Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Electronically Compromised Companies’ Dilemma, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Abstract
A cyberworld dilemma exists between a company that has been hacked and law enforcement authorities. Often, when a company is hacked, it avoids reporting the crime to the police or FBI because of a myriad of reasons. Some companies feel it will lose investors, while others feel it is a cost versus benefit issue because of the time and money involved in discovery and testimony. Others feel that authorities will freeze their computers for weeks as they conduct investigations. Some cringe at the federal agents looking through their network files because of illegal tax evasion. Nevertheless, this can be serious if it involves terrorism, but most of the time, it is only a bored teenager challenging his wit. Law enforcement should work to communicate better with local businesses, and internet police should be created that know law, the art of prosecution and computer science.
Electronically Compromised Companies’ Dilemma: Discouraging Police Investigations and Encouraging Hack Reports
When a hacker illegally compromises a company computer, this crime often goes unreported to police. Some look to avoid embarrassment or litigation; others dread financial loss if word should reach their investors (Hamblen, 1998, p. 8). Another reason is their fear of the law freezing their network system for weeks during investigation—a cost concern (Breidenbach, 1998, p. 37). A third reason is complexity of jurisdiction; i.e. no geography exists in cyberspace: hackers can hop over numerous jurisdictions in seconds (Breidenbach, p. 37). However, the main reason is that companies make decisions based upon cost versus benefits. For example, if a company computer is hacked, unless it escalates, the company will not notify police because sworn statements and court testimony all take time, effort and money and this often sinks a medium-sized or small company (Cross, 2008, p. 117). Still, managers do not want to share the information stored on a company network with police, perhaps because of illegal or “creative” tax strategies used by the company (Cross, p. 117).
There are two sides to this issue: The FBI needs to know the composite of a hacker—is it a world-renowned terrorist or just a teen prankster? More than likely, it is a pastime for bored adolescents and teens. DeGeorge (2003) discussed the view of the hacker as a superhero: “… [S]ome people consider those who compromise computer networks … [to be] heroes who have shown that the networks … are vulnerable” (p. 33). Nevertheless, this crime needs lawyers that are part prosecutor and part computer scientist. Companies sorely need a national task force made up of state and local jurisdictions so cases can go to one particular court (DeGeorge, p. 37).
Also, law enforcement should try to foster good relationships with businesses so companies will not hesitate to come forward when they are hacked (DeGeorge, p. 37). Another way to encourage a company to report a hacker is to inform it on current regulations. Federal rules can give a judge the discretion to hide a company’s identity—at least until the matter is solved (Hamblen, p. 8).
References
Breidenbach, S. (1998, Feb. 16). Outlaws on the loose. Network World, p. 36.
Cross, M. (2008). Scene of the cybercrime 2nd ed.). Burlington, MA: Syngress Publishing.
DeGeorge, R. T. (2003). The ethics of information technology and business. Hoboken, NJ: Wiley-Blackwell.
Hamblen, M. (1998, April 13). FBI asks companies to report hack attacks. Computerworld, 8.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee