The
technology is at the peak within a century, there is no doubt that it is the
age of technology and nobody in the world could even think of his life without
the technologies being involved. It has made our lives easier and the whole
world has become a global village. The technology is so powerful that we should
use it for the good cause because if a technology is used for the bad purposes
it can make the situation worst. As we know that the terrorism in the world is
becoming worse and very hard to stop. They are also using technology to make
their evil tasks easier (Kuhlmann, Merkel, Dittmann,
Zitturi, & Griesbacher, 2016). The technology is
supporting the terrorism all over the world. According to the recent report,
the number of death due to terrorist attacks has 20% increases from the past
twenty years. Many terrorist groups all over the world have their own
organizations and motivations. In this
case study there is a discussion on the criminal and terrorist activities in
the social media and internet. By the use of technology they are more in touch
with each other, their weapons are also deadliest, they get most of the information
about the target area from the internet (Picard, 2015).
Case description of Internet
Technology Used for Terrorist Activities and Other Financial Frauds
We can say that the technology is
the very efficient tool that can be used to by both good and evil spirits in
the society. If a terrorist with poor mentality use, it becomes worse for the
society. However, if it is used by social welfare organization it is a good
thing. The technology itself is not good or bad, it uses make it's good or bad.
Now there are many technologies are introduce that can minimize the rate of
terrorism in the future. This is the only way to fight with the use of bad
technology. On the other hand, the anti-terrorism organization is also doing
their work to control the terrorism in the world. They are also using advanced
technologies to prevent this world from the terrorists. By using the
technology, they keep track of the terrorist, their locations, and
conversations.
Can internet censorship be an option to
deal with problem?
As
we know that, the internet censorship is the restriction on some website and
other content online to be viewed. It may be some regulation or some law issued
by the government. There are some advantages and disadvantages of the internet
censorship (brandongaille.com, 2013).
The
main advantage of the internet censorship is that the content that might be
harmful or dangerous for use is blocked from the internet. This practice also
protects the children to view the content on the internet that might be harmful
and scary for them, for example, the videos of murders and deception sites have
become very active on the internet. Because the internet censorship most
restrict the site that is are not good to view and have a negative impact on
the human mental health and sometimes with the frequent watching of these kinds
of a video the person may lose his personality. With all the advantages, there
are still some disadvantages of the internet censorship (brandongaille.com, 2013). The key point that
we can raise as the cons of internet censorship is that it somehow restrict the
information that is genuine. The process of internet censorship is very costly,
if someone really wants to restrict his information from the internet it has to
pay a very high cost for it. Economically it has a very bad impact; if the
website of the organization is blocked or can be accessed by the limited users,
it is not very good for its productivity.
Financial frauds of Internet
Technology Used for Terrorist Activities
With
the globalization of the business environment, the rate of the fraud in the
financial sector is also increasing. In India, the financial service sector has
a growth in the last ten year and the frauds in the financial management are
also increasing very rapidly. The people are now using completely different
trends for making the frauds in the finance. For the management of the fraud,
the financial sector organization is now adopting many of the new strategies.
Because of the increasing trends of the fraud in the financial sector the
organizations; there is a need to increase the transparency in the organization
so that the financial frauds can be reducing. Many of the companies are also
doing their business on the internet that also increases the overall financial
frauds in the country (ASSOCHAM, 2015).
The
financial stability is very important for the business of the organization. The
financial statement of the business is calculating through different processing
in the different department. Because of the long processing of the financial
statement, there are many of the employees of the company that is involved in
the financial statement process and all of the other financial management. The
of the dishonest employees in the organization are likely to do fraud by using
the technology while processing of the financial reporting that have the worst
impact on the business of the organization and make the budget of the
organization to go beyond control. It is very important for the business to
have very loyal employees when it comes to manage and process the overall
financial state of the business (Warfield, Partner, Warfield,
& Associates, 2013). So it can be said that the accounting
professionals in the organization need to know about their duties and there
showed be control over all of the financial transactions in the organization so
that the frauds can be minimize (Moore, Mark, & W., 2016).
In
this case study, there is a discussion about the all of the financial frauds
that are likely to occur inside the organization and how it affects the overall
business of the organization. Many of the employees in the organization also do
the slow frauds so that they are not detected guilty. This case study shows the
complete ratio of all of the frauds in the company that is likely to occur
during a specific period (Warfield, Partner, Warfield,
& Associates, 2013). There are many of the methods that the
employees are likely to use to make the financial frauds in the organization
some of the employees also use the credit card of the organization to make the
fraud. This case study discusses the financial frauds in the institutions of
Australia. This case study is based on the recent research made in Australia
about the issue of the financial frauds in the organization through the
managers and staff. The case study contains all of the factual information
about the cases of the employee's frauds in the organization (Moore, Mark,
& W., 2016).
There are many kinds of the cases of the frauds in the organization by the
employees have been discussed in the case study. Many of the employees stolen
some of the financial amounts from the company in which they were working. The
other most popular issue that is committed by the employees is the fraudulent
loans to the customers. The duration of the frauds of different employees also
varies. The main motivation of the employees to commit the fraud in the
organization is the poor check and control in the organization (Warfield,
Partner, Warfield, & Associates, 2013).
Case analysis of Internet
Technology Used for Terrorist Activities and Other Financial Frauds
by
analyzing the case study about the financial fraud and the use of technology
for the terrorist activities, it is evaluated that there is a lot of trend of
hacking in the society because of the increasing use of technology and online
platforms, it is very important to make, the data secure and censored in the
national level so that the sensitive data cannot be reached in the evil hands.
Sometimes the open access to all kind of national information can cause
unwanted activities like terrorist attacks in the country. Internet censorship
is also a restriction for the people who spread the fake news over the internet
and save the public from many disturbing events. There are many activities
carry out by the international anti-terrorism companies to minimize the
terrorist attack by the use of efficient technology.
There many organizations out there who recover
the after attack damage, as soon as possible by the use of technology.
Technology has also empowered the media, who is playing its role to bring all
the updates and situations from all over the world to the public; they are
raising this terrorist-related issue in front of the world and the people (Keller, 2015). It is
very important for the business to promote itself online to as many users as
possible for its growth and sell their product on the economic platform. It
also gives a sense of that no one is allowed to see what he/she want to see on
the internet, all the things are under the control of the government. Nobody
has the freedom to express his/her feelings over the internet. Internet
censorship also minimizes the opportunities for the entrepreneurs to expand and
grow their businesses by accessing more people (Kuhlmann,
Merkel, Dittmann, Zitturi, & Griesbacher, 2016).
In
the organization, the managers and non-managers all are likely to make the
frauds. But the frauds that are made by the high authority employees are worse
than the ordinary employee's frauds (Insider Fraud in Financial
Services, 2012).
The frauds in the business are the very common crime that is done by the
employees of the organization, and it eventually results in the failure of the
business. The organization has adopted many of the strategies in the business
to reduce the overall fraud in the organization. There many kinds of frauds
that the employees make in the company in the financial sector and the
nonimpact of the fraud in the company business is also very bad. The company to
reduce the overall fraud in the organization making the .work environment of
the organization more positive, monitoring employees behaviors, supervising the
overall employee's activities and work in the organization. All of the
strategies that are the companies adopting are good to reduce the fraud in the
organization. On the other side, we also come to know about many of the
activities in the organization to detect the fraud by the employees so that the
dishonest people can be deducted from the organization (Australia,
2011).
The
impacts of the Satyam financial fraud on the view of the shareholders has been
shown in the case study. How the Satyam scam took place also has been
overviewed and delivered by the case study. However, numbers of questions
concerning the financial safety have risen again due to the international
banking disasters. The consumers could attain the information and also
conducting the business transactions throughout the online banking. But, the
occasions of cyber-attacks, indeed, have developed intensely as well during the
last previous years. To control the crimes in the future, it is quite essential
to figure out about the criminal methods (Kuhlmann, Merkel, Dittmann, Zitturi, & Griesbacher, 2016). Numbers of
important data have collected by the scientists to figure out on the capability
of big data method to alleviate the financial risks. Still, the digital
currencies will be impacted from this main challenges represented by cybercrimes.
The individuals or companies will have to bare the weighty amount of financial
loss if the cybercrimes are unable to be alleviated. Therefore, it is
considered to be highly essential to alleviate the financial cybercrime because
the companies could experience serious outcomes if the financial cybercrime is
unable to be controlled. In fact, the studies have mentioned for a huge effect
on the companies as they have to experience weighty financial losses from the
financial frauds.
It
is also found in the case study that because of the advance use of technologies
the, there is an increase in the criminal and terrorist activities. It is
obvious that the social media platforms are available to almost everyone in the
world and they people are using it without any license. The identity of the person in the social media
is mostly not known and that is a privilege for the criminals and terrorist to
use these platform for their personal use and promote the terrorism. So it can
be said that because of the use of online platforms not only just the terrorist
activities but the financial frauds is also increasing. as all of us are familiar
with the world hackers but use the technology to hack the financial
accounts or some confidential
information of the organization and then threat the firm to send him money,
otherwise he use it to cause harm to the
organization.
The use of the internet has transformed
that ways and terrorism that radicalize the people of different areas. The
Internet creates more opportunities for terrorism. The internet access in the
United Kingdom had reached penetration rates of 87% of the households. The
internet usages of individuals stand at 89% and 75% in the EU (Unodc. org, 2012). The massive
increase of terrorism is due to use of different social media services and
platform. Most often terrorists use the internet to collect information and to
coordinate with people and followers. The terrorist uses generic functions that
underly facilities of technology. The framework for the attack planning and
distribution of propaganda is used in a different type of audience development (Kuhlmann, Merkel, Dittmann, Zitturi, &
Griesbacher, 2016).
The technology companies are not facilitating all type of products and attack
planning. The secure communication is provided to terrorists. The strength of
terrorist attacks is amplified by using social media and terrorist uses
technology to attack the targets. Generally speaking, the technology can be
used to exploit the terrorist organization. Terrorist often uses the new social
platform such as Twitter, Facebook, and social media such as YouTube (Kuhlmann, Merkel, Dittmann, Zitturi, &
Griesbacher, 2016).
The online propagandas are often multi-lingual and terrorist messages are
delivered through mobile apps, messaging, and emails. Paradoxically, the
communication through the decentralized network is increasing due to breaching
in the security network. The contemporary terrorists use the internet for
disseminating propaganda. The unusual and distinctive methods are used by the
terrorists under the hiding instruction and coded messages through encrypted
files (Unodc. org, 2012). The internet expanded opportunities
for terrorists to secure publicity. The fact is that the terrorists have direct
control over the target audience and uses multistage processes for the
selection threshold. They have direct access and control on the manipulation of
their enemies. Different terrorist sites use violent activities and agendas to
restrict the activities of normal users and to access the confidential data.
The terrorist sites have rhetorical structures and justify reliance on violence
(Unodc. org, 2012). There is a vast
range of data as well as services that are available on the internet and
terrorists uses a proactive approach and supporting specialist tools. The use
of tools promotes efficient identification of data. The hijacker’s of 9/11
incident had also used the internet services and sharpened their internet
skills. The majority of former extremists in the Neo Nazi incident of Germany
heavily communicated through the internet and used disseminating propaganda (Moore, Mark, & W., 2016). Another incident of
cyberattack occurred in Israel during January 2012. The case of R v. Terence
Roy Brown in 2011 EWCA Crim 2751 is another example related to the use of
internet in the terrorist attack (Unodc. org, 2012). In Hicheur case, the internet
communication was used to share files through the peer to peer technology and
File transfer protocol (FTP). The file sharing network transferred logs and
some payment information. In this case cloud computing was also used to
remotely share and store the data. The evidences were used for investigation of
terrorist incident through the internet.
Conclusion on Internet
Technology Used for Terrorist Activities and Other Financial Frauds
Summing
up the discussion about the financial fraud and the use of technology for the
terrorist activities, it can be said that the technology is so powerful that we
should use it for the good cause because if a technology is used for the bad
purposes it can make the situation worst.
The technology itself is not good or bad, it uses make it's good or bad.
Now there are many technologies are introduce that can minimize the rate of
terrorism in the future. Because the internet censorship most restrict the site
that is are not good to view and have a negative impact on the human mental
health and sometimes with the frequent watching of these kinds of a video the
person may lose his personality. The people are now using completely different
trends for making the frauds in the finance. The of the dishonest employees in
the organization are likely to do fraud by using the technology while
processing of the financial reporting that have the worst impact on the
business of the organization Many of the employees in the organization also do
the slow frauds so that they are not detected guilty. There are many kinds of
the cases of the frauds in the organization by the employees have been
discussed in the case study. Many of the employees stolen some of the financial
amounts from the company in which they were working. Internet censorship is
also a restriction for the people who spread the fake news over the internet
and save the public from many disturbing events. The frauds in the business are
the very common crime that is done by the employees of the organization, and it
eventually results in the failure of the business. All of the strategies that
are the companies adopting are good to reduce the fraud in the organization. It
is also found in the case study that because of the advance use of technologies
the, there is an increase in the criminal and terrorist activities. The
identity of the person in the social media is mostly not known and that is a
privilege for the criminals and terrorist to use these platform for their
personal use and promote the terrorism
References of Internet Technology Used for Terrorist
Activities and Other Financial Frauds
ASSOCHAM. (2015). Current fraud trends in thefinancial
sector. 28.
Australia, C. (2011). Employee fraud .
brandongaille.com. (2013, December 10). The Pros
and Cons of Internet Censorship. Retrieved from
https://brandongaille.com/the-pros-andcons-internet-censorship/
Insider Fraud in Financial Services. (2012). 20.
Keller, J. (2015, December 8). The growing role of
technology in the global war on terrorism. Retrieved from
http://www.militaryaerospace.com/articles/2015/12/counter-terrorism-technology.html
Kuhlmann, S., Merkel, R., Dittmann, J., Zitturi, B.
C., & Griesbacher, M. (2016). Criminals Cash Flow Strategies in Financial
Crime on the Example of Online and Offline Fraud. The European Conference on
Psychology & the Behavioral Sciences.
Moore, G. D., Mark, S. R., & W., A. (2016). Fraud,
Collusion and the Financial Statements—A Refresher for Practicing
Professionals. The Journal of Global Business Management, 12(1),
155-163.
Picard, J. (2015, August 13). For better or worse,
technology changing the way we learn. Retrieved from
https://worcestermag.com/2015/08/13/for-better-or-worse-technology-changing-the-way-we-learn/35651
Unodc. org. (2012). The use of the Internet for
terrorist purposes. Retrieved from www.unodc.org:
https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf?forcedefault=true
Warfield, B., Partner, Warfield, & Associates.
(2013). Employee Fraud in Australian Financial Institutions. Warfield &
Associates .