THE BAD EFFECTS OF CYBERCRIME

 THE BAD EFFECTS OF CYBERCRIME



The gains of computer technology have not been without drawbacks. Despite the benefits of technology, cybercrime, a new and particularly hazardous type of crime, poses a threat to modern living. Many businesses and government agencies would be unable to function without computers. As more people access affordable, robust, and user-friendly computers, they have begun to incorporate them into their daily lives. As legitimate users (including organizations and governments) become more reliant on them, so does their illegal usage. Cybercrime can only be controlled by thoroughly examining behavioral patterns and understanding how they affect various segments of society. As a result, this article will investigate the negative impacts of cybercrime on sectors such as sociopolitical stability, consumer trust, youngsters, and so on.

First, the phrase "cybercrime" should presumably be defined. As the term implies, cybercrime is any criminal behavior using a computer or other internet-connected technological device. Cybercriminals can range from individuals or small businesses with limited technical knowledge to well-organized, international criminal gangs with highly skilled developers and specialists.

Cybercriminals or hackers commit the vast majority of cybercrimes for financial gain. Cybercriminals come in a variety of shapes and sizes. Cybercriminals may also exploit computers or networks to distribute viruses, malware, pornographic material, and other illegal data. Cybercriminals steal and resell personal information for financial gain, hack into bank accounts, use stolen credit cards to conduct unauthorized purchases, and commit other financial crimes.

Here are some examples of cybercrime:

  • The most common type of cybercrime is the unauthorized use of a victim's credit card details to make online purchases.
  • Another type of cybercrime is the theft of government information, hacking into a government website, and modifying the content there.
  • Yahoo had a massive data breach between 2013 and 2016, exposing three billion user accounts to theft. Several victims' passwords and personal information were stolen, allowing the attackers to access their accounts on other websites. The vast majority of this data is still accessible via the deep web.
  • Hackers accessed over a million Internet of Things devices in 2016 by exploiting pre-existing software flaws. The most incredible distributed denial of service (DDoS) attack affected Netflix, PayPal, and Twitter.
  • The purported North Korean WannaCry assault in 2017 released ransomware that encrypted user content, resulting in a loss of control and access to such data. The malware quickly spread over the world, affecting 300,000 machines. The victims had to spend hundreds of dollars to have their data restored.
  • Phishing email-based attacks: Phishing campaigns infiltrate company networks by sending seemingly legitimate emails to employees to convince them to take action (such as opening an attachment or clicking a link), allowing attackers to obtain sensitive information. Viruses and malware commonly spread to afflicted organizations' more extensive network infrastructures after attacking a machine.

Cybercrime includes unlawful gambling, soliciting, creating, distributing, or possessing child pornography, and selling illegal things such as drugs, guns, or counterfeit goods.

THE BAD EFFECTS OF CYBERCRIME

Criminals employ technology in several devious ways. Because it allows con artists and other thieves to work anonymously, the Internet is a handy weapon for them. Cybercrime has far-reaching societal consequences, both online and offline.

A single successful hack can result in monetary losses, intellectual property theft, and a loss of client confidence, among other consequences. Cybercrime is expected to cost businesses, governments, and individuals billions of dollars each year.

At least one cyber incident has been logged every day since 2006. Any credit card transaction that requires the card to be swiped offers a security risk. Furthermore, any computer system developed with software that allows multiple people access is vulnerable to malicious or competitive hacking (such as franchisees, vendors, or other providers). Every day, many people suffer the anguish of having their valuable mobile gadgets stolen or misplaced. Let's take a quick look at how cybercrime has damaged various sectors.

THE BAD EFFECTS OF CYBERCRIME ON ECONOMY



The most severe consequences of cybercrime are:

  • Financial and economic hardship.
  • The loss of critical intellectual property and sensitive data.
  • A decrease in international trade income.

Every year, cybercrime costs global businesses $600 billion (0.8% of global GDP). This represents a 34% increase over the $445 billion reported in 2014 or an 11.3% annual growth rate for the three years leading up to June 2017.

According to the most recent estimates, cybercrime costs Europe 0.84 percent of its regional GDP, compared to 0.78 percent in North America (CSIS). This progression can be attributed to the proliferation of new cybercrime resources and the increasing number of cybercrime centers.

Costs Around the WorldCriminal behavior on the Internet has grown far beyond cybercrime to cover almost every known unlawful activity. According to a senior British official, cybercrime accounts for 50% of all crimes in the country. We developed a criterion that considers the expense of hackers breaking into a victim's computer or network to steal information. The following factors contribute to the cost of cybercrime based on these criteria:

  • Trade secrets and other confidential data are lost.
  • It is critical to remember that identity theft is frequently at the root of internet fraud and other financial crimes. Financial fraud includes unauthorized access to publicly traded firms' financial reports and collecting secret business information for possible acquisitions.
  • Loss of trust in doing business online; interruptions in service or output. 
  • You are paying for preventative measures such as cyber insurance and insurance for the damage caused by cyber assaults.

Cybercrime is predicted to cost tens of billions to several trillion dollars. This is because of a lack of evidence and competing hypotheses. Because information is sometimes sparse and inconsistent, economic history studies are well-suited to estimating the monetary consequences of cybercrime. This modeling effort seeks to approximate the $600 billion estimated global cost of cybercrime by the CSIS.

  • Concerns About Estimates

A variety of reasons make estimating the financial impact of cybercrime difficult. Because different countries have different reporting standards for firms, it is already tricky for victims to come forward and for the government to collect information. According to their findings, just 13% of cybercrime in the United Kingdom is ever reported.

Furthermore, many businesses fail to admit to being victims of cybercrime, exacerbating the situation. It is challenging to obtain reliable national statistics, and official estimates must be corrected. Underreporting is the most significant barrier to determining the actual cost of cybercrime. Only a small percentage of losses are reported due to legal liability and public opinion concerns.

Furthermore, calculating the monetary cost of people avoiding online transactions owing to security concerns is challenging. Despite signs of progress, the temptation of digital technology needs to be more vital for individuals and businesses to abandon them.

Finally, our total cost estimate lays the burden on governments rather than individual businesses or consumers. It ignores the unequal distribution of casualties. If a country has ten enterprises and incurs $100 in annual cybercrime damages, the average cost per business is $10. According to the actual allocation, two businesses lose $50, while the remaining eight either break even or earn. Companies suffer varying degrees of loss, and some may be unaware that an assault has occurred.

