The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions

Nabie Y Conteh, Quinnesha Staton

Abstract


The purpose of this paper is to explore and address the socio-economic impact of identity thefts and cybercrime in general. The paper will further explain the various ways employed in their implementation. The paper will also put forward ways to prevent the threats and vulnerabilities of the attacks. The study will also recommend solutions to stop and or mitigate the consequences of cyber-thefts. The study will define social engineering as well as provide various social engineering tactic.  The paper will also discuss the reasons for the rise in cybercrime. Such reasons will include financial gain, revenge, as well as non-financial gains. Also cited are examples that demonstrate the capabilities of cybercriminal. The paper will also provide justification for the reasons behind the cumbersome task and failure in instituting a lasting solution to the criminal activities. Finally, this paper will close with a conclusion on the economic implications of social engineering on the general cyberwar on cybercrime at the national and global levels.

In general, while losses due to cybercrime are troubling, they do not directly pose as a threat to national security, except to the extent that international cybercrime allows potential opponents to train and maintain proxy forces at the expense of others.

 


Keywords


Social Engineering, Cybercrime, Network Intrusions, Phishing, Identity Theft, Preventive Measures and Risk mitigations.

Full Text:

PDF

References


Allen, M. (2006). Social engineering. a means to violate a computer system.

Cybercrime - The Definition of cybercrime | Norton. (n.d.). Retrieved November 2,

, from http://us.norton.com/cybercrime-definition/promo

Goodchild, J. (2012, December 20). Social engineering: the basics. Retrieved

November 2, 2015, from http://www.csoonline.com/article/2124681/security-awareness/social-engineering-the-basics.html

Heary, J. (n.d.). Top 5 social engineering exploit techniques. Retrieved November 2,

, from http://www.pcworld.com/article/182180

Iozzio, C. (2008, September 26). The 10 most mysterious cyber crimes. Retrieved

November 2, 2015, from http://www.pcmag.com/article2/0,2817,2331225,00.asp

Mercer, E. (n.d.). Causes of cyber crime. Retrieved November 2, 2015, from

http://science.opposingviews.com/causes-cyber-crime-1846.html

Mickelberg, K., Pollard, N., & Schive, L. (2014). US cybercrime: rising risks,

reduce readiness. Retrieved November 2, 2015, from http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

Reasons for the rise in cyber crime in Nigeria. (n.d.). Retrieved

November 2, 2015, from http://martinslibrary.blogspot.com/2013/08/reasons-for-rise-in-cyber-crime-in.html

The official social engineering portal - security through education. (2015).

Retrieved November 2, 2015, from http://www.social-engineer.org/


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)