for enhancing awareness as people spend considerable amount of time on them these days. An expert team of IT professionals assigned by government can make visits to organisations across the country for giving specific advice to network system managers. This strategy would be helpful to organisations since nature of holes in network varies from firm to firm. References Arreymbi, J 2005, “Online banking: Spoofing scams exposes security loopholes”, In ISSE 2005 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference, (Eds.) S. Paulus, N. Pohlmann & H. Reimer, Vieweg, Germany. Cherkasov, V (n. d), ‘Information technologies and organized crime’, Computer Crime Research Center, Viewed 04 July 2011, ‘Darjeeling Police’, n.d, Viewed 04 July 2011, ‘The Economic Times’, Viewed 04 July 2011, Horwitz, J 2002, Unix System management: Primer Plus, Sams Publishing, USA. Longe, O, Ngwa, O, Wada, F, Mbarika & Kvasny, L 2009, ‘Criminal uses of information & communication technologies in Sub-Saharan Africa: trends, concerns and perspectives’, Journal of Information Technology Impact, Vol.9, No.3, pp.155-172. Manzuik, S, Pfeil, K, Gold, A & Gatford, C 2006, Network Security Assessment: From Vulnerability to Pitch, Syngress Publishing, Canada. Newman, RC 2009, Computer Security: Protecting Digital Resources, Jones & Bartlett Learning, USA. Proctor, RW, Lien, M, Vu, K, Schultz, EE & Salvendy, G 2002, ‘Improving computer security for authentication of users: Influence of proactive password restrictions’, Behavior Research Methods, Instruments, & Computers, Vol. 34, No.2, pp. 163-169. ‘Postnote: Computer crime’, October 2006, Parliamentary Office of Science and Technology, No.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question