  • Financial transactions involving cybercrime

The financial industry remains a frequent target for skilled hackers. This has been the situation since the early 2000s. Financial institutions hold a disproportionate responsibility for cyber theft and fraud prevention. According to a poll, financial institutions spend three times as much on cyber protection as other companies. This suggests that bank executives consider cybercrime a "systemic" threat to the financial system.

National governments are the most dangerous cyber threat because they have the resources to commit cybercrime, the technological expertise to counter it, and the legal protection to conceal their operations. Iranian, North Korean, and Russian computer intrusions into financial institutions are the most common; Center for Strategic and International Studies (CSIS). The Chinese continue to be the most active espionage nation. The Iranian DDoS attacks on critical US institutions aimed to exert pressure to achieve Iranian goals.

This region is home to many of the world's most skilled hackers, whether governments employ them. If these governments do not change their policies, cybercrime will continue to be a global problem.

  • Ransomware

Ransomware is currently the most concerning cybercrime trend. Ransomware has affected individuals and organizations of all sizes. Even though the typical ransom is less than $200, cybercrime is rising for various reasons. Even though a sizable number of victims will not pay the ransom, a sizable proportion of victims will. In comparison, ransom payments totaled only $24 million in 2015, reaching a staggering $209 million in the first three months of 2016.

Why has there been such dramatic growth in size? In the early days of ransomware, victims were sent CDs containing surveys that asked them to evaluate their chances of contracting AIDS. They were asked to wire $189 to a Panama PO box after the spyware on the CD froze their machines. Much has changed since then; for example, individual users' reliance on ransomware has given way to widespread viruses. In 2015, criminal organizations frequently launched ransomware operations after developing the necessary software. In 2016, 70 new ransomware families were introduced, more than double the number introduced between 2012 and 2015.

The occurrence of ransomware worms, which may spread across networks and lock out far more devices than the one from which they intended to demand payment, is rising. Future attacks like WannaCry, which exposed the inner workings of these infections, are likely. In future ransomware assaults, the software is expected to block the user from accessing the system and encrypting and erasing the target data.

Last but not least, mobile devices are likely to be the primary target of ransomware. Since Android ransomware kits are beginning to surface on the market, hackers are most likely seeking to exploit the enormous number of vulnerable mobile devices in use worldwide. In the absence of appropriate security measures, criminal actors are expected to target IoT devices, particularly industrial IoT equipment, increasingly.

  • Cyber criminality as a Service (CaaS) 

Over the last two decades, cybercrime has evolved into a lucrative career. The cybercrime industry thrives, and individuals participating in it have access to various services and instruments. Never before have so many tools and resources for cybercrime been freely available to the public. As a result, the scope and severity of the cybercrime threat have expanded.

A new breed of cybercriminal arises when previously unavailable cybercrime tools and platforms become more widely available. Because of the increasing complexity of the dark web's ecosystem, seasoned criminals can focus on honing their skills, knowing they will find accomplices to assist them in building weapons of unfathomable complexity.

The development of new actors and increased scrutiny have contributed significantly to expanding the cybercrime ecosystem. To avoid detection by authorities, thieves have turned to the dark web, where cryptocurrencies like Bitcoin and anonymizing software like Tor may be used to protect their anonymity. Because establishing trust in these societies is challenging, many marketplaces have introduced escrow payment techniques to simplify high-risk transactions. As a result, numerous merchants have begun to provide customer care and assurances that buyers will receive a refund if they are dissatisfied with their purchases.

The business sector is split, as crooks interact in hidden chat rooms to avoid detection. Despite this, these platforms have become the foundations of a thriving cybercrime economy, handling everything from product development and technical support to distribution, quality assurance, and help desk services.

  • Intellectual property theft                       

The most expensive types of cybercrime are intellectual property theft and the leaking of corporate secrets. Cybercrime is a multi-billion-dollar industry that targets far more than traditional government targets (such as military hardware).

One method for attempting to assign a monetary value to intellectual property theft is to quantify the amount of money lost by legitimate businesses due to the sale of illicit copies. Intellectual property theft from a medium-sized corporation, such as product concepts, can have disastrous effects. Huge organizations' profitability may suffer due to new companies entering the market and competing with them.

Cybercrime can have disastrous consequences for national security when military technology is jeopardized. Often, the victim is oblivious to what they have lost. They can still employ the stolen ideas. As a result, a decrease in revenues may be due to greater competition rather than stealing.

  • Identity theft is the theft of a person's identity.

Following recent high-profile data breaches, many Internet users are understandably anxious about the possibility of identity theft. However, according to statistics gathered by the Bureau of Justice Statistics (BJS) between 2012 and 2014, the financial impact of identity theft continues to be remarkably low. According to the BJS research, identity theft cost $25 billion in 2012 and impacted 16.6 million people.

This corresponds to about $1,500 per incident, which is a lot of money but manageable for most people. Only 14 people out of every 100 experienced financial troubles, and the vast majority of those individuals lost less than $99.

So, why should you be concerned about identity theft? Property theft costs the United States $10 billion more than all other types combined. Second, more than two-thirds of victims had no idea their accounts had been compromised. When your identity is stolen, you feel powerless and vulnerable. There is reason to be concerned about an unseen crime with far-reaching consequences. It is only sometimes the case that banks and credit card companies bear most of the costs associated with identity theft.

  • Email Intrusion

Email Intrusion in the Workplace Identity theft enables thieves to pose as a corporation's CEO or CFO and seek expensive wire transfers. Because the CEO could not contact the CFO, he directed a subordinate of the CFO to transfer $10 million to a new bank account for a supplier. The "supply" account was fictional to reduce the chance of detection, and cash was quickly transferred out of it per the instructions.

The Federal Bureau of Investigation (FBI) has initiated a public awareness campaign intending to draw more attention to the prevalence of this practice among influential businesspeople. More than $5 billion has been stolen in these types of assaults since 2015. Over 22,000 firms worldwide have been harmed by email intrusion. The FBI warns that banks may find it difficult to detect and avoid email compromise when a valid, authorized customer employee conducts a transaction via email. Losses continue to grow despite banks' efforts to educate customers about risk. Companies are also hesitant to brag about their accomplishments, preferring to incur losses.

THE BAD EFFECTS OF CYBERCRIME ON GOVERNMENT



Governments at all levels are increasingly relying on technology and the Internet to deliver critical services due to their increasing reliance on these technologies. This reliance raises the likelihood of hacks and information leaks.

