Measuring the cost and impact of cybercrime in Belgium (BCC) : D3.1.2 risk perception monitor report (2nd wave, 2017)
Edward Snowden’s testimony about the PRISM program has clarified the intense and widespread practice of surveillance on the Internet and social media by governments. The leaked documents provided by Snowden indicated how the PRISM program had access to users’ data from various ICT companies, such as Facebook, Google, Microsoft, and Apple. According to the whistleblower, the NSA further “impersonated Facebook in an attempt to trick users into downloading malicious code in its attempt to install malware on millions of computers which gives NSA control over users’ computers” (“NSA posed as Facebo... Mehr ...
Verfasser: | |
---|---|
Dokumenttyp: | misc |
Erscheinungsdatum: | 2018 |
Schlagwörter: | Social Sciences / Cybercrime / Cost & Harm / Security measures / Perceived internet safety / Protection motivation Theory / Awareness |
Sprache: | Englisch |
Permalink: | https://search.fid-benelux.de/Record/base-28959203 |
Datenquelle: | BASE; Originalkatalog |
Powered By: | BASE |
Link(s) : | https://biblio.ugent.be/publication/8689943 |
Edward Snowden’s testimony about the PRISM program has clarified the intense and widespread practice of surveillance on the Internet and social media by governments. The leaked documents provided by Snowden indicated how the PRISM program had access to users’ data from various ICT companies, such as Facebook, Google, Microsoft, and Apple. According to the whistleblower, the NSA further “impersonated Facebook in an attempt to trick users into downloading malicious code in its attempt to install malware on millions of computers which gives NSA control over users’ computers” (“NSA posed as Facebook,” 2014). The recent attack of the ransomware dubbed Wanna cry had victimisation rates of more than 200.000 computers in more than 150 computers and 10.000 organizations, it affected several hospitals, governmental agencies and private companies (Liptak, 2017). It took Equifax five months to report a hack into their servers that compromised 143.000.000 social security numbers that allowed hackers to pretend to be any of the victims in any given circumstance, such as the request of a new visa card (Lynley, 2017). These are just some examples to show that citizens, businesses and governments are often targeted and impacted by what has been labelled as cybercrime. The booming of Internet technology (IT) creates many opportunities and permeates almost all aspects of our daily life (World Economic Forum, 2015). Today we live in a networked society with cloud computing, online transactions and other new interactions made possible by internet technology (Bendovschi, 2015). Unfortunately, IT also facilitates existing and new threats such as cybercrime (Tsakalidis & Vergidis, 2017). Cybercrime is an umbrella term for different online threats such as malware, scams, hacking and surveillance It can come as no surprise that cybercrime is growing globally (Interpol, 2017) given that estimated internet penetration of 2016 is up to more than 40% globally, for Belgium that is 88,5% (Internet live stats, 2017). This ...