Cybercrime Costs, Trends, Laws, & Solutions Essay

Pages: 5 (1303 words)  ·  Bibliography Sources: 12  ·  File: .docx  ·  Level: College Senior  ·  Topic: Computer Science  ·  Written: November 24, 2019


Social disorganization theory posits that "the cause of crime can be found in the environmental conditions within impoverished areas" (Listwan, 2013). As cyberspace is rather imperfectly ordered and policed and truly is like a digital frontier where law and order always seem to be more than a step behind, this theory makes a lot of sense.

Conflict theory asserts that there is a tension in society between the haves and the have-nots and that the have-nots will use whatever means they possess to overthrow or undermine the haves. This could also be used to explain why people engage in cybercrime: for them, it is a means of gaining power.

Costs of Cybercrime

Globally, cybercrimes cost approximately $600 billion in 2017, which is up from $500 billion in 2014 (Gross, 2017).

Trends in Cybercrime

Cybercrime is clearly trending upward as the increasing costs associated with it indicated. Other trends include:
  • increasingly long dwell time attacks;
  • advanced spear-phishing methods (focusing more and more on company executives);
  • the growing use of automation and AI among cybercriminals (Pott, 2019).

Cybercrime Laws

Buy full Download Microsoft Word File paper
for $19.77
There are numerous laws against cybercrime, including laws prohibiting online identity theft, hacking, computer intrusion, the possession or spread of child pornography online, the theft of intellectual property, and online gambling (Rees, 2006). Punishments range from 2 years to 15 years to 30 years, depending on the nature of the crime—but clearly the federal government takes cybercrime very seriously, and no one is getting off light.

Citizens' Rights

Essay on Cybercrime Costs, Trends, Laws, & Solutions Assignment

When it comes to citizen’s rights in relation to cybercrime, things get tricky. Obviously, people want to be protected; however, in seeking security they also tend to be willing to give up some privacy. With international terrorism now a constant threat, the federal government has intelligence agencies scouring the Internet and observing everyone online. Because the cyber world is still so relatively new, it is unclear what the laws should be with respect to protect citizen’s rights while simultaneously protecting them from cybercrime. As Andres (2015) points out, “the fundamental constitutional dilemma associated with cyber conflict is that it occurs almost entirely within privately owned computers and networks” (p. 156).

Investigating Cybercrimes

The field of cyber forensics is relatively new and involves using cyber data, digital footprints, etc., to locate the identity of the cybercriminal. Cyber forensics essentially is an investigative “branch of computer science that focuses on developing evidence pertained in the digital world for use in civil or criminal court proceedings” (Maragnos, Risomiliotis & Mitrou, 2012, p. 775).

Protecting Yourself from Cybercrime

What you can do to protect yourself from cybercrime:
  1. Be aware that you are an end-user whom hackers will target,
  2. Know what phishing and spear-phishing are—do not click on suspicious links in suspicious emails or provide personal information via email or by phone with someone you do not know;
  3. Secure passwords always and change them routinely.


  1. Andres, R. B. (2015). National Security and US Constitutional Rights. Cybersecurity and Human Rights in the Age of Cyberveillance, 147.
  2. Armering, T. (2015). Cybercrime: much more organized. Retrieved from
  3. Gross, G. (2018). The cost of cybercrime. Retrieved from
  4. Jaishankar, K. (2007). Establishing a theory of cyber crimes. International Journal of Cyber Criminology, 1(2), 7-9.
  5. Library of Congress. (2019). Retrieved from
  6. Listwan, S. J. (2013). Introduction to juvenile justice (2nd ed.). Retrieved from
  7. Marangos, N., Rizomiliotis, P., & Mitrou, L. (2012, December). Digital forensics in the cloud computing era. In 2012 IEEE Globecom Workshops (pp. 775-780). IEEE.
  8. Melnick, J. (2018). Top 10 Most Common Types of Cyber Attacks. Retrieved from
  9. Okabe & Haushalter. (2018). Retrieved from
  10. Pott, T. (2019). Trends in Cyber Crime: The Last 18 Months. Retrieved from
  11. Preferred IT Group. (2018). Quick Guide to Cybercrime Prevention. Retrieved from
  12. Rees, A. (2006). Cybercrime laws of the United States. Retrieved from

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (5 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Audit and Accountability Case Case Study

Computer Hacker Term Paper

Comprehensive Study of Offshore Financial Centers and Their Effects on Global Economy Dissertation

Cross Platform Mobile and Web Widgets Installation Thesis

Techniques of Computer Forensics for Preventing Email Phishing Capstone Project

View 200+ other related papers  >>

How to Cite "Cybercrime Costs, Trends, Laws, & Solutions" Essay in a Bibliography:

APA Style

Cybercrime Costs, Trends, Laws, & Solutions.  (2019, November 24).  Retrieved August 13, 2020, from

MLA Format

"Cybercrime Costs, Trends, Laws, & Solutions."  24 November 2019.  Web.  13 August 2020. <>.

Chicago Style

"Cybercrime Costs, Trends, Laws, & Solutions."  November 24, 2019.  Accessed August 13, 2020.