During a data breach, residents' personal information with their names, ages, and Social Security numbers saved on a server maintained by their local government is in danger of being stolen or compromised. Personal health information (PHI) is another type of data kept by government agencies that, if compromised, might cause significant problems for government employees.

Phishing, hacking, and insider threats are on the rise, and each can result in significant financial losses and emotional distress for those whose personal information has been compromised. The following examples demonstrate this:

  • In April 2015, a data breach at Florida's Department of Children and Family Services (DCF) jeopardized the personal information of thousands of Floridians. A governmental employee caused the breach by abusing system access provided as part of their job.
  • According to the DEO, one of its employees violated the security of the Florida ACCESS system, which the Florida Department of Children and Families maintains. Then he received the IDs and Social Security numbers of over 200,000 DCF-registered persons. The DEO employee was detained in March 2015 on suspicion of PII trafficking and misuse.
  • One hundred fifty Los Angeles, California; In May 2016, local employees were duped by a phishing scam, revealing the usernames and passwords of around 756,000 county agency clients.
  • According to the 2016 Cost of Data Breach Report published by IBM, the typical cost of a data breach rose from $3.8 million to $4 million over the year. According to the research, the average price of a lost or stolen record containing personal information climbed from $154 to $158.

In August, the United States Senate's bipartisan Homeland Security and Government Affairs Committee issued a report updating the public on cybersecurity in government institutions. According to "Federal Cybersecurity: America's Data Still at Risk," there were numerous areas of concern two years after a previous examination in 2019 identified significant cybersecurity shortcomings.

The opportunity to access sensitive information, disrupt activities at the highest levels of government, and influence policymaking has long attracted hackers to target the federal government online. It's hardly unexpected that cyberattacks on federal, state, and local governments have grown faster than in other industries, given that they've been warned twice that conducting a successful cyberattack may be easier than they previously imagined.

  • Improving Ransomware

Historically, crypto-ransomware attacks, which encrypt the data of a victim and demand payment in exchange for the decryption key, have caused turmoil in hospitals, police departments, schools, and other essential public-sector institutions. Here are a few examples:

  • Ransomware hindered the Lansing, Michigan, Board of Water and Light from communicating with its employees and customers in April 2016. The attack cost the city-owned utilities over $2 million in technical assistance and security equipment. 
  • The Collinsville, Alabama, police department refused to pay the ransom in June 2016 and consequently lost access to a mugshot database.
  • Terrorists attempted to attack the Cockrell Hill, Texas, police station in 2016. The department assumed it could retrieve data, but it lost eight years of digital evidence, including documents, spreadsheets, body-worn and in-car camera footage, photographs, and surveillance video, because it needed to back up its data effectively. 
  • The Roxana, Illinois, police department was infected by ransomware in February 2017. The episode cost the city a lot of money and effort, but the police department refused to pay the ransom. Rather than paying the ransom, the government agency "wiped the system." All critical data has been backed up; restoring these backups to a workable state for the department will take significant time.

According to the most current SonicWall Cyber Threat Report for 2021, ransomware increased by 151% year over year during the first half of the year. Attacks against federal, state, and municipal governments, on the other hand, grew by a significantly more significant percentage.

There were 4,4 million attacks on government clients in the first six months of 2020. This figure rose to 44.6 million by 2021, representing a 917% rise and the most significant growth rate of any sector studied by SonicWall.

Even if the encryption of government data was bad enough, a couple of these attempts used double extortion to boost the chances that their targets would pay. After stealing a significant amount of data, the crooks encrypt it and demand a ransom. Then they threaten to reveal the information as an "insurance policy" if the target has implemented security measures such as keeping recent backups, and so on.

The Washington, DC, police force was the intended target of such an attack in April 2021. If the department did not pay the ransom, the attackers threatened to give vital information about informants to local gangs.

A similar cyberattack was also launched on the Illinois Attorney General's Office. A federal audit concluded in February 2021 that the agency lacked proper cybersecurity measures. A ransomware organization attempted a double extortion attack two months later, and some of the stolen data were eventually shared online, all because the department ignored the recommendations.

Triple extortion is the most recent form of this detrimental practice used by hackers, in which payment is requested from consumers, partners, and other third parties.

James Comey, the former FBI director in the United States, claims, "Traditional crimes are being displaced by cybercrime. Criminals that want to steal money harm children or commit fraud to congregate online."

China, Russia, and North Korea are just a few foreign countries with a history of hacking. Despite this, millions act independently and access hacking tools from the dark web.

Because programming and networking skills are no longer required, anyone with an Internet connection and a computer can become a hacker.

What exactly is a legal obligation?

When a security system is breached, immediate losses are the beginning. The resulting class action lawsuit will be painful if a local government's online fee payment system exposes credit card information. Still, only a tiny fraction of harmed residents will suffer genuine, unreimbursed losses. Banks and insurers were typically on the hook for their losses.

What do you tell voters whose personal identity thieves have stolen information and health data due to state or municipal government actions (or inactions)? After an event of this nature, what steps can be taken to restore the public's faith?

You must protect sensitive information when you have it. There may be consequences if you avoid this responsibility.

  • Consider the illegal uses of your organization's data collection and processing.
  • The use of personally identifiable information may result in identity theft. 
  • Competitors may utilize information about regulated firms against them.
  • It is possible to execute competitively advantageous measures if one is familiar with government procurement, contracting, and economic development policies.
  • If sensitive information about current civil, criminal, or administrative investigations becomes public, the integrity of the inquiry may be jeopardized.

The public could utilize private information about government employees to punish them for alleged misbehavior.

Exclusions and other insurance complications

While the security of a government insurance policy is apparent, the tremendous costs associated with data breaches may cause some insurance companies to deny coverage.

If the policy does not explicitly cover such harm or if the insured organization fails to comply with the insurer's security standards, insurers are more likely to withhold payment in the event of a data breach.

A government organization may be able to receive insurance against cyberattacks and data breaches, provided certain conditions are met. When a claim is made, it is reviewed; if all safety procedures were not taken, the claim is refused.

In what appears to be an outstanding example, a data breach at the Cottage Health System of California damaged 30,000 records, including personally identifying information. In 2014, concerned patients filed a class action lawsuit against the healthcare provider, which resulted in a $4.125 million state court judgment.

Columbia Casualty insured Cottage Health against cybercrime, but the insurer expressed worry when it learned that the company had kept critical data on an Internet-connected server without encryption or other measures. The insurance company refused to pay. Consider what your community would do if a loss of this magnitude occurred unexpectedly.

