American Military University Cyber Fraud Scam and Cons Research Literature Review

User Generated

fcrrq110586

Law

American Military University

Description

Research paper Topic: Cyber Fraud, Scam and Cons

For this assignment, you are essentially doing the first three elements of your research paper outlined below.

Title Page of the Paper: The title of your paper should be brief but should adequately inform the reader of your general topic and the specific focus of your research. Keywords relating to parameters, population, and other specifics are useful. The Title Page must include the title, name, course name and number, and Professor’s Name.

Introduction, Research Question, and Hypothesis: This section shall provide an overview of the topic that you are writing about, a concise synopsis of the issues, and why the topic presents a “puzzle” that prompts your research questions, which you will include. This section will be 1-2 pages. End your introduction with your research question.

Review of the Literature: All research projects include a literature review to set out for the reader what knowledge exists on the subject under study and helps the researcher develop the research strategy to use in the study. A good literature review is a thoughtful study of what has been written, a summary of the arguments that exist (whether you agree with them or not), arranged thematically. At the end of the summary, there should still be gaps in the literature that you intend to fill with your research. It is written in narrative format and can be from 4-6 pages depending on the scope and length of the paper.

As a literature review, this section should identify the common themes and theories that the prior research identified. In this section, what you do is look at the conclusions of prior research and identify what the common themes are you see in those conclusions. You then identify those themes.

Technical Requirements

  • Your paper must be at a minimum of 5-9 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
  • Type in Times New Roman, 12 point and double space.
  • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running Head: CYBER FRAUD

1

Cyber Fraud, Scam and Cons—Vulnerabilities
Name of institution
Name of student
Class
Date

CYBER FRAUD

2

Cyber fraud is a type of crime committed via a computer to deceive another person's data accessible
through the internet. Cyber fraud is the leading type of fraud; individuals and firms are supposed
to protect themselves from attackers (Drew, 2018). Cybercrime is an international threat and has
been expanding rapidly throughout the twenty-first century, giving room for fraudsters to
differently hack personal and financial information. Fraudsters or cons gather the information for
personal gain when using the acquired data or financial information to fund terrorism, another
leading threat in the security sector. Some examples of severe cyber fraud crimes and cons include
Home Depot's hacking, a leading retailer company in the United States, where fraudsters hacked
fifty-six million customer credit cards in 2014 via cybercrime. In 2015, another case occurred in
the Office of Personnel Management, United States. A China fraudster stole over twenty million
personal information, including fingerprints, posing a threat to its security. Fraud cost the United
Kingdom £190 billion in the year 2017, following the Annual Fraud Indicator. Reports from the
Office for National Statistics (ONS) show that fraudulent crimes have cost the government vast
masses of money loss, cyber fraud being the leading crime.
However, one can protect themselves from cyber fraud in different ways. Fraudsters usually hack
personal information through phishing emails and viruses; therefore, it is vital for one not to log
in or provide personal information, including bank details, in an email that provides such a link.
The key to avoiding this crime is understanding your bank well and analyzing the related bodies
that would ask for such information (Sun et al., 2018). No matter how legitimate the email or
phone call sounds, one should first confirm with the bank before providing any information.

CYBER FRAUD

3

Another way of protecting yourself from cons include destroying or discarding any traces of
personal and financial data. It is vital to shred any personal information provided by your bank
online as fraudsters can use this information in a recycle bin to process a Card Not Present payment
(CNP). Also, one should protect their computer with antivirus software to combat any fra...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags