2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩7頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、1500 英文單詞, 英文單詞,9700 英文單詞,中文 英文單詞,中文 2900 字文獻(xiàn)出處: 文獻(xiàn)出處:Birau R, Antonescu M. Financial and Non-financial Implications of Cybercrimes in Emerging Countries[C]// International Conference Emerging Markets Queries in Finance

2、and Business EMQFB, Third Edition,29-31 October 2014, Bucharest, Romania. 2015:618-621.Financial and non-financial implications of cybercrimes in emerging countriesMihail Antonescu, Ramona BirauAbstractThis article aims

3、to investigate financial and non-financial implications of cybercrimes in emerging countries. In a globalized world, is very difficult to quantify in a precise manner the economic impact of cybercrimes. Nevertheless, the

4、re are significant differences among financial and non-financial implications of cybercrime attacks. Despite widespread awareness, the vulnerability of emerging countries regarding cybersecurity surveys is still very hig

5、h.Keywords: cybercrimes; intellectual property; business confidential information; identity theft; financial fraud; cybersecurity;1. IntroductionIn a globalized economy, the risk of cybercrime attacks is highly significa

6、nt and for this particular reason it should not be ignored. A current feature of cyber crimes is their accelerated spread in emerging economies. Moreover, financial and non-financial implications of cybercrimes in emergi

7、ng countries provide a research framework of great current interest in order to identify potential implications for business environment. Technically, the essential idea suggests that certain system vulnerabilities are f

8、raudulently exploited despite the implementation of cyber-security measures.The very concept of cybercrime defines an illegal activity based on internet and information technology, but in a more specific manner. Neverthe

9、less, the evolution of cybercrime in daily life implies an extensive range of forms and manifestations. The negative impact on business is determined by direct consequences of cyber attacks due to unauthorized access to

10、information resources and effective methods of technological manipulation. On the other hand, the process of primary identification, recovery and subsequent detection of cybercrime attacks requires a rigorous analysis as

11、 managerial approach considering the fundamental positions of authority.Cybercrime attacks represent a growing challenge, especially in terms of emerging countries. International cyber terrorism is focused on obtaining c

12、onfidential information in order to take advantage for absolute control and thus considerable benefits. Moreover, emerging countries are characterized by a high level of risk exposure to cyber crimes due to their intrins

13、ic vulnerabilities. The global environment, which includes both financial and non financial dimension, suffers significant changes due to these extreme events. Modern technology provides highly advanced means of tracking

14、 which are seemingly untraceable and undetectable. Metaphorically, cyber attacks are based on certain cracks in security system and their approach is identified with a silent stalking (tracking). This criminal activity h

15、as extremely harmful consequences for economic and business targets.2. Approaches to literature reviewBroadly defined, cybercrime includes a completely illegal and criminal activity which is carried out by computers and

16、information technology. The effects of cyber crime are widely discussed in the literature, considering the fact that it is a subject of great current interest. The advances in communications technologies and in particula

17、r the internet infrastructure provide an - United Arab Emirates -Source : MSCI Country Classification, Annual Market Classification ReviewGenerally, cybercrime includes a wide range of illegal activities such as : cyber

18、bullying, cyber terrorism, identity theft, cyber stalking, virtual pornography (via the Internet), cyber espionage (illegally obtaining confidential data), computer hacking, computer fraud, online harassment, phishing, o

19、nline piracy, blackmailing proceeding, cyber extortion, spam attacks, copyright infringement, computer virus programs (installing malicious software programs such as Trojan horse viruses). Beyond inherent advantages, glo

20、bal liberalization and international integration provide a conducive environment for obtaining reprehensible illegal benefits based on complex activities related to cyber crimes, especially in terms of emerging countries

21、.In the last decade, cybercriminals became increasingly perfectionists due to modern technology and the capacity of computer applications. Moreover, the methods used by cyber criminals are very sophisticated and ingeniou

22、s, depending on particular skills and final purpose. The major vulnerability is represented by computer or computer system as a whole. Nevertheless, one of the most dangerous scenario involves ignoring the destructive po

23、tential of cyber attacks. Theoretically, panic is non-productive but it is quite necessary to treat seriously the impending cybercrime risks in order to avoid potential major losses. The prospective victims often neglect

24、 the idea of cyber crime and its extremely varied negative implications. The transmission channels of cyber crimes include certain components of the Internet, ie : e-mails, websites (in particular e-commerce sites), chat

25、 rooms, discussion groups, instant messaging (IM), open forums, social networks, messenger or other online services. The financial implications of cybercrimes represent a highly sensitive issue in the context of globaliz

26、ed economies. Emerging countries represent a very vulnerable target because of structural and institutional imbalances. Since the increasing use of information technology, the possibilities of fraudulent gains based on c

27、yber crimes have become even more significant. Considering the number of incidents, the damage caused by cybercrime is extremely high, reaching extreme financial losses of hundreds of billions of dollars a year in the ca

28、se of global economy. Due to cyber attacks, the company performance is affected significantly and also enhance financial losses. Apparently, the cumulative effect of cybercrimes provides a disturbing framework about the

29、fragility of emerging economies regarding any kind of cyber attacks, such as market manipulation and fraudulent obtaining access codes to the bank accounts of customers. However, there is an important advantage related t

30、o the poor level of development of emerging economies compared with developed countries. Thus, the use of information technology and consequently the Internet are not very high and extensive for emerging countries, but t

31、here is a strong upward growth trend. The non-financial implications of cybercrimes include a number of extremely important issues such as : loss of customer confidence, negative publicity (image scandals, reputational d

32、amage), diminishing productivity, business discontinuity, loss of confidential customer or company data (informations), unauthorized access to certain product innovations, loss of intellectual property and so on. Sometim

33、es it is very difficult to accurately estimate the cost of cybercrime attaks considering certain non financial implications. Furthermore, the non-financial implications of cybercrimes are rather difficult to commensurate

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論