It is necessary to educate oneself on every aspect of data breaches and cyberintrusions since this is the only way to mitigate the risks they provide adequately. For many years, the National White Collar Crime Center (NW3C) has been collecting data on white-collar crimes to study their effects on local, regional, and national administrations. This database is based on readily available data to the public and comes from various sources.

  • Cryptojacking

There were only a few reports of cryptojacking in 2021. Several things contribute to this being barely surprising: To begin if you're trying to fight the federal government, it's better to demand a ransom or steal data rather than mine bitcoins. Second, the impact of the government on mining was less newsworthy in 2021 than the impact of illicit mining on the government. (It is commonly considered that mining bans in China, Iran, and other countries contributed to bitcoin prices plummeting from their April highs.)

However, according to SonicWall's threat data for the first half of 2021, attacks on federal, state, and municipal governments are not just on the rise; they are significantly on the rise.

The number of cryptojacking attacks increased by 23% across all sectors in the first half of 2021. However, the number of cryptojacking attacks on government clients increased by 329 percent.

  • Attempts to weaken the Internet of Things

CISA issued a warning in August following discovery of vulnerabilities in various real-time operating systems during a research project (RTOS). This research, dubbed "BadAlloc," identifies several vulnerabilities in IoT devices that affect "multiple sectors for every aircraft, robotics, and train industrial control system," according to Vincent Sritapan, CISA's chief of the Cyber Quality Service Management Office.

Unfortunately, similar systems have previously been compromised. After seizing control of the water system in Oldsmar, Florida, in February, an assailant boosted the lye content to 110 times the safe limit.

  • Cyberattack in Cyberspace

Mille Lacs County, Minnesota, and Mikki Jo Petrick were ordered to pay $1 million to victims whose driver's license information was fraudulently obtained by Petrick while working for the Mille Lacs Department of Family Services. There were no allegations about the potential misuse of these data.

Some of these patterns may slow or even reverse if these institutions increase their efforts to adhere to cybersecurity best practices. If we don't, the types of attacks that have recently generated headlines will undoubtedly increase as cybercriminals focus on the biggest game.

THE BAD EFFECTS OF CYBERCRIME ON BUSINESS



Cybercrime, previously the domain of large corporations with a significant online presence, is becoming a worry for businesses of all sizes. Cybercriminals have shifted their focus to smaller companies and organizations because they are easier targets with fewer defenses. As a result, everyone is vulnerable; major corporations remain priority targets, but smaller businesses and individuals are also at risk.

Businesses and their customers' information is increasingly being held digitally, exposing them to cyberattacks. Customers may face higher prices due to the expenditures of combating cybercriminals.

According to Hiscox, a business insurer, cybercrime cost businesses $1.8 billion in 2019. Only the most secure organizations, even those with a significant internet presence, need to be concerned. The most affected industries were energy, finance, manufacturing, technology, and pharmaceuticals.

Several of the more profound ways cybercrime today affects businesses are discussed below.

  • Rising Prices

Businesses that are serious about safeguarding themselves from hackers must invest heavily. Companies may incur costs for, among other things, cyber security technology and expertise, breach notification, insurance premiums, and public relations support.

When ransomware infects a computer system, it locks users out and demands payment to re-enter. According to Hiscox, 6% of businesses will pay a ransom in 2019, resulting in a $381 million loss.

Companies may also need the help of attorneys and other specialists to verify that all applicable cybersecurity legislation is followed. Furthermore, if customers are assaulted, they may be charged additional penalties such as attorney fees and damages from civil actions against the business.

To cite one example, When one of the three major credit reporting agencies, Equifax, had a data breach in 2017, the personal information of 147 million customers was compromised. The corporation agreed to pay plaintiffs up to $425 million after legal action.

  • Issues with Standard Operating Procedures

Cyberattacks expose enterprises to direct monetary losses and indirect costs, such as the likelihood of significant operational disruption, which can result in revenue loss.

Hackers may cause havoc for businesses in several ways, including spreading malware that wipes out crucial data and blocks users from accessing your website.

So-called "hacktivists," who have broken into the computer networks of government agencies or multinational corporations in the name of exposing a perceived wrong or enhancing transparency, favor disrupting business as usual as their preferred technique.

Wikileaks supporters, for example, launched hacks against Mastercard and Visa in 2010, briefly knocking corporate websites offline.

  • Changes to Business Procedures

As shown, the consequences of cybercrime on enterprises go far beyond monetary losses. Businesses must assess their data collection and storage practices to reduce the risk of exposing sensitive consumer data. Many companies no longer save credit card information, Social Security numbers, or birth dates.

Many businesses have abandoned their online stores due to the increased risk of cyber attacks. Customers are becoming more interested in the security practices of the organizations with which they do business, and they are more inclined to support companies that are open about the security measures they have put in place.

  • Repugnant Injury

Although difficult to measure, it is possible that organizations whose brand equity has been significantly harmed by massive hacks would suffer significant financial losses. Customers and suppliers may hesitate to commit critical information to a company whose IT has been compromised at least once.

Retail GiantTarget (TGT) agreed to pay $18.5 million to resolve a lawsuit resulting from a data breach that happened in 2013 and exposed the credit card information of over 40 million consumers.

In 2014, criminals compromised JPMorgan Chase & Co.'s (JPM) financial client data, resulting in a similar black eye for the firm. Hackers stole 76 million households and 7 million small company records.

According to research, publicly traded corporations will experience a temporary fall in market value and a decline in institutional trust. Researchers from Comparitech reviewed 40 data breaches at 34 NYSE-listed companies. Following an assault, the share prices of compromised companies plummeted by 3.5% on average, trailing the Nasdaq by the same percentage.

  • Revenue Decrease

One of the worst consequences of a hack is a rapid drop in sales as customers look elsewhere to protect themselves from hackers. Extortion attempts by cybercriminals against enterprises can also result in financial loss.

In 2014, Sony Pictures was attacked as it was getting ready to release "The Interview," a comedy depicting an attempt to kill the leader of North Korea, Kim Jong Un. Hackers obtained data, including staff performance assessments and emails containing potentially embarrassing information.

Despite North Korea's denials, it is commonly assumed that they were behind the strike. The National Association of Theatre Owners reports that Sony Pictures lost $30 million owing to the film's withdrawal from most theatres in favor of internet distribution.

  • Theft of Confidential Information

The intellectual property associated with a company's goods, procedures, and market entry plans can be precious. According to intellectual property consulting firm Ocean Tomo, 87% of S&P 500 enterprises' worth was intangible assets in 2015.

Because many of these creative works are kept on the cloud, they are vulnerable to hackers. Almost a third of American businesses allege that a Chinese competitor stole their intellectual property during the last decade.

Taking precautions against cyberattacks can be costly and damaging to a company's brand. Because fraudsters are becoming more sophisticated, businesses must adapt.

THE BAD EFFECTS OF CYBERCRIME ON SOCIETY



  • Can the societal costs of cybercrime be calculated?

Because of rapid technological advancements, our lives have been increasingly digitized during the last decade. As a result of these changes, cybercrime (and, by extension, cyber security) has become a growing source of concern in recent years.

The impact of cybercrime on specific firms is receiving much attention in this context. However, what kind of impact does it have on the population?

  • An obscurity barrier

Identity theft, unauthorized computer access, cyberterrorism, and online predation are all examples of cybercrime. Cybercrime is a bigger problem now than ever because of the vast number of internet-connected gadgets and humans.

Because of the anonymity provided by the Internet, scammers and hackers usually feel secure when using it. However, there are countless methods for hostile actors to profit from technological innovation.

Despite the broad definition of cybercrime, there are two primary types: crimes that directly disrupt computer networks or devices (such as a virus or denial-of-service assaults) and crimes that use computer networks to promote other criminal acts. Such crimes include identity theft and phishing.

  • Implications for the economy, infrastructure, and policy

Data breaches and malware assaults affect organizations of all sizes and industries, not only the IT sector or the largest corporations. Cybercrime has significant financial ramifications for organizations, governments, and the general public. Every year, victims of cybercrime lose millions of pounds. This money could be better spent on public health, K-12 education, and transportation.

When critical infrastructure is targeted, the consequences are far-reaching. The WannaCry ransomware outbreak in 2017 is a prime example. Hackers accessed over 200,000 workstations in 150 countries using the Internet and local networks. These workstations were located in critical infrastructure such as hospitals. The United Kingdom's National Health Service (NHS) was the hardest hit, with over 19,000 canceled appointments and a total cost of £92 million. These attacks are hazardous because they can prevent someone from receiving life-saving medical attention.

Cybercriminals can also attack healthcare-related websites. They put the personal patient and medical professional information at risk. Potential cybercrimes include malware and widespread denial of service. A cyberattack on the healthcare business could have far-reaching consequences beyond monetary losses; patients' lives could be jeopardized.

Infrastructure comprises services such as water, sewage, and power, in addition to transportation and communication networks. A cyberattack on these industries might have catastrophic and long-term consequences. For example, an attack on a form of transportation could prevent commuters from getting to work, resulting in lost time and money. If hackers access water systems or power plants, entire neighborhoods and households may be left without power and flowing water.

Communications networks are particularly high-value targets for cybercriminals because a compromise might have disastrous effects. Concerns have recently been raised over using Huawei components in the United Kingdom's 5G network. Opponents argue that working with Huawei will jeopardize the security and dependability of the UK's telecoms network and pose a severe threat to national security because the Chinese government owns Huawei.

Cybercrime has far-reaching implications for the legislative process. The General Data Protection Regulation was enacted (at least partly) to end corporations' monopoly on personal information. Before May 25, when the new legislation took effect, firms such as Facebook were careless with their customer's data, exposing the personal information of millions of people. We are finally seeing the implementation of regulations designed to protect citizens' interests.

THE BAD EFFECTS OF CYBERCRIME ON TEENAGERS



  • Cyberbullying

Did you know that one in every five children aged 9 to 12 has experienced cyberbullying? After reporting cyberbullying to an adult, half of the preteens said the bullying stopped. This data comes from a 2020 Cyberbullying Research Center and Cartoon Network study.

Any online intimidation or harassment is considered cyberbullying. This sort of bullying is public and unstoppable, making it extremely tough to counter. Because your child is likely to spend a significant amount of time online, you should be prepared to address any potentially dangerous interactions that arise.

Although the reasons for bullying and cyberbullying among youngsters are mostly unknown, we do know what it entails: the repeated and intentional use of electronic media (such as text or photographs) to damage another person. Kids Helpline conducted research and discovered that cyberbullying is most prevalent between elementary and secondary school when children are 11 and 12 years old. However, it occurs throughout puberty; therefore, awareness is critical.

According to Spain's most current cybercrime statistics, there were 1,149 cyber victimizations of children in 2020, with another 1,153 occurrences involving sexual offenses. The number of adolescents injured by various cybercrime types has increased since 2015.

In 2020, the crime of online child grooming will outnumber threats and coercion (cyberbullying); the number of records in this category has nearly doubled since 2015, and this does not include the black figure, which represents crimes that have not been recorded in any way, i.e., have not been reported to any authority via a report.

The most common forms of cyberbullying among adolescents are receiving text messages, emails, messages on social media sites; having rumors or lies spread about them online; receiving images or videos intended to humiliate or embarrass them; receiving threats; and having fake online profiles created and used to intimidate or embarrass them.

One in every ten children will tell a parent or trusted adult that they had been cyberbullied. The low percentage could be attributable to several circumstances, such as humiliation, a reluctance to admit responsibility, a worry that the situation will be ignored, or a lack of access to essential equipment. If you want to ensure your child comes to you for help when they are cyberbullied, teaching them how to respond is an intelligent place to start.

Teens who are cyberbullied may suffer from a variety of adverse outcomes, including but not limited to the following: 

  • decreased school engagement and performance 
  • increased stress and anxiety 
  • feelings of isolation and fear 
  • impaired focus and productivity 
  • depression 
  • lowered self-esteem and confidence 
  • and in the most severe cases, suicidal ideation.

Cyberbullying has comparable consequences to traditional bullying. The critical difference is that it is significantly more challenging to avoid, as it can follow your child home from school, leaving them feeling helpless. Assure your child that cyberbullying is not their fault, that they are not alone, and that there are strategies for dealing with it. If you've observed certain red-flag behaviors, you may be concerned about your adolescent's suicidal ideas.

  • Cyberstalking

This type of threat elevates cyberbullying to an entirely new level of seriousness. If your child or adolescent is routinely followed, contacted, or otherwise harassed by someone using the Internet or another electronic communication, they may be a victim of cyberstalking. Email, social media, messaging, calling, and even creating phony profiles and posting bogus material online are all techniques that could be used to accomplish this goal.

When a person is cyberstalked, they may get threatening or unpleasant messages. It can also be used to frighten and control victims. This behavior indicates a dangerous infatuation and can lead to more serious crimes, such as sextortion or kidnapping of your child or adolescent.

