The technology is at the peak within a century, there is no
doubt that it is the age of technology and nobody in the world could even think
of his life without the technologies being involved. It has made our lives
easier and the whole world has become a global village. The technology is so
powerful that we should use it for the good cause because if a technology is
used for the bad purposes it can make the situation worst. As we know that the
terrorism in the world is becoming worse and very hard to stop. They are also
using technology to make their evil tasks easier (Kuhlmann, Merkel, Dittmann, Zitturi, &
Griesbacher, 2016).
The technology is supporting the terrorism all over the world. According to the
recent report, the number of death due to terrorist attacks has 20% increases
from the past twenty years. Many terrorist groups all over the world have their
own organizations and motivations. In
this case study there is a discussion on the criminal and terrorist activities
in the social media and internet. By the use of technology they are more in
touch with each other, their weapons are also deadliest, they get most of the information
about the target area from the internet (Picard, 2015).
Case description of Internet Technology Used for Terrorist
Activities and Other Financial Frauds
We can say
that the technology is the very efficient tool that can be used to by both good
and evil spirits in the society. If a terrorist with poor mentality use, it
becomes worse for the society. However, if it is used by social welfare
organization it is a good thing. The technology itself is not good or bad, it
uses make it's good or bad. Now there are many technologies are introduce that
can minimize the rate of terrorism in the future. This is the only way to fight
with the use of bad technology. On the other hand, the anti-terrorism
organization is also doing their work to control the terrorism in the world.
They are also using advanced technologies to prevent this world from the
terrorists. By using the technology, they keep track of the terrorist, their
locations, and conversations.
Can internet censorship be an option to deal with problem?
As we know
that, the internet censorship is the restriction on some website and other
content online to be viewed. It may be some regulation or some law issued by
the government. There are some advantages and disadvantages of the internet
censorship (brandongaille.com, 2013).
The main advantage of the internet censorship
is that the content that might be harmful or dangerous for use is blocked from
the internet. This practice also protects the children to view the content on
the internet that might be harmful and scary for them, for example, the videos
of murders and deception sites have become very active on the internet. Because
the internet censorship most restrict the site that is are not good to view and
have a negative impact on the human mental health and sometimes with the
frequent watching of these kinds of a video the person may lose his personality.
With all the advantages, there are still some disadvantages of the internet
censorship (brandongaille.com, 2013). The key point that
we can raise as the cons of internet censorship is that it somehow restrict the
information that is genuine. The process of internet censorship is very costly,
if someone really wants to restrict his information from the internet it has to
pay a very high cost for it. Economically it has a very bad impact; if the
website of the organization is blocked or can be accessed by the limited users,
it is not very good for its productivity.
Financial frauds of Internet Technology Used for Terrorist
Activities
With the globalization of the business environment, the rate
of the fraud in the financial sector is also increasing. In India, the
financial service sector has a growth in the last ten year and the frauds in
the financial management are also increasing very rapidly. The people are now
using completely different trends for making the frauds in the finance. For the
management of the fraud, the financial sector organization is now adopting many
of the new strategies. Because of the increasing trends of the fraud in the
financial sector the organizations; there is a need to increase the
transparency in the organization so that the financial frauds can be reducing.
Many of the companies are also doing their business on the internet that also
increases the overall financial rauds in the country (ASSOCHAM, 2015).
The financial stability is very important for the business
of the organization. The financial statement of the business is calculating
through different processing in the different department. Because of the long
processing of the financial statement, there are many of the employees of the
company that is involved in the financial statement process and all of the
other financial management. The of the dishonest employees in the organization
are likely to do fraud by using the technology while processing of the
financial reporting that have the worst impact on the business of the
organization and make the budget of the organization to go beyond control. It
is very important for the business to have very loyal employees when it comes
to manage and process the overall financial state of the business (Warfield, Partner, Warfield, &
Associates, 2013).
So it can be said that the accounting professionals in the organization need to
know about their duties and there showed be control over all of the financial
transactions in the organization so that the frauds can be minimize (Moore, Mark, & W., 2016).
In this case study, there is a discussion about the all of
the financial frauds that are likely to occur inside the organization and how
it affects the overall business of the organization. Many of the employees in
the organization also do the slow frauds so that they are not detected guilty.
This case study shows the complete ratio of all of the frauds in the company
that is likely to occur during a specific period (Warfield, Partner, Warfield, &
Associates, 2013).
There are many of the methods that the employees are likely to use to make the
financial frauds in the organization some of the employees also use the credit
card of the organization to make the fraud. This case study discusses the
financial frauds in the institutions of Australia. This case study is based on
the recent research made in Australia about the issue of the financial frauds
in the organization through the managers and staff. The case study contains all
of the factual information about the cases of the employee's frauds in the
organization (Moore, Mark, & W., 2016). There are many
kinds of the cases of the frauds in the organization by the employees have been
discussed in the case study. Many of the employees stolen some of the financial
amounts from the company in which they were working. The other most popular
issue that is committed by the employees is the fraudulent loans to the
customers. The duration of the frauds of different employees also varies. The
main motivation of the employees to commit the fraud in the organization is the
poor check and control in the organization (Warfield, Partner, Warfield, &
Associates, 2013).
Case analysis of Internet Technology Used for Terrorist
Activities and Other Financial Frauds
By analyzing the case study about the financial fraud and
the use of technology for the terrorist activities, it is evaluated that there
is a lot of trend of hacking in the society because of the increasing use of
technology and online platforms, it is very important to make, the data secure
and censored in the national level so that the sensitive data cannot be reached
in the evil hands. Sometimes the open access to all kind of national
information can cause unwanted activities like terrorist attacks in the
country. Internet censorship is also a restriction for the people who spread
the fake news over the internet and save the public from many disturbing
events. There are many activities carry out by the international anti-terrorism
companies to minimize the terrorist attack by the use of efficient technology.
There many
organizations out there who recover the after attack damage, as soon as
possible by the use of technology. Technology has also empowered the media, who
is playing its role to bring all the updates and situations from all over the
world to the public; they are raising this terrorist-related issue in front of
the world and the people (Keller, 2015). It is
very important for the business to promote itself online to as many users as
possible for its growth and sell their product on the economic platform. It
also gives a sense of that no one is allowed to see what he/she want to see on
the internet, all the things are under the control of the government. Nobody
has the freedom to express his/her feelings over the internet. Internet
censorship also minimizes the opportunities for the entrepreneurs to expand and
grow their businesses by accessing more people (Kuhlmann, Merkel, Dittmann, Zitturi, &
Griesbacher, 2016).
In the organization, the managers and non-managers all are
likely to make the frauds. But the frauds that are made by the high authority
employees are worse than the ordinary employee's frauds (Insider Fraud in Financial Services, 2012). The frauds in the
business are the very common crime that is done by the employees of the
organization, and it eventually results in the failure of the business. The
organization has adopted many of the strategies in the business to reduce the
overall fraud in the organization. There many kinds of frauds that the
employees make in the company in the financial sector and the nonimpact of the
fraud in the company business is also very bad. The company to reduce the overall
fraud in the organization making the .work environment of the organization more
positive, monitoring employees behaviors, supervising the overall employee's
activities and work in the organization. All of the strategies that are the
companies adopting are good to reduce the fraud in the organization. On the
other side, we also come to know about many of the activities in the
organization to detect the fraud by the employees so that the dishonest people
can be deducted from the organization (Australia, 2011).
The impacts of the Satyam financial fraud on the view of the
shareholders has been shown in the case study. How the Satyam scam took place
also has been overviewed and delivered by the case study. However, numbers of
questions concerning the financial safety have risen again due to the
international banking disasters. The consumers could attain the information and
also conducting the business transactions throughout the online banking. But,
the occasions of cyber-attacks, indeed, have developed intensely as well during
the last previous years. To control the crimes in the future, it is quite
essential to figure out about the criminal methods (Kuhlmann, Merkel,
Dittmann, Zitturi, & Griesbacher, 2016). Numbers of
important data have collected by the scientists to figure out on the capability
of big data method to alleviate the financial risks. Still, the digital
currencies will be impacted from this main challenges represented by
cybercrimes. The individuals or companies will have to bare the weighty amount
of financial loss if the cybercrimes are unable to be alleviated. Therefore, it
is considered to be highly essential to alleviate the financial cybercrime because
the companies could experience serious outcomes if the financial cybercrime is
unable to be controlled. In fact, the studies have mentioned for a huge effect
on the companies as they have to experience weighty financial losses from the
financial frauds.
It is also found in the case study that because of the
advance use of technologies the, there is an increase in the criminal and terrorist
activities. It is obvious that the social media platforms are available to
almost everyone in the world and they people are using it without any license. The identity of the person in the social media
is mostly not known and that is a privilege for the criminals and terrorist to
use these platform for their personal use and promote the terrorism. So it can
be said that because of the use of online platforms not only just the terrorist
activities but the financial frauds is also increasing. as all of us are familiar
with the world hackers but use the technology to hack the financial
accounts or some confidential information
of the organization and then threat the firm to send him money, otherwise he
use it to cause harm to the organization.
The use of the internet has transformed that ways and
terrorism that radicalize the people of different areas. The Internet creates more
opportunities for terrorism. The internet access in the United Kingdom had
reached penetration rates of 87% of the households. The internet usages of
individuals stand at 89% and 75% in the EU (Unodc. org, 2012). The massive
increase of terrorism is due to use of different social media services and
platform. Most often terrorists use the internet to collect information and to
coordinate with people and followers. The terrorist uses generic functions that
underly facilities of technology. The framework for the attack planning and
distribution of propaganda is used in a different type of audience development (Kuhlmann,
Merkel, Dittmann, Zitturi, & Griesbacher, 2016). The technology
companies are not facilitating all type of products and attack planning. The
secure communication is provided to terrorists. The strength of terrorist
attacks is amplified by using social media and terrorist uses technology to
attack the targets. Generally speaking, the technology can be used to exploit
the terrorist organization. Terrorist often uses the new social platform such
as Twitter, Facebook, and social media such as YouTube (Kuhlmann, Merkel,
Dittmann, Zitturi, & Griesbacher, 2016). The online
propagandas are often multi-lingual and terrorist messages are delivered
through mobile apps, messaging, and emails. Paradoxically, the communication
through the decentralized network is increasing due to breaching in the
security network. The contemporary terrorists use the internet for
disseminating propaganda. The unusual and distinctive methods are used by the
terrorists under the hiding instruction and coded messages through encrypted
files (Unodc. org, 2012). The internet
expanded opportunities for terrorists to secure publicity. The fact is that the
terrorists have direct control over the target audience and uses multistage
processes for the selection threshold. They have direct access and control on the
manipulation of their enemies. Different terrorist sites use violent activities
and agendas to restrict the activities of normal users and to access the
confidential data. The terrorist sites have rhetorical structures and justify
reliance on violence (Unodc.
org, 2012).
There is a vast range of data as well as services that are available on the
internet and terrorists uses a proactive approach and supporting specialist
tools. The use of tools promotes efficient identification of data. The
hijacker’s of 9/11 incident had also used the internet services and sharpened
their internet skills. The majority of former extremists in the Neo Nazi
incident of Germany heavily communicated through the internet and used
disseminating propaganda (Moore, Mark, & W.,
2016).
Another incident of cyberattack occurred in Israel during January 2012. The
case of R v. Terence Roy Brown in 2011 EWCA Crim 2751 is another example
related to the use of internet in the terrorist attack (Unodc. org, 2012). In Hicheur case,
the internet communication was used to share files through the peer to peer
technology and File transfer protocol (FTP). The file sharing network
transferred logs and some payment information. In this case cloud computing was
also used to remotely share and store the data. The evidences were used for
investigation of terrorist incident through the internet.
Conclusion on Internet Technology Used for Terrorist
Activities and Other Financial Frauds
Summing up the discussion about the financial fraud and the
use of technology for the terrorist activities, it can be said that the technology
is so powerful that we should use it for the good cause because if a technology
is used for the bad purposes it can make the situation worst. The technology itself is not good or bad, it
uses make it's good or bad. Now there are many technologies are introduce that
can minimize the rate of terrorism in the future. Because the internet
censorship most restrict the site that is are not good to view and have a
negative impact on the human mental health and sometimes with the frequent
watching of these kinds of a video the person may lose his personality. The
people are now using completely different trends for making the frauds in the
finance. The of the dishonest employees in the organization are likely to do
fraud by using the technology while processing of the financial reporting that
have the worst impact on the business of the organization Many of the employees
in the organization also do the slow frauds so that they are not detected
guilty. There are many kinds of the cases of the frauds in the organization by
the employees have been discussed in the case study. Many of the employees
stolen some of the financial amounts from the company in which they were
working. Internet censorship is also a restriction for the people who spread
the fake news over the internet and save the public from many disturbing
events. The frauds in the business are the very common crime that is done by
the employees of the organization, and it eventually results in the failure of
the business. All of the strategies that are the companies adopting are good to
reduce the fraud in the organization. It is also found in the case study that
because of the advance use of technologies the, there is an increase in the
criminal and terrorist activities. The identity of the person in the social
media is mostly not known and that is a privilege for the criminals and
terrorist to use these platform for their personal use and promote the
terrorism.
References of Internet Technology Used for Terrorist
Activities and Other Financial Frauds
ASSOCHAM.
(2015). Current fraud trends in thefinancial sector. 28.
Australia, C. (2011). Employee fraud .
brandongaille.com. (2013, December 10). The Pros and Cons of
Internet Censorship. Retrieved from
https://brandongaille.com/the-pros-and-cons-internet-censorship/
Insider Fraud in Financial Services. (2012). 20.
Keller, J. (2015, December 8). The growing role of
technology in the global war on terrorism. Retrieved from
http://www.militaryaerospace.com/articles/2015/12/counter-terrorism-technology.html
Kuhlmann, S., Merkel, R., Dittmann, J., Zitturi, B. C.,
& Griesbacher, M. (2016). Criminals Cash Flow Strategies in Financial Crime
on the Example of Online and Offline Fraud. The European Conference on
Psychology & the Behavioral Sciences.
Moore, G. D., Mark, S. R., & W., A. (2016). Fraud,
Collusion and the Financial Statements—A Refresher for Practicing
Professionals. The Journal of Global Business Management, 12(1), 155-163.
Picard, J. (2015, August 13). For better or worse,
technology changing the way we learn. Retrieved from
https://worcestermag.com/2015/08/13/for-better-or-worse-technology-changing-the-way-we-learn/35651
Unodc. org. (2012). The use of the Internet for terrorist
purposes. Retrieved from www.unodc.org:
https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf?forcedefault=true
Warfield, B., Partner, Warfield, & Associates. (2013).
Employee Fraud in Australian Financial Institutions. Warfield & Associates .