Sie sind auf Seite 1von 26

COMPUTER APPLICATION FOR

BUSINESS (566)

EFFECT OF CYBER CRIMES ON BUSINESS

Submitted by:

(AH524979)
ACKNOWLEDGEMENTS

First of all I would be thankful to Allah Almighty without whose blessing and mercies I were not
able to complete this project. This project is refined from a splendid efforts of many people who
contributed regardless of any reward. I thank them from the core of our hearts. May Allah give
them success by leaps and bounds.

I can’t forget the guidance’s and knowledge which our kind teachers have provided us. We were
lucky to have such a kind teacher who taught us and with such devotion and zest, which I could
never forget. I thank her from the core of my heart.

In the end we would like to thank to all those people who provided us with useful suggestions,
useful data and facility of composing.
ABSTRACT

Topic assigned is Effects of Cyber Crimes on Business. The business that I chose for my
research paper is Facebook. Cybercrimes are though common but most of the companies in
Islamabad do not keep record of the relevant data, therefore, I had to choose facebook, since
facebook is a live example of cyber crimes, and almost each one of us is a victim to it.

Cyber crime and computer crime have become a terms that we hear in the news with some
frequency. To protect yourself from cyber crime, you must first understand what it is and how it
can work against you. With the increasing popularity of shopping websites, online banking and
other sites that require sensitive personal and financial data, cyber crime has become an ever-
present threat. Cyber crime (also known as computer crime, e-crime and electronic crime) is
defined as a criminal act where a computer or computer network serves as the location, means,
and target or as the source of the activity. Cyber crime can be hard to detect and even harder to
stop once it has happened. It can possibly have long-term negative impacts on victims.
TABLE OF CONTENTS
Introduction to the Topic .............................................................................................................................. 1
1.1 Cyber Crimes ................................................................................................................................. 1
1.1.1 Significance ........................................................................................................................... 1
1.1.2 Types of Cyber Crimes........................................................................................................... 1
1.2 Effects of Cyber Crimes ................................................................................................................. 2
1.2.1 Loss of Revenue .................................................................................................................... 3
1.2.2 Wasted Time ......................................................................................................................... 3
1.2.3 Damaged Reputations........................................................................................................... 3
1.2.4 Reduced Productivity ............................................................................................................ 3
1.2.5 The Global Economy ............................................................................................................. 4
1.2.6 World-Wide Losses ............................................................................................................... 4
1.2.7 Effects on Company Stock..................................................................................................... 4
1.3 Considerations .............................................................................................................................. 4
1.4 Prevention ..................................................................................................................................... 5
1.5 Warnings ....................................................................................................................................... 5
1.6 Cyber Crimes in Pakistan............................................................................................................... 5
1.6.1 National Response Center for Cyber Crimes (NR3C) ............................................................ 6
1.6.2 Types of crimes in Pakistan ................................................................................................... 6
Practical Study............................................................................................................................................. 10
1.7 Introduction to Facebook ........................................................................................................... 10
1.8 Cyber crimes on Facebook .......................................................................................................... 11
1.9 Effects of Cyber Crimes on Facebook ......................................................................................... 12
1.9.1 FB in bad books ................................................................................................................... 12
1.9.2 Identity theft ....................................................................................................................... 12
1.9.3 Defamation ......................................................................................................................... 12
1.9.4 Anorexia and bulimia .......................................................................................................... 13
1.9.5 Advertiser concerns ............................................................................................................ 13
1.9.6 Holocaust denial.................................................................................................................. 13
1.9.7 Cyberbullying, stalking and murder .................................................................................... 13
1.9.8 Religious and political censorship documented ................................................................. 14
1.9.9 Loss of business due to religious controversy .................................................................... 14
1.10 How to be secure? ...................................................................................................................... 14
Data Collection Methods ............................................................................................................................ 16
SWOT Analysis............................................................................................................................................. 17
1.11 Weaknesses ................................................................................................................................ 17
1.12 Opportunities .............................................................................................................................. 18
1.13 Threats ........................................................................................................................................ 18
Conclusion ................................................................................................................................................... 19
Recommendations ...................................................................................................................................... 20
References .................................................................................................................................................. 21
Assignment II- Computer Application for Business (566)

INTRODUCTION TO THE TOPIC


1.1 CYBER CRIMES

Cyber crime and computer crime have become a terms that we hear in the news with some
frequency. To protect yourself from cyber crime, you must first understand what it is and how it
can work against you. With the increasing popularity of shopping websites, online banking and
other sites that require sensitive personal and financial data, cyber crime has become an ever-
present threat. Cyber crime (also known as computer crime, e-crime and electronic crime) is
defined as a criminal act where a computer or computer network serves as the location, means,
and target or as the source of the activity.

1.1.1 SIGNIFICANCE

Cyber crime can be hard to detect and even harder to stop once it has happened. It can possibly
have long-term negative impacts on victims.i

1.1.2 TYPES OF CYBER CRIMES

Cyber crime--also known as computer crime, e-crime and electronic crime-- is defined as a
criminal act where a computer or computer network serves as the location, means, target or as
the source of the activity. Types range from outside parties who hack into a computer network to
phishing programs which give users a false sense of security, prompting them to divulge
sensitive information. Cyber crimes include fraud, identity theft, spam, phishing scams, data
theft and more. Victims can be individuals as well as small and large businesses. According to
the Constitution of Pakistan, there is punishment to almost all types of cyber crimes.

 Criminal access
 Criminal data access
 Data damage.
 System damage
 Electronic fraud

1|Page
Assignment II- Computer Application for Business (566)

 Electronic forgery
 Misuse of electronic system or electronic device
 Unauthorized access to code
 Misuse of encryption
 Sending Malicious code
 Cyber stalking
 Spamming
 Spoofing
 Unauthorized interception
 Cyber terrorism

1.2 EFFECTS OF CYBER CRIMES

The effects of cyber crime often last longer than the planning and execution of the crime. In
identity theft cases, it can take years for a victim to clear her name. Corporations that have been
victims of data theft can possibly lose thousands of dollars in revenue.

Cyber crime affects more than the financial integrity of a business. There are many very real and
damaging consequences associated with Internet crime. Understanding the effects of cyber crime
is an important first step in comprehending the necessity of security measures on a computer
network. Cyber crime can be hard to detect and even harder to stop once it has happened. It can
possibly have long-term negative impacts on victims.

Cyber crime affects the global economy with losses in the billions of dollars annually. Cyber
crime is the fastest growing crime in the world with millions of people affected every day. The
effects of one successful attack on a corporation can have far-reaching implications, including
financial losses at the corporate level, to stock losses and money lost for consumers or stock
holders. Laws have been swiftly put into place to halt these types of attacks, but criminals find
haven in countries with lax cyber crime laws.

2|Page
Assignment II- Computer Application for Business (566)

1.2.1 LOSS OF REVENUE

One of the main effects of cyber crime on a company is a loss of revenue. This loss can be
caused by an outside party who obtains sensitive financial information, using it to withdraw
funds from an organization. It can also occur when a business's e-commerce site becomes
compromised--while inoperable, valuable income is lost when consumers are unable to use the
site.

1.2.2 WASTED TIME

Another major effect or consequence of cyber crime is the time that is wasted when IT personnel
must devote great portions of their day handling such incidences. Rather than working on
productive measures for an organization, many IT staff members spend a large percentage of
their time handling security breaches and other problems associated with cyber crime.

1.2.3 DAMAGED REPUTATIONS

In cases where customer records are compromised by a security breach associated with cyber
crime, a company's reputation can take a major hit. Customers whose credit cards or other
financial data become intercepted by hackers or other infiltrators lose confidence in an
organization and often begin taking their business elsewhere.

1.2.4 REDUCED PRODUCTIVITY

Due to the measures that many companies must implement to counteract cyber crime, there is
often a negative effect on employees' productivity. This is because, due to security measures,
employees must enter more passwords and perform other time-consuming acts in order to do
their jobs. Every second wasted performing these tasks are a second not spent working in a
productive manner.

3|Page
Assignment II- Computer Application for Business (566)

1.2.5 THE GLOBAL ECONOMY

Cyber crime is a worldwide problem that's costing countries billions of dollars. According to
crime-research.org, as early as 2003 the United States was already leading the world in
percentage of cyber attacks at 35.4 percent, followed by South Korea at 12.8 percent. Countries
with high rates of computer piracy, such as Russia, have reacted slowly to cyber crime. As a
result, many hackers and other cyber criminals can flourish in countries with few Internet crime
laws while attacking richer countries through their computer.ii

1.2.6 WORLD-WIDE LOSSES

According to the Congressional Research Service, several computer security consulting firms
estimate global financial losses from viruses, worm attacks and other hostile computer-based
attacks to be between $13 and $226 billion. Insurance companies now sell cyber-crime insurance
and other identity-theft protection for consumers as well as corporations in an effort to raise
confidence and effectively manage the damage caused by cyber criminals. ii

1.2.7 EFFECTS ON COMPANY STOCK

According to the U.S. Government Accountability Office, the estimated loss for domestic
companies affected by cyber crime is $67.2 billion annually. The targeted firms also suffer in the
stock market days after an attack with shareholder losses of 1 percent to 5 percent. Percentages
like these might seem small, but for the average company on the New York Stock Exchange, it
can translate to $50 to $200 million in shareholder losses. This is where company losses begin to
affect the consumer, causing a bleed-through effect to all levels of the economy. ii

1.3 CONSIDERATIONS

The probability of falling victim to cyber crime of any type can correlate directly with how much
of your personal information is used online.

4|Page
Assignment II- Computer Application for Business (566)

1.4 PREVENTION

Any time information is entered online, be sure of the safety and security measures taken by the
website. Never respond to unsolicited emails requesting personal information, regardless of the
alleged source. Before entering any sensitive information, check the URL of the website to
ensure you are at the correct location.

1.5 WARNINGS

Be careful when browsing the Internet, and run virus scans often to prevent infection by viruses
or malware. Keep in mind that email addresses can be faked, just as websites can be faked.
Always ensure you are located at the correct web address before submitting any sensitive
personal data.

1.6 CYBER CRIMES IN PAKISTAN

A Pakistani security agency has launched a special wing to combat cyber crimes in part because
the country had to rely on U.S. investigators to trace e-mails sent by the kidnappers of American
journalist Daniel Pearl a year ago.

"The purpose of establishing the National Response Center for Cyber Crimes is to stop misuse of
the Internet and trace those involved in cyber-related crimes," Iftikhar Ahmad, spokesman for
Pakistan's Interior Ministry (2002), told the Associated Press. "The importance of this special
wing was felt when Daniel Pearl was kidnapped, and his captors started sending e-mails to
newspapers," he said. The Wall Street Journal correspondent disappeared on Jan. 23, 2002, from
Pakistan's southern city of Karachi. On Jan. 27, 2002, the Journal and other media received an e-
mail from a group calling itself the National Movement for the Restoration of Pakistani
Sovereignty. The e-mail contained a photo of Pearl, 38, with a gun to his head. The FBI traced
the e-mails, and police captured those who allegedly sent them to the newspapers, but, on Feb.
21, 2002, the U.S. Embassy received a videotape showing Pearl was dead. "The National
Response Center for Cyber Crimes will play a key role in the days to come in tracing those
terrorists who often use the Internet or prepaid telephone cards to communicate messages to their

5|Page
Assignment II- Computer Application for Business (566)

associates for carrying out acts of terrorism and other purposes". The special wing has been
established at the headquarters of an intelligence agency in Islamabad, Pakistan's capital.

1.6.1 NATIONAL RESPONSE CENTER FOR CYBER CRIMES (NR3C)

NR3C is providing single point of contact for all local and foreign organization for all matters
related to cyber crimes. It is imparting trainings and related security education to persons of
government/semi-government and private sector organizations. It has also conducted a number
of seminars in different cities of the country to educate sensitive government organizations
regarding cyber attacks on their information resources, information breech and to make their
systems secure against all such threats. NR3C is helping to improve the skill level of FIA officer
and official to interrogate such kind of hi-tech and sophisticated crimes, through training,
seminars and workshops.

1.6.2 TYPES OF CRIMES IN PAKISTAN

The following types of Cyber Crimes are committed in Pakistan, accordint to the Pakistan FIA
report.iii

 Financial Crimes
 Email Treating
 Denial of Service attack and DDOS attack.
 Virus / Worm attacks.
 Internet time thefts.
 Unauthorized to access the system
 Credit Cards Frauds
 Anti Pakistan/Islam material on websites
 ATM Frauds
 Mobile communication
 Theft of Systems
 Web SMS
 Pornography

6|Page
Assignment II- Computer Application for Business (566)

 Interpol Cases

Types of cyber crimes and their punishments according to the constitution of Pakistan are as
followsiv:

1.6.2.1 CRIMINAL ACCESS

Whoever intentionally gains unauthorized access to the whole or any part of an electronic system
or electronic device with or without infringing security measures shall be punished with
imprisonment of either description for a term which may extend to two years, or with fine not
exceeding three hundred thousand rupees, or with both.

1.6.2.2 CRIMINAL DATA ACCESS

Whoever intentionally causes any electronic system or electronic device to perform any function
for the purpose of gaining unauthorized access to any data held in any electronic system or
electronic device or on obtaining such unauthorized access shall be punished with imprisonment
of either description for a term which may extend to three years, or with fine or with both.

1.6.2.3 DATA DAMAGE.

Whoever with intent to illegal gain or cause harm to the public or any person damages any data
shall be punished with imprisonment of either description for a term which may extend to three
years, or with fine, or with both.

1.6.2.4 SYSTEM DAMAGE

Whoever with intent to cause damage to the public or any person interferes or obstructs the
functioning, reliability or usefulness of an electronic system or electronic device by inputting,
transmitting, damaging, deleting, altering, tempering, deteriorating or suppressing any data or
services or halting electronic system or choking the networks shall be punished with
imprisonment of either description for a term which may extend to three years, or with fine, or
with both.

7|Page
Assignment II- Computer Application for Business (566)

1.6.2.5 ELECTRONIC FRAUD

Whoever for wrongful gain interferes with or uses any data, electronic system or electronic
device or induces any person to enter into a relationship or with intent to deceive any person,
which act or omission is likely to cause damage or harm to that person or any other person shall
be punished with imprisonment of either description for a term which may extend to seven years,
or with fine, or with both.

1.6.2.6 ELECTRONIC FORGERY

Whoever for wrongful gain interferes with data, electronic system or electronic device, with
intent to cause damage or injury to the public or to any person, or to make any illegal claim or
title or to cause any person to part with property or to enter into any express or implied contract,
or with intent to commit fraud by any input, alteration, deletion, or suppression of data, resulting
in unauthentic data with the intent that it be considered or acted upon for legal purposes as if it
were authentic, regardless of the fact that the data is directly readable and intelligible or not shall
be punished with imprisonment of either description for a term which may, extend to seven
years, or with fine or with both.

1.6.2.7 MISUSE OF ELECTRