Cybercrime In Online Shopping-types Of Crime And Protection

Computer Studies
4 min, 18 sec read Download Article

Introduction

Forward

Due to the rising number of cases of cybercrime in online shopping, I thought it would be best to discuss the dimensions of this topic in this terminology report. The world of e-commerce has expanded immensely and now borders on people from all walks of life. Today, every business person needs to invest in e-commerce that has proven to be lucrative because of the extensive market it provides. However, with every great opportunity lies threats and risks that business people need to address. As more people flock online, there is the risk of cybercrime that occurs in many dimensions. The increase in these types of crime presents problems in online shopping that require immediate attention. Therefore, my choosing this topic is related to the urgency of the problem of cybercrime and the need to inform others of the nature of its occurrence as well as different types of protection. The anonymity of the internet presents immense challenges for individuals who go online to shop, and it is thus necessary to address the issue in depth. Even though most of the research in this area has been carried out in English, I was enthusiastic about presenting some of the terminologies in Arabic for the benefit of this audience. The issue of cybercrime affects people from all cultures, which means that research needs to be debunked for people who may not understand the complex terms presented in many of the sources. I believe that individuals from the Arabic descent would benefit immensely from the knowledge provided by a simpler version of research into cybercrimes. Most are left out because of the emphasis on complex language that mainly focusses on ENL speakers. Given the nature of e-commerce and how it transcends cultures, it is expected that all literature focusing on the same is understood. Therefore, I looked forward to ensuring that this audience would be able to read and understand research into this area with ease in the future.

Methodology

All the information is acquired from internet sources. Most of the sources are from reputable journals that contain contributions from experts in this field. They have studies from experts who have spent many years studying e-commerce and its developments to this point. The studies are acquired from databases in different companies and law enforcement profiles on issues pertaining to cybercrimes. I also used the internet to study actual cases involving cybercrimes and how the companies affected dealt with the same. It is interesting to note the number of cases that have since come up as a result of cybercrimes, most of which involve hacking and related breaches to gain access to the information of online shoppers. The numerous cases are available online and contain interesting accounts that depict most of the cybercrimes that are discussed in this paper.I believe that this knowledge together with the sources will be quite influential in this terminology report. It will provide insights that are simple enough but can be able to change the perspective that individuals have in regards to cybercrimes and the methods that would contribute to its eradication.

Source Assessment

The sources that will be included in this report are mostly from online libraries in reputable institutions. Many of them contain information that has been corroborated with experts who study cybercrime. Their biographical information illustrates that most of them have worked closely with some authorities in the effort to eradicate cybercrime. There are  scholars who have spent some time consulting with different units in law enforcement that deal with cybercrimes so as to gain an understanding of some of the most recent trends in this issue. Therefore, the information that will be presented in this terminology report will be of the highest quality and accuracy. All the sources are peer-reviewed and well research with sufficient background from authorities in cybercrime, experts, and actual case studies that thus speak of their reliability.

Bibliographical Information

As mentioned above, the internet has a sea of sources that are obtained from various databases. Future researchers can look into these sources that are rich with information on cybercrimes. The library sources are the best since they have been written by people who have spent a long time studying cybercrime in depth and thus provide a high magnitude of accuracy. Apart from this, it is important for future researchers to look into case studies in the internet. There are numerous cases that showcase the different types of cybercrimes that individuals have encountered over time. Some cases are more serious than others and contain class action suits brought against companies that allowed issues like breach of privacy and the like. There are also other individual cases or personal accounts from people who have experienced different crimes online such as identity theft, blackmail, and the like. They will be used together with the sources to provide an in-depth analysis of cybercrimes.

Bi-lingual dictionaries also served as good sources for this paper because they provided a background under which some terminologies could be deciphered in Arabic. The logic was to ensure that the Arabic speaking audience understood the dimensions of cybercrimes using every way possible, which would enable them to indulge in protective measures.

Share this post:

Cite this Page

APA 7
MLA 9
Harvard
Chicago

GradShark (2023). Cybercrime in Online Shopping-Types of Crime and Protection. GradShark. https://gradshark.com/example/cybercrime-in-online-shopping-types-of-crime-and-protection

Finding it challenging to complete your essay within the given deadlines?