Cyber Security Academic Essay

Introduction

This research will examine and contrast the experience of foreign students towards cyber security when they are in the UK compare to their home countries. Due to the current growth in technology, most of the businesses have moved into using computer information systems instead of the traditional data storage and manipulation system used in the past (Ortner, 2016, 216). This has led to people developing a lot of expertise in the use of computers and the information systems utilized by both small and big businesses. in this case, due to the networking done through computers which facilitate the transfer of information from one individual to the other within and outside an organization, the information being stored or transferred through the computer systems is vulnerable to attack and manipulation from hackers and other fraudulent individuals. Cyber security has been a matter of major concern for both individuals and businesses due to the threats posed by hackers on the information systems. This is why I decided to conduct a research to generate an understanding on the importance of securing information systems from fraudsters (Jingzhu & Jingjing, 2013, 10). The contemporary social and economic issues related to cyber security are some of the several concerns that have led to concentration on the subject of cyber security.

In 2012 more than twenty million accounts were hacked regarding to the Police interior communication network were hacked in United Kingdom (Robinson, et.al 2013, 31) In 2009 approximately 1.2 billion mobile broadband subscriptions exist around the world and in 2011 more than 2.3 billion people they accessed to the internet where this number is more than one-third of the world’s total inhabitants (UNODC, 2013, 33) (United Nations Office on Drugs and Crime).Symantec reported blocking 3 billion attacks around the world in 2010 and this number increased over 81 proportion to 5.5 billion in 2011. Likewise, they have reported discovering 286 million malware and computer viruses around the world and this figure increased in 2011 to become 403 million (McGuire & Dowling, 2013). According to Betz (2012) U.S society lost more than $48 billion when they tried to combat identity theft in 2006.There are more than eight million new cases are reported every year concerning identity theft, in addition the victims spend about $526 per case

Research Objectives

  1. To examine the awareness of cyber security of young people.
  2. To find out the experience of young people about cyber security.
  3. To investigate the posture toward cyber security in future.

 

  1. How well are KICL students aware about cyber security?
  2. Do the KICL students had experience with cyber security threats before?
  3. What should KICL student do in future to be awareness about cyber security?

 

Literature Review

The emergence and evolution of technology in the modern world has brought numerous opportunities and advantages in various sectors of the economy (Garfinkel, 2012, 31). Advancements and breakthroughs in research fields have been achieved by the assistance of technology and its elements in realization of these goals. However, with every opportunity comes a threat and technology over the past years has been characterized by various issues of concern to the safety of the governments, the citizens, and the business arena (Johnson, M., 2014, 9). Cyberspace has faced various challenges such as cyber security, which has been jeopardized by occurrence of cyber threats and criminal activities. These criminal activities in cyberspace take the form of cyber bullying, cyber terrorism, identity theft, unethical hacking practices, and cyber spying among other threats (Ahmad, & Yunos, 2012, 149). Many of the students might not be quite aware of the impacts or effects of identity theft because they may not have experienced it before. However, for a person who has experienced it before can relate to the arguments that will be derived from this research. This paper will highlight the three different kinds of cyber security; cyber bullying, identity theft, and cyber-crime (Awan, 2014, 10)

A lot of interaction is observed on the three point approach as various scholars conflict while others concur in one way or another (Anderson &Romney, 2014, 72). However most of them have one thing in common that, cyber related malpractices have adversely affected international students studying in the United Kingdom (Ortner, 2016, 216). According to Robinson, et.al (2013), hacking is has been a notorious online practice. Even the governments and the multi-sector organization are trying to employ mechanisms to avert the vice but it has yielded to minimal fruit. It is in the view of some that there is no definite solution for the menace (Osho & Onoja, 2015, 32).  It is noted that as the numbers increase, the fraudulent cases are also increasing proportionately.

The authorities are however fighting these malpractices. Symantec reported blocking 3 billion attacks around the world in 2010 and this number increased over 81 proportions to 5.5 billion in 2011. Likewise, they have reported discovering 286 million malware and computer viruses around the world and this figure increased in 2011 to become 403 million (McGuire & Dowling, 2013, 15). According to Betz (2012) U.S society lost more than $48 billion when they tried to combat identity theft in 2006.There are more than eight million new cases are reported every year concerning identity theft, in addition the victims spend about $526 per case. According to (Yu, 2014, 36), victimization is prevalent in the online data related instances. He however goes beyond his counterparts’ argument and brings out the aspect of fear. He points out that fear would only heighten by perception of the online extremes. Almost all the researched materials have one thing in agreement that much of the online scam is associated with online shoppers (Bellaby 2015, 3). Majority of the international students in the UK have the excitement to engaging on internet shopping and networking thus being susceptible to the internet victimization. The strength of these authors is that they discus pertinent issues in regard to the enormous challenge of the cyber related crimes however their weakness is that none of them is offering a reasonable and applicable solution to the menace.

Cyber Bullying

Cyber bullying has been identified as one of the most dangerous cybercrime as it does not involve physical contact as compared to traditional bullying in school. Cyber bullying involves bullying and harming other kid or teenagers through the utilization of technology (Garfinkel, 2012). Cyber bullying occurs mainly through the application of the various forms of social media where images and videos can be used to intimidate and harm others. Fraudsters can use computers, mobile phones and other electronic devices intimidate and cause low self-esteem to the victims by the perpetrators. This vice has been identified to result in cases of teenagers suicidal thoughts than any other cause (Oravec, 2012, 48). Cyber bullying leads to other negative implications on the victims such as increasing depression and make them feel powerless. In the United Kingdom In 2011 70% users from 15 to 24 years, were less likely to use internet security on all devices compared to other aged 65 and over 92%. Whilst old people aged 65 and over were less likely to used internet at all compared to young users (for instance, 44% aged 65 and over, compared to 93% of 15 to 24 years olds (McGuire & Dowling, 2013).  In my research I will find the gap between students at the USA and the international student in the UK if the students at KICL had any experienced with cyber bullying while in schools or with any one they know (Williams & Pearson, 2016, 10).

Identity Theft

This cybercrime is also referred to as identity fraud, as it involves someone unlawfully obtains and use the personal data of another person for economic gain and deception (Berghel, 2012, 86). Cyber spies and hacking practices may take this form resulting to loss of vital information and data to these perpetrators (Tajpour, Ibrahim & Zamani, 2013, 55). USA and Canada has experienced cases of identity theft where unauthorized persons have accessed funds of their victims from the banks and gone to an extent of using their victims’ identities to create debts and commit other offenses (Riley et al, 2015, 100). Shoulder surfing is identified as an old technique of directly observing other persons’ computer or phone to get their personal information over their shoulders (Tuluc, 2012, 181). Additionally, it also entails keeping surveillance on the victims’ activities to acquire his/her personal identity numbers is one of the ways to access their data (Rebovich et al, 2015, 18).

Conclusion

In conclusion having reviewing the literatures about the dependence of young people’s awareness of cyber security , young people  in universities and high schools most of them did not have enough awareness about cyber security and only a small number of students who are good at cyber security awareness. In my research I will focus on international student from many countries such as Korea, China, and Arabic countries from the age of 19 to 30 years who are living in London to investigate their attitudes towards cyber security and discover the real experiences of the same.

Methodology

Research design

This research uses a qualitative design, which will concentrate on awareness and experience of students at KICL towards cyber security. This study needs to understand why students do not have enough knowledgeable about cyber security and to understand the deferent opinion held by different students. The study seeks to know whether international students from various origins have the same limitations and challenges. Sampling the awareness rate for students from one nationality to the other would give the proper state of the research question. Subsequently, it will be convenience to approximate the study questions.

The relevant authorities ought to create awareness programs to equip the KICL student with sufficient information. This will help the international students who are more vulnerable to cyber threats than the rest. Those that have been victims of cyber bullying, identity theft among other crimes ought to be taken through a recovery process for emotional healing. The process may include counseling among other psychological process.

Research methods

This study will use a questionnaire style from approximately 45 students at KICL which may be suitable sampling size. It will compare between different nationalities of students some of whom are from Gulf, Chinese and African origins. The research questionnaire will also seek to capture different ages of students from 20 and over, and between female and male. The questionnaire will generally use open-ended questions because participants need to give their own opinion. This kind of questions will lead to show the attitude of the students as well as the awareness level on matters of cyber security. This project research will not include all of KICL students. It will instead pick at random part of the students’ population who would represent the overall situation of the university.

  1. From week one to week three: Developing the literature review.
  2. From week four to week five: Questionnaire designing process.
  3. From week six to week seven: Data collection.
  4. From week eight to week nine: Analyzing the data.
  5. From week ten to week eleven: Write final propose of the research and submit.

The study examines the students’ opinion on cyber security. The first ethical issue would be that students at KICL do not have English as a first language (Reddy et al 2014, 1405). Moreover the level of students varies and some of them need clear and easy questions to understand in simplified English language. Secondly, some students may not give their personal information or write the truth because they may not feel comfortable to share with other students (Kenneally & Bailey, 2014, 4). Thus, all the information in my research will be confidential. It is evident that every research process has its challenges which must be overcome to achieve credible results (Jingzhu & Jingjing, 2013, 10). My major concern will be the little extent that the discussion is required to cover. This will require thorough research and previous knowledge in regard to cyber security. Plagiarism and research fraud is a major factor in regard to ethics. This research will recognize the original source of information to avoid plagiarism. Lastly, avoiding harm is another issue that should be considered. Some of the students may not feel comfortable with some questions. Consequently, questions will be written in a simple and polite language.

 

 

Bellaby, R., 2015. Justifying Cyber-Intelligence?. Journal of Military Ethics.

Berghel, H., 2012. Identity Theft and Financial Fraud: Some Strangeness in the Proportions. IEEE Computer, 45(1), pp.86-89.

Johnson, M., 2014. Cybercrime: Threats and Solutions.

Garfinkel, S.L., 2012. The cybersecurity risk. Communications of the ACM, 55(6), pp.29-32.

Herley, C 2014, ‘Security, Cybercrime, and Scale’, Communications Of The ACM, 57, 9, pp. 64-71, Business Source Complete, EBSCOhost, viewed 10 May 2016.

Jingzhu, W. and Jingjing, L., 2013. Basic Issues of Information Ethics and Copyright System: Relationship, Connotation and Pathway. Information and Documentation Services, 2, p.010.

Joe, M.M. and Ramakrishnan, D.B., 2014. A survey of various security issues in online social networks. International Journal of Computer Networks and Applications, 1(1), pp.11-14.

Kenneally, E. and Bailey, M., 2014. Cyber-security research ethics dialogue & strategy workshop. ACM SIGCOMM Computer Communication Review (CCR), 4(2).

Larson, S., 2015. The Cyber Security Fair: An Effective Method For Training Users To Improve Their Cyber Security Behaviors?

McGuire, M. and Dowling, S. (2013) Cyber-crime: A review of the evidence. Home Office. Pp.1-18.

Oravec, J., 2012. Bullying and mobbing in academe: Challenges for distance education and social media applications. Journal of Academic Administration in Higher Education, 49, pp.46-58.

Ortner, D 2016, ‘Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime’, Brigham Young University Law Review, 2015, 1, pp. 177-217, Business Source Complete, EBSCOhost, viewed 10 May 2016

Osho, O. and Onoja, A.D., 2015. National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology, 9(1), p.120.

Rebovich, D.J., Allen, C.K. and Platt, J., 2015. The New Face of Identity Theft.

Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. arXiv preprint arXiv:1402.1842.

Riley, D., Wheeler, M., Gray, J., Bluehouse, R., Gomez, T. and Morgan, R.O., 2015. Identity Theft Among American Indian and Alaskan Native Elders. Identity, 90, p.100.

Robinson, N., Horvath, V., Cave, P.J., Roosendaal, A.P. and Klaver, M., 2013. Data and Security Breaches and Cyber-Security Strategies in the EU and its International Counterparts. pp.507.476

Sullins, J.P., 2014, May. A Case Study in Malware Research Ethics Education: When Teaching Bad is Good. In Security and Privacy Workshops (SPW), 2014 IEEE (pp. 1-4). IEEE.

Tajpour, A., Ibrahim, S. and Zamani, M., 2013. Identity Theft Methods and Fraud Types. IJIPM: International Journal of Information Processing and Management.

Tuluc, AM 2012, ‘Economic Processes Associated with the Cybercrime Industry’, Economics, Management & Financial Markets, 7, 2, pp. 179-184, Business Source Complete, EBSCOhost, viewed 10 May 2016.

UNODC. Feb, 2013. Comprehensive Study on Cybercrime, Draft .pp.56 (8)

Van Laer, T., 2014. The means to justify the end: Combating cyber harassment in social media. Journal of business ethics, 123(1), pp.85-98.

Yu, S., 2014. Fear of cybercrime among college students in the United States: An exploratory study. International Journal of Cyber Criminology,8(1), p.36.

Ahmad, R. and Yunos, Z., 2012. A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), p.149.

Awan, I., 2014. Debating the Term Cyber-terrorism: issues and problems. Internet Journal of Criminology, pp.1-14.

Anderson, R.C. and Romney, G.W., 2014. Student Experiential Learning of Cyber Security through Virtualization. Publication of National University, p.72.

find the cost of your paper

Is this question part of your assignment?

Place order