Assignment Document

Big Data and Cybercrime

Pages:

Preview:


  • "Big Data and Cybercrime1. DataclysmPresent era is more into accuracy and evidence based information. With the development ofscience and technology, digitalization has also touched new horizons. The analytical world talksand deals with data and its o..

Preview Container:


  • "Big Data and Cybercrime1. DataclysmPresent era is more into accuracy and evidence based information. With the development ofscience and technology, digitalization has also touched new horizons. The analytical world talksand deals with data and its outcomes. This is because data is the best and effective way ofpredicting the future based on the past and present information. It also provides scope forimprovement and advancement too and this is the reason of the development of the Big data(Chandler, 2015). Considering the book, “Dataclysm: Who We Are (When We Think No One’sLooking)”, being written on the data by Christian Rudder, provides a great insight about thesignificance of data, how to use it effectively and how it affects the future prospectus. The bookis an effective outcome of sociological, statistical and psychological theories that providereasonable and valuable reasons and justification to various facts and figures. He is the Co- founder of OkCupid, an online dating site that analyze the compatibility of a couple based omthe data. Most of his work is statistical and this could be easily seen in this book Dataclysm(Kim, & Escobedo-Land, 2015). Rudder’s concept of trove of data specifies on the fact that theworld is full of strange things that need to be discovered and that can be possible througheffective use of data. Considering the fashion industry that mostly depends on the current trendsand people’s perception. Innovation and creativity are the mainelements in this industry. Thisshould be preserved and upgraded with the help of technology. Technology refines the conceptand provides practical approach to it so that it could be visible and reachable to the market.Again it also helps in developing market strategies to acquire knowledge of the demands and thecustomer requirements. Thus fashion industry and Intellectual Property are interdependent andindispensable part of the current industry. Considering the middlemen, they form the connectinglink between both the firms. They help in the technology transfer along with supporting the up1 Big Data and Cybercrimegradation of the process and in marketing (Leukfeldt, &Yar, 2016). For the satisfaction of themiddle ground, there is a need to have a two way communication and understanding of theinvolved people or departments. Communication can hold the interrelation if both the sectors inorder to have a better functionality. Traditional approach has now been taken over by the latestand current trends in both the sectors that are making its way to innovation and development. As discussed, people communicate through data in exchange of data. This means while putting apost in twitter, an individual provides some data and on the other hand posting a like or commentis again the exchange of data from the other individual. This is how the whole world is revolvingaround data and vice versa (Voyer, & Trondman, 2015). However the biggest threat is theprotection of data so that it should not be misused. It is quite a big challenge of characterizing thedata and providing adequate protection and privacy to it, an answer to it is the approach of theIntellectual Property rights. It provides all the guidelines and policies so as to ensuring themonitoring of the data use and misuse or any kind of infringements, affecting Internet content,copywriting and patent assurance (Kim, & Escobedo-Land, 2015). American agenesisProtect Intellectual Property Act (PIPA) and Stop Online Piracy Act (SOPA) are on the action oftaking serious steps in protecting the online content and avoiding piracy so that innovation canbe seen in future and this will provide a new edge to the data and digitalization world. Bothtechnology and fashion industry are highly influenced by current trends. Thus they need toprotect their designs and technology so that they can withstand the market competition. They arealso influenced by market volatility and customer demands that insist to innovation (Hill, &Marion, 2016). The traditional approach of Intellectual Property is now overruled by the latestconcept that mostly goes through middle grounds. They try to maintain their confidentiality andthe privacy so that their formula and business approach stay intact and protected.2 Big Data and Cybercrime2. CybercrimesInternet is indispensable now days. People spend most of their time with a computer and anetwork. Cybercrime is associated with this two which is an unconventional killer. Cybercrimenot only create threat of stealing information but also create a major challenge of misusing it.Person who steal such internet content and information are known as hackers (Leukfeldt, &Yar,2016). According to a recent survey around 20 - 30 per cent of online information is beingcompromised each year due to cybercrimes. This is not ethical as special rules and regulationsare formed for protecting online content and data. Cybersecurity ensures to take care of the dataprotection and any kind of misuse of the information provided in the internet. As mentioned inthe article, there are various kind of Cybercrimes based on the way they are executed. Howeverthe current discussion will focus on the details of one of the major and common form ofcybercrime, Malware. Malware involves use of the malicious software so as to interrupt the cybersecurity and steal dataand information (Ibrahim, 2016). Those specified software can disrupt computer system and cangather sensitive information or can also display unauthorized advertisings. It is a type ofcomputer contaminant that overcomes the legal codes of ethics and compliance with intent ofstealing or destroying information present in the computer or sometimes the computer itself.Many times those malwares or spyware are initially installed in the computer system. Once it isoperational they too become active and create lot if vulnerabilities. In other cases they travelthrough mails in the form of attachments, downloads or other kinds of viruses that affect thesystem operation. Data and information are quite essential to each of us. Thus one should becautious while clicking any unknown or strange links. Another way of preventing is by installingfirewalls which are updated and should be robust in nature. This will prevent the unwanted and3 Big Data and Cybercrimeunauthorized data transfer (Hill, & Marion, 2016). Each system should be encrypted with anti- viruses andante-malware software which will prevent unauthorized and unwanted access to thesystem.ReferencesChandler, J. W. (2015). BMKT 491.02: Special Topics-Telling the Story with Big Data.Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws,and Policing in the 21st Century: Computer Crimes, Laws, and Policing in the 21st Century.ABC-CLIO.Kim, A. Y., & Escobedo-Land, A. (2015).OkCupid Data for Introductory Statistics andData Science Courses. Journal of Statistics Education, 23(2), n2.Ibrahim, S. (2016).Causes of Socioeconomic Cybercrime in Nigeria (Parents'Perspectives).The 4th International Conference on Cybercrime & Computer Forensics.Leukfeldt, E. R., &Yar, M. (2016).Applying routine activity theory to cybercrime: Atheoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.Voyer, A., &Trondman, M. (2015). Between theory and social reality: Ethnography andInterpretation and Social Knowledge: Introduction to the special issue. Ethnography,1466138115592415.4 "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top