Criminal Profiling And Insider Cyber Crime Summary

1135 Words3 Pages

“Criminal Profiling and Insider Cyber Crime” Critique
Similarly, in Nykodym, Taylor, and Vilela’s article “Criminal Profiling and Insider Cyber Crime,” (2011), the writers claim that cybercrime profiling assists in tracking down and identifying the offender. Even though Nick Nykodym is a professor in the Business department
At the University of Toledo, which does not relate to the topic, his field enabled him to comment on the status and the threat caused by the different employee’s position in a business. In addition, he delivered a well clarified argument and reliable work with the use of CCIPS cases from the United States justice department and various cybercrimes journals and statistics to support his thesis.
Nykodym et al emphasize …show more content…

An increasing number of powerful organizations fall victims to cyber-attacks targeting their financial sector. To illustrate, Nykodym et al. (2005) point out that cybercrime has accounted up to $170 million of loss in 2002 (p, 264). As a result of proprietary information theft along with product and customer databases; causing the targeted business a loss of productivity and time as well as financial loss. A further point often overlooked is that cybercrimes give rise to a significant mass panic among organizations. According to Gandhi et al. (2011), “Along the technological dimensions, a cyber-attack can leave users distrustful of services such as banking, healthcare, and finance.” (p.37). Consequently, the fear of customer’s information exposure results in mass panic, which induced policy changes to increase resources spent on cyber-defense, that in return cause an additional cost imposed on taxpayers. Therefore, cyber-attacks causing tremendous damage to organizations along with customer spreading fear among …show more content…

It is important to remember that the lack of physical presence plays an important role in the crime investigation. In other words, the attacker has the flexibility of executing the attack from anywhere and anytime desired (Lowe, 2014, p. 12). Therefore, there will be no evidence such as DNA or fingerprints to identify the offender from. In addition, insider criminals are easily hidden due to the different level of hierarchy in an organization. For example, the authority and access capability given to managers enable them to disguise their crime (Nykodym, Taylor, & Vilela, 2005, p.265). In this case, the several different positions in a firm that can access the data system make it harder for the investigator to determine the root of the crime committed. Cybercrimes have witnessed a rapid increase as a result of the ease and flexibility of the

Open Document