Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of Internet Technology Used for Terrorist Activities and Other Financial Frauds

Category: Computer Sciences Paper Type: Case Study Writing Reference: APA Words: 3300

The technology is at the peak within a century, there is no doubt that it is the age of technology and nobody in the world could even think of his life without the technologies being involved. It has made our lives easier and the whole world has become a global village. The technology is so powerful that we should use it for the good cause because if a technology is used for the bad purposes it can make the situation worst. As we know that the terrorism in the world is becoming worse and very hard to stop. They are also using technology to make their evil tasks easier (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016). The technology is supporting the terrorism all over the world. According to the recent report, the number of death due to terrorist attacks has 20% increases from the past twenty years. Many terrorist groups all over the world have their own organizations and motivations.  In this case study there is a discussion on the criminal and terrorist activities in the social media and internet. By the use of technology they are more in touch with each other, their weapons are also deadliest, they get most of the information about the target area from the internet (Picard, 2015).

Case description of Internet Technology Used for Terrorist Activities and Other Financial Frauds

We can say that the technology is the very efficient tool that can be used to by both good and evil spirits in the society. If a terrorist with poor mentality use, it becomes worse for the society. However, if it is used by social welfare organization it is a good thing. The technology itself is not good or bad, it uses make it's good or bad. Now there are many technologies are introduce that can minimize the rate of terrorism in the future. This is the only way to fight with the use of bad technology. On the other hand, the anti-terrorism organization is also doing their work to control the terrorism in the world. They are also using advanced technologies to prevent this world from the terrorists. By using the technology, they keep track of the terrorist, their locations, and conversations.

Can internet censorship be an option to deal with problem?

As we know that, the internet censorship is the restriction on some website and other content online to be viewed. It may be some regulation or some law issued by the government. There are some advantages and disadvantages of the internet censorship (brandongaille.com, 2013).

The main advantage of the internet censorship is that the content that might be harmful or dangerous for use is blocked from the internet. This practice also protects the children to view the content on the internet that might be harmful and scary for them, for example, the videos of murders and deception sites have become very active on the internet. Because the internet censorship most restrict the site that is are not good to view and have a negative impact on the human mental health and sometimes with the frequent watching of these kinds of a video the person may lose his personality. With all the advantages, there are still some disadvantages of the internet censorship (brandongaille.com, 2013). The key point that we can raise as the cons of internet censorship is that it somehow restrict the information that is genuine. The process of internet censorship is very costly, if someone really wants to restrict his information from the internet it has to pay a very high cost for it. Economically it has a very bad impact; if the website of the organization is blocked or can be accessed by the limited users, it is not very good for its productivity.

Financial frauds of Internet Technology Used for Terrorist Activities

With the globalization of the business environment, the rate of the fraud in the financial sector is also increasing. In India, the financial service sector has a growth in the last ten year and the frauds in the financial management are also increasing very rapidly. The people are now using completely different trends for making the frauds in the finance. For the management of the fraud, the financial sector organization is now adopting many of the new strategies. Because of the increasing trends of the fraud in the financial sector the organizations; there is a need to increase the transparency in the organization so that the financial frauds can be reducing. Many of the companies are also doing their business on the internet that also increases the overall financial rauds in the country (ASSOCHAM, 2015).

The financial stability is very important for the business of the organization. The financial statement of the business is calculating through different processing in the different department. Because of the long processing of the financial statement, there are many of the employees of the company that is involved in the financial statement process and all of the other financial management. The of the dishonest employees in the organization are likely to do fraud by using the technology while processing of the financial reporting that have the worst impact on the business of the organization and make the budget of the organization to go beyond control. It is very important for the business to have very loyal employees when it comes to manage and process the overall financial state of the business (Warfield, Partner, Warfield, & Associates, 2013). So it can be said that the accounting professionals in the organization need to know about their duties and there showed be control over all of the financial transactions in the organization so that the frauds can be minimize (Moore, Mark, & W., 2016).

In this case study, there is a discussion about the all of the financial frauds that are likely to occur inside the organization and how it affects the overall business of the organization. Many of the employees in the organization also do the slow frauds so that they are not detected guilty. This case study shows the complete ratio of all of the frauds in the company that is likely to occur during a specific period (Warfield, Partner, Warfield, & Associates, 2013). There are many of the methods that the employees are likely to use to make the financial frauds in the organization some of the employees also use the credit card of the organization to make the fraud. This case study discusses the financial frauds in the institutions of Australia. This case study is based on the recent research made in Australia about the issue of the financial frauds in the organization through the managers and staff. The case study contains all of the factual information about the cases of the employee's frauds in the organization (Moore, Mark, & W., 2016). There are many kinds of the cases of the frauds in the organization by the employees have been discussed in the case study. Many of the employees stolen some of the financial amounts from the company in which they were working. The other most popular issue that is committed by the employees is the fraudulent loans to the customers. The duration of the frauds of different employees also varies. The main motivation of the employees to commit the fraud in the organization is the poor check and control in the organization (Warfield, Partner, Warfield, & Associates, 2013).