  • Interviews for research (Doxxing)

This is considered cyberbullying when an unauthorized third party obtains and publicly posts your child's or adolescent's private information. The goal could be to annoy, scare, or play a practical joke on your youngster. Regardless, this judgment could have far-reaching consequences. In addition to your child's mental and emotional health, their physical, financial, and identity security are jeopardized.

  • Threatening Conspiracy (Sextortion)

Cronister claims that the most common extortion he encounters today is blackmail and "sextortion." In this scenario, a cybercriminal befriends your child on social media. They then contact the youngster using a blackmail approach, threatening to release embarrassing images of the child to the public if they do not acquire other photos of a similar nature.

A situation like this can quickly spiral out of control, leaving children and teenagers feeling obligated to obey. They may avoid discussing it because they are embarrassed or guilty. Children and teenagers are particularly vulnerable to online threats, which might arrive via email, social media, and chat applications.

According to a study of 5,568 middle and high school students across the country, 

  • Sextortion affects one in twenty US teens aged 13–18.
  • 3% of those polled felt they had frightened a confidant by revealing an image.
  • Sextortion victims are more likely to repeat the same behavior in the future.

Sexting between minors is frequently the first step in a sextortion incident. Sending or receiving sexually explicit text messages, images, or videos using an electronic device such as a mobile phone, computer, or any electronic device is referred to as sexting. Sending or requesting naked photographs from the opposite side is permitted. The image's sender anticipates that the conversation will be kept secret, but the recipient may end up sharing the photo with others or putting it online.

  • Credit Card Number Theft

Depending on the circumstances, this attack may affect older children, teens, and their parents. Cybercriminals use phishing emails and messages to get access to your children's or teenagers' online accounts and steal their credentials, including credit card information.

Parents should supervise their children's and teenagers' credit card usage as a best practice. Alternatively, the three major credit bureaus can put a hold on a minor's credit report. This prevents identity theft until they reach the legal age of consent.

  • Excessive Information Dissemination

This endangers everyone's safety, from infants to the elderly. While it is OK for people of all ages to have online friends, children and teens should be especially cautious when disclosing personal information.

The ease with which knowledge may be disseminated is evident, particularly in the age of social media. Completing or publishing surveys is one of the simplest ways to overshare online. Your adolescent may be unaware that the people behind these tests only want to steal their personal information.

  • What college did your mum attend?
  • What about telling me your favorite color?
  • When you got your first pet, what did you call it?
  • "How about this: where did you grow up?"
  • When you got your first car, what brand and model did you choose?
  • "Who was your favourite high school teacher?" I inquire.

Do any of these questions ring a bell? It is critical. These are standard security questions for any email or bank account.

  • Networked video games and other gadgets

It is normal to desire to provide your children with the opportunities you did not have. Electronic toys are the most excellent option among the various possibilities available to parents of young children. However, experts warn that even smart devices built for children — or to watch children — are not always secure and may not protect your children's privacy and data.

"It's probable they don't have enough privacy and security," experts speculated. They constantly infringe on others' personal space and operate in a legal gap. They most likely obtain personal information from underage gamers. Children must supply a massive amount of personal information to play a game.

The name of your child and any audio recordings are instances of sensitive material he is alluding to. This information is used for authentication on specific intelligent gadgets and game consoles. Cybercriminals, such as hackers and robbers, would go to any length to obtain this information.

Unfortunately, intelligent devices and software are frequently less secure than traditional ones. One reason for this is that safety is sometimes sacrificed for the sake of usefulness and development ease. According to several media stories, hackers are eavesdropping on children using hacked baby monitors and other linked home cameras.

The goal of online predators is to persuade the youngster to stop viewing the adult as a threat and start trusting them, hoping that the child will finally agree to meet the predator in person.

  • Personal Internet Design (Online Enticement)

This danger is known by several names (depending on the source). For example, the National Center for Missing and Exploited Children refers to connections made by adolescents via the Internet as "online enticement." No website, no matter what you call it, is immune to the temptation of young users.

Teenagers are particularly vulnerable to grooming, a type of cyber abuse. When predators befriend youngsters and teenagers, they groom them; these predators are generally adult men. This is a virtual as well as a physical possibility. The purpose of sexual predators' online interactions with adolescents is to gain their trust so they can meet in person gradually. However, younger children may be vulnerable to this risk as well.

According to NCMEC CyberTipline data, the great majority of cybercriminals (78%) utilize only one platform when harassing children and adolescents, whereas 21% use multiple platforms. This interaction may result in exchanging contact information, such as a phone number, or utilizing live streaming services.

So, how do these predators prey on children? When communicating with offenders, boys are more likely to utilize online gaming sites or exchange phone numbers for phoning and messaging. Still, girls are more likely to use well-known social media sites.

Offenders participate in cybercrime forums and networks for a variety of reasons. Even if there are a lot of different reasons why people meet in person, the most prevalent ones are:

  • Committing crimes for financial gain
  • Engaging in sexually explicit conversations or roleplaying online
  • Exchanging sexually explicit content online (images, live broadcasts, etc.)
  • Engaging in sexual relationships offline
  • Kidnapping

 Kidnapping, in some situations, can lead to child kidnapping online and offline. The FBI reports that little is known about child abductors who use social media to seduce and abduct youngsters. They see these sites as safer alternatives to face-to-face manipulation to create rapport with and gain the trust of children and teenagers. Furthermore, adolescent gatherings make it easier for predators to kidnap children against their will.

According to a recent FBI report:

“The FBI anticipates an increase in the proportion of abductors who utilize social media or networks as their initial contact strategy as children spend more time in front of computers and mobile devices with access to social media and networks. According to publicly available data, 22% of adolescents and 50% of children visit their favorite social networking site more than ten times daily. Children are an easy target for kidnappers on social media due to their vulnerability to peer pressure and inability to practice self-control.”

  • Human Being Trafficking

Another severe condition occasionally occurs (typically due to the grooming strategy we discussed earlier). Human trafficking is the illegal trade and commercial exploitation of people of all ages. Sex trafficking and forced labor are examples of modern slavery.

Human trafficking affects both boys and girls, while Save the Children reports that 66% of child trafficking victims are female. According to Bureau of International Labor Affairs data, most sex trafficking victims (99 percent) are female.

  • Identity theft is the theft of a person's identity.

Children are more vulnerable to identity theft than adults. According to a Javelin Strategy & Research survey published in 2018, one million children and adolescents were victims of identity theft in 2017. How much money has been lost as a result of this fraud? Families spent more than $540 million out of pocket to cover the $2.6 billion in losses.

Identity theft involving children and adolescents is appealing to fraudsters because their credit records are virtually blank slates. According to experts, criminals may be drawn to children's identities because they lack a credit history. Because it is a blank slate, any data can be entered.

Criminals may use this information to apply for loans, credit cards, and government benefits under the victim's name, among other things. They can do this before your youngster is old enough to apply for anything independently.

  • Non-consensual pornography ("revenge porn")

Non-consensual pornography, also known as "revenge porn," is one of the most heinous crimes. Although the perpetrator's motivations may not always be malicious, such as "getting even" with the victim, the distribution or publication of sexually explicit images of a person without their knowledge is a felony.

I wish we could pretend it doesn't exist, but it represents a serious hazard to children and adults. Fortunately, there is a silver lining. Anti-revenge-porn legislation has been passed in 46 states, the District of Columbia, and one territory in the United States, according to the Cyber Civil Rights Initiative.

  • In Florida, for example, the legislation number is 784.049. (Cybersexual Harassment of Women) The law deems the offense a misdemeanor on the first occasion but a third-degree felony on subsequent or more severe events.
  • Without a warrant, police may arrest "any person they have probable cause to suspect has engaged in sexual cyberharassment."
  • Swatting

On the Internet, a friend or acquaintance may falsely claim that your child or adolescent has hurt someone or is a threat to others, prompting police action. The goal is to trigger a response from the local SWAT team, revealing the target's location to the victim. Swatting is becoming more of a concern as the popularity of online gaming grows, albeit it has yet to be widespread.

  • Spying through Webcam

In reality, any internet-connected gadget is vulnerable to compromise. Cybercriminals may conduct network-wide vulnerability searches or focus on a specific device. The Internet of Things (IoT) includes baby monitors, home security systems, and doorbell cameras in addition to typical ICT hardware such as webcams, laptops, and desktop PCs.

THE BAD EFFECTS OF CYBERCRIME ON VICTIMS



As the digital era has progressed, so has the likelihood of cyber attacks as more individuals spend more time online. This trend has increased the possibility of cyberattacks targeting people with mental illnesses. Being a cybercrime victim can elicit various feelings, including rage, concern, and guilt.

Many people nowadays rely on high-tech equipment and systems to securely store personal items and data. Vital documents, images, and films, among other things, may be included in the "hidden material" or "infusion." Private information leaks can have severe consequences for the people whose privacy has been violated. A victim of a ransomware attack or other form of cyber extortion may suffer significant financial damages. When confronted with a severe challenge, people commonly abandon their limitations on using modern technology. As a result, they will need to pay more attention to some of technology's most appealing features.

Several factors can make potential victims more vulnerable, including 

  • Engagement in cyberspace 
  • Psychological traits 
  • Online activities, and 
  • Attitudes toward technology.

Consequently, psychiatrists are responsible for being aware of the dangers of cyberattacks and the effects these attacks could have on their patients. The influence of online mental health care during the coronavirus epidemic is an acceptable inclusion in this scenario.

Individuals who are mentally ill may be more vulnerable to online scams. The elderly and those suffering from severe mental illnesses are particularly vulnerable to numerous forms of online money theft.

During the worldwide cybercrime epidemic, it may be difficult for persons suffering from mental illnesses to use their usual coping techniques. Factors such as a change in habit or seclusion from friends and family aggravated this disease.

The following are some of the cyber attacks' most typical mental consequences: 

  • Impact on Emotional Health.

Cybercrime, such as hacking, can bring emotional distress and monetary loss. Victims may also have difficulty trusting others in virtual spaces.

This emotional strain may result from the theft of sensitive information and the cybercriminal's possible exploitation of that information. Email threats are a common tactic used by cybercriminals.

Victims of traumatic occurrences may experience more than just annoyance and worry; in some cases, PTSD may develop (Post Traumatic Stress Disorder).

Cybercrime is one of the many events that can leave a person "shell-shocked." A disorder that has persisted since World War I and affects a large number of people.

Post-traumatic stress disorder is distinguished by its persistent symptoms following a cyberattack (PTSD). Negative emotions and experiences, such as nightmares and flashbacks, are also possible.

Cyber trauma can have severe effects on cybercrime victims. When sensitive data is compromised, the likelihood of developing post-traumatic stress disorder (PTSD) and other emotional traumas rises. Victims are more prone to feel helpless and sad due to this.

  • Remorse and Guilt

The culprits of cybercrime are frequently unknown. Two types of cybercrime that victims may not report include malicious email attachments and phishing scams. They may consider themselves responsible for insufficient cybersecurity precautions.

Victim-blaming, in which victims believe themselves responsible for the cybercrime, can cause embarrassment and guilt. As a result of these circumstances, victims may choose anonymity.

  • The sensation of being helpless

In a poll that was carried out in 2010, the cybersecurity company Symantec Corporation found that eighty percent of victims of cybercrime believed that the judicial system could hold hackers accountable for their crimes. They may be concerned about becoming a victim of cybercrime in the future.

Isolation may emerge from the victim's emotions of helplessness. They may stop using social media or go completely offline if they are terrified of becoming a victim of cybercrime.

People repeatedly unable to address a distressing issue can develop "learned helplessness." As a result, even if easily accessible control measures, for example, could contribute to preventing cyberattacks, they are typically not applied.

One likely explanation is that the victim was unprepared and did not expect to be the victim of a cyberattack. They are concerned that they will be vulnerable to future attacks even with the most up-to-date antivirus software. They may feel sad as a result of their frequent victimization.

  • Consumption Disorders

The emotional health of cybercrime victims is directly related to the extent to which their physical health is harmed.

When presented with unpleasant situations, such as online identity theft, some people use binge eating as a coping mechanism. Emotional eating is a coping mechanism to deal with negative emotions such as 

  • Stress 
  • Anger 
  • Fear 
  • Sadness 
  • Loneliness.

This scenario frequently leads to consuming foods high in calories, sugar, and fat. Your weight loss goals could be derailed.

You should be aware that your reaction to upsetting circumstances, such as becoming a victim of cybercrime, can exacerbate the problem. Your response to a horrific situation, such as being a victim of malicious software, is critical. Some people stress out rather than engage in stress-relieving activities such as yoga, meditation, or strolling.

The victim of such software may also experience an adrenaline surge, which can lead to impulsive behavior like binge eating.

Cybercrime can cause a lot of anxiety, leading to other addictive behaviors like drinking and drug addiction. According to the studies above, stress may increase an individual's drug propensity.

  • Sleep Disorders

Victims of cybercrime may toss and turn at night, fearful that their personal information or financial security has been compromised. A range of life circumstances, including financial difficulties, can cause stress-related sleep problems.

Many people in 2020 felt more pressure than usual to resume their everyday work, school, and errand-running routines due to global lockdowns and quarantines.

Insomnia and other sleep problems are strongly linked to stress. Victimization by cybercriminals is typically a never-ending cycle. You might not be able to obtain a good night's sleep because of your worries. Cortisol and adrenaline, two stress hormones, are to blame for this inability to sleep.

SOLUTIONS FOR THE BAD EFFECTS OF CYBERCRIME

The scale of the cybercrime problem needs a considerable reaction. Cybercrime is a widespread issue that can be addressed in various ways.

  • Adopting core security measures such as software updates, patches, and open security architectures consistently is critical, as is investing in defensive solutions across all platforms, from mobile to cloud. Often, cutting-edge security solutions are optional for cybercrime prevention. The majority of this obligation falls on the shoulders of the corporation and individual customers.
  • Combating cybercrime necessitates increased coordination among government agencies and corporations globally. As a result, organizations in developing countries will require more financing to conduct research and expand their current capacities.
  • Existing mechanisms, such as the Mutual Legal Assistance Treaty, can be improved (MLAT). Governments can use MLATs to request cooperation from one another when investigating cybercrime or gathering evidence. MLATs were unsuccessful before the Internet and needed to be updated or replaced.
  • Standardization (threat data) and collaboration of cyber security standards will improve the security of critical businesses like finance.
  • Why do Countries with lax cybercrime legislation see a surge in cybercrime, posing issues to their neighbors? Despite misgivings from Russia and other countries, the Budapest Convention, a legal treaty against cybercrime, has made moderate progress. Russia has said the agreement is overly intrusive and demonstrates that the signatories are not sincerely engaged in tackling Russian criminal organizations. Their position is that they cannot endorse the pact because they were excluded from the discussions. If new conventions are not agreed upon soon, cybercrime prevention will stagnate.
  • The international community must pressure states that have become cybercrime havens to change their practices and assist other countries' law enforcement agencies. As a result, failing governments incur costs, both financial and otherwise. Russia and North Korea have already been sanctioned; therefore, more measures, including severe and reversible sanctions, are required to deal with these countries.
  • Use a physical security key and an app to enable two-factor authentication (2FA) on your online accounts.
  • Invest in trusted security software to keep your personal information and financial transactions safe online.
  • Please use strong passwords, avoid using the same password for many websites, and update your passwords regularly. Increase the complexity by adding depth. This requires a minimum of ten distinct characters, including letters, numbers, and symbols. Using a password manager makes it simple to protect your credentials. 
  • Use the latest version of installed software, including operating systems and antivirus software. Hackers typically obtain access to your system by exploiting flaws in your software that are well known. To lessen the likelihood of becoming a victim of cybercrime, it is essential to put into practice the most recent updates, which contain fixes for these vulnerabilities.
  • Manage your social network's privacy settings and limit who can see your posts. To avoid falling victim to social engineering, restrict the quantity of personal information you make public. Two frequent security questions may be jeopardized if you publicly reveal your pet's or your mother's maiden name.
  • A VPN and strong encryption password will secure your home network. All data transmitted by your devices via a virtual private network is encrypted from when it leaves your network until it arrives at its destination. Hackers can only decipher encrypted data if they gain access to your network. When connecting to a public Wi-Fi network, such as those found in hotels, airports, coffee shops, and libraries, use a virtual private network (VPN) to keep your data secure.
  • Parents should keep an open contact channel with their children and counsel them on proper Internet usage. Assure them that you will support them if they are ever victims of cyberbullying, stalking, or harassment.
  • Suppose you do business with a merchant or have an account on a website whose security has been breached. In that case, you should reset your password immediately and figure out what information the hackers acquired.
  • Identity theft occurs when someone gets your personal information fraudulently through deception or fraud, usually for monetary benefit. Taking precautions will reduce your chances of encountering this. How? Identity theft can occur, for example, if a thief gains access to your email inbox and uses it to access your bank accounts. As a result, it is critical to safeguard your sensitive information. When you connect your device to a public Wi-Fi network, you must use a virtual private network, more often referred to as a VPN, to encrypt all of your data while it is being transferred.
  • Identity theft is a global problem. Thus, it is critical to take precautions wherever possible. There are various precautions you may take to protect your identity when traveling. Rather than broadcasting your vacation plans to the world, utilize a virtual private network (VPN) when connecting to the Internet via your hotel's Wi-Fi network.
  • Keep an eye on the children. You should talk to your children about the Internet and take safeguards to keep their identities safe. Minors provide a "blank slate" regarding Social Security numbers and credit history, making them a popular target for identity thieves. To protect your child's identity, avoid sharing unnecessary information about them. It is also critical to identify the signs that your child's identity has been stolen.
  • If you think you've been a victim of cybercrime, call your local police and the FBI and FTC. Despite the crime's seeming insignificance, this information is critical. Reporting an incident can help law enforcement find the perpetrator(s) and prevent further victimization. What should you do if you suspect hackers have stolen your identity? This is a list of possibilities to think about.
  • Contact the organizations and financial institutions that have been impacted.
  • Requesting your credit report and setting up fraud alerts are two steps you can take to guard yourself against being a victim of identity theft.
  • If you believe your personal information has been stolen, contact the Federal Trade Commission as quickly as possible.

CONCLUSION

The battle for Internet domination between cyber criminals and regular users is far from over. Even though the potential degree of damage produced by mass fraud is endless, fears of a cyber apocalypse continue. Such worries can be rationally addressed by acknowledging that, albeit slowly, efforts are being made to remedy the difficulties. These advantages should be sufficient to keep the Internet from devolving into a lawless wasteland populated primarily by criminals. Most of the preventative action must be performed by commercial firms providing software and those with the potential to prevent fraud, but the government also plays an important role. Consumer education programs can only reach a small percentage of potential victims. The safety of others must be mechanically maintained in ways that do not place an unnecessary cost or burden on us. Security must be user-friendly and efficient if it is to be effective. The future of cybercrime is uncertain, but if the Internet is to grow, it must be solved so that the consequences are at least as severe as those of traditional crime.

Comments