Scientific Causal Model: Cybercrime Related to Terrorism, Economy, Privacy and Hacking
Title: Cybercrime[pic 1] Academic Report of Research ProcessCybercrimeSubmitted to: Prof. Christian BachStudent Name: Rahi KumarStudent ID: 0988027Major: Technology ManagementSection: TCMG-400-6T1CybercrimeIdentify 30 articles and list the variables: Dependent variableQuoteReferenceCybercrimeCybercrime is hard to detect, thus giving the perpetrators plenty of time to flee the area in which the crime was committed, because of this fact the criminals can be in another country far away from the scene of the crime by the time it is detected.(Cassim, 2011)
Independent variableQuoteReferenceTerrorismThe serious implications of the phenomenon are further underscored by Goodman and Mariano-Florentino Cuéllar who argue that hacking, given its potentially astronomic costs, maybe viewed as a form of terrorism.(Granville, 2003)EconomyThe United States and its allies have dismissed the proposals as the desperate posturing of a nation with a weak information economy that is losing the cyber-war.(Adams, 2001) PrivacyPrivacy and confidentiality, the method by which access to the content of information is available only to authorized recipients.(HackingHacking is a descriptive term used to describe the attitude and behavior of group of people who are greatly involved in technical activities which, more commonly today than in previous years, result in gaining unauthorized access.(PowerGender-BaseInternetSocial MediaComputersGovernmentNuclear ThreatYouthDeveloping CountriesScientific Causal Model: Cybercrime related to terrorism, economy, privacy and hacking. [pic 2]Figure 1: Cybercrime and its Independent Variable.Cyber CrimeGoal-0: “Cybercrime or computer crime appears to have no precise definition. On the one hand, a computer may become the object of a crime when theft of a computer hardware or software occurs. On the other hand, a computer may become the subject of a crime when it is used as an instrument to commit traditional crimes such as fraud, theft, extortion, new types of criminal activity such as denial of service attacks and malware, identity theft, child pornography, or copyright infringement (Cassim, 2011) p. 124.”