Case analysis of Internet Technology Used for Terrorist Activities and Other Financial Frauds

By analyzing the case study about the financial fraud and the use of technology for the terrorist activities, it is evaluated that there is a lot of trend of hacking in the society because of the increasing use of technology and online platforms, it is very important to make, the data secure and censored in the national level so that the sensitive data cannot be reached in the evil hands. Sometimes the open access to all kind of national information can cause unwanted activities like terrorist attacks in the country. Internet censorship is also a restriction for the people who spread the fake news over the internet and save the public from many disturbing events. There are many activities carry out by the international anti-terrorism companies to minimize the terrorist attack by the use of efficient technology.

There many organizations out there who recover the after attack damage, as soon as possible by the use of technology. Technology has also empowered the media, who is playing its role to bring all the updates and situations from all over the world to the public; they are raising this terrorist-related issue in front of the world and the people (Keller, 2015).   It is very important for the business to promote itself online to as many users as possible for its growth and sell their product on the economic platform. It also gives a sense of that no one is allowed to see what he/she want to see on the internet, all the things are under the control of the government. Nobody has the freedom to express his/her feelings over the internet. Internet censorship also minimizes the opportunities for the entrepreneurs to expand and grow their businesses by accessing more people (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016).

In the organization, the managers and non-managers all are likely to make the frauds. But the frauds that are made by the high authority employees are worse than the ordinary employee's frauds (Insider Fraud in Financial Services, 2012). The frauds in the business are the very common crime that is done by the employees of the organization, and it eventually results in the failure of the business. The organization has adopted many of the strategies in the business to reduce the overall fraud in the organization. There many kinds of frauds that the employees make in the company in the financial sector and the nonimpact of the fraud in the company business is also very bad. The company to reduce the overall fraud in the organization making the .work environment of the organization more positive, monitoring employees behaviors, supervising the overall employee's activities and work in the organization. All of the strategies that are the companies adopting are good to reduce the fraud in the organization. On the other side, we also come to know about many of the activities in the organization to detect the fraud by the employees so that the dishonest people can be deducted from the organization (Australia, 2011).

The impacts of the Satyam financial fraud on the view of the shareholders has been shown in the case study. How the Satyam scam took place also has been overviewed and delivered by the case study. However, numbers of questions concerning the financial safety have risen again due to the international banking disasters. The consumers could attain the information and also conducting the business transactions throughout the online banking. But, the occasions of cyber-attacks, indeed, have developed intensely as well during the last previous years. To control the crimes in the future, it is quite essential to figure out about the criminal methods (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016). Numbers of important data have collected by the scientists to figure out on the capability of big data method to alleviate the financial risks. Still, the digital currencies will be impacted from this main challenges represented by cybercrimes. The individuals or companies will have to bare the weighty amount of financial loss if the cybercrimes are unable to be alleviated. Therefore, it is considered to be highly essential to alleviate the financial cybercrime because the companies could experience serious outcomes if the financial cybercrime is unable to be controlled. In fact, the studies have mentioned for a huge effect on the companies as they have to experience weighty financial losses from the financial frauds.

It is also found in the case study that because of the advance use of technologies the, there is an increase in the criminal and terrorist activities. It is obvious that the social media platforms are available to almost everyone in the world and they people are using it without any license.  The identity of the person in the social media is mostly not known and that is a privilege for the criminals and terrorist to use these platform for their personal use and promote the terrorism. So it can be said that because of the use of online platforms not only just the terrorist activities but the financial frauds is also increasing. as all of us are familiar with the world hackers but use the technology to hack the financial accounts  or some confidential information of the organization and then threat the firm to send him money, otherwise he use it  to cause harm to the organization.

The use of the internet has transformed that ways and terrorism that radicalize the people of different areas. The Internet creates more opportunities for terrorism. The internet access in the United Kingdom had reached penetration rates of 87% of the households. The internet usages of individuals stand at 89% and 75% in the EU (Unodc. org, 2012). The massive increase of terrorism is due to use of different social media services and platform. Most often terrorists use the internet to collect information and to coordinate with people and followers. The terrorist uses generic functions that underly facilities of technology. The framework for the attack planning and distribution of propaganda is used in a different type of audience development (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016). The technology companies are not facilitating all type of products and attack planning. The secure communication is provided to terrorists. The strength of terrorist attacks is amplified by using social media and terrorist uses technology to attack the targets. Generally speaking, the technology can be used to exploit the terrorist organization. Terrorist often uses the new social platform such as Twitter, Facebook, and social media such as YouTube (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016). The online propagandas are often multi-lingual and terrorist messages are delivered through mobile apps, messaging, and emails. Paradoxically, the communication through the decentralized network is increasing due to breaching in the security network. The contemporary terrorists use the internet for disseminating propaganda. The unusual and distinctive methods are used by the terrorists under the hiding instruction and coded messages through encrypted files (Unodc. org, 2012). The internet expanded opportunities for terrorists to secure publicity. The fact is that the terrorists have direct control over the target audience and uses multistage processes for the selection threshold. They have direct access and control on the manipulation of their enemies. Different terrorist sites use violent activities and agendas to restrict the activities of normal users and to access the confidential data. The terrorist sites have rhetorical structures and justify reliance on violence (Unodc. org, 2012). There is a vast range of data as well as services that are available on the internet and terrorists uses a proactive approach and supporting specialist tools. The use of tools promotes efficient identification of data. The hijacker’s of 9/11 incident had also used the internet services and sharpened their internet skills. The majority of former extremists in the Neo Nazi incident of Germany heavily communicated through the internet and used disseminating propaganda (Moore, Mark, & W., 2016). Another incident of cyberattack occurred in Israel during January 2012. The case of R v. Terence Roy Brown in 2011 EWCA Crim 2751 is another example related to the use of internet in the terrorist attack (Unodc. org, 2012). In Hicheur case, the internet communication was used to share files through the peer to peer technology and File transfer protocol (FTP). The file sharing network transferred logs and some payment information. In this case cloud computing was also used to remotely share and store the data. The evidences were used for investigation of terrorist incident through the internet.   

Conclusion on Internet Technology Used for Terrorist Activities and Other Financial Frauds

Summing up the discussion about the financial fraud and the use of technology for the terrorist activities, it can be said that the technology is so powerful that we should use it for the good cause because if a technology is used for the bad purposes it can make the situation worst.  The technology itself is not good or bad, it uses make it's good or bad. Now there are many technologies are introduce that can minimize the rate of terrorism in the future. Because the internet censorship most restrict the site that is are not good to view and have a negative impact on the human mental health and sometimes with the frequent watching of these kinds of a video the person may lose his personality. The people are now using completely different trends for making the frauds in the finance. The of the dishonest employees in the organization are likely to do fraud by using the technology while processing of the financial reporting that have the worst impact on the business of the organization Many of the employees in the organization also do the slow frauds so that they are not detected guilty. There are many kinds of the cases of the frauds in the organization by the employees have been discussed in the case study. Many of the employees stolen some of the financial amounts from the company in which they were working. Internet censorship is also a restriction for the people who spread the fake news over the internet and save the public from many disturbing events. The frauds in the business are the very common crime that is done by the employees of the organization, and it eventually results in the failure of the business. All of the strategies that are the companies adopting are good to reduce the fraud in the organization. It is also found in the case study that because of the advance use of technologies the, there is an increase in the criminal and terrorist activities. The identity of the person in the social media is mostly not known and that is a privilege for the criminals and terrorist to use these platform for their personal use and promote the terrorism.

References of Internet Technology Used for Terrorist Activities and Other Financial Frauds

ASSOCHAM. (2015). Current fraud trends in thefinancial sector. 28.

Australia, C. (2011). Employee fraud .

brandongaille.com. (2013, December 10). The Pros and Cons of Internet Censorship. Retrieved from https://brandongaille.com/the-pros-and-cons-internet-censorship/

Insider Fraud in Financial Services. (2012). 20.

Keller, J. (2015, December 8). The growing role of technology in the global war on terrorism. Retrieved from http://www.militaryaerospace.com/articles/2015/12/counter-terrorism-technology.html

Kuhlmann, S., Merkel, R., Dittmann, J., Zitturi, B. C., & Griesbacher, M. (2016). Criminals Cash Flow Strategies in Financial Crime on the Example of Online and Offline Fraud. The European Conference on Psychology & the Behavioral Sciences.

Moore, G. D., Mark, S. R., & W., A. (2016). Fraud, Collusion and the Financial Statements—A Refresher for Practicing Professionals. The Journal of Global Business Management, 12(1), 155-163.

Picard, J. (2015, August 13). For better or worse, technology changing the way we learn. Retrieved from https://worcestermag.com/2015/08/13/for-better-or-worse-technology-changing-the-way-we-learn/35651

Unodc. org. (2012). The use of the Internet for terrorist purposes. Retrieved from www.unodc.org: https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf?forcedefault=true

Warfield, B., Partner, Warfield, & Associates. (2013). Employee Fraud in Australian Financial Institutions. Warfield & Associates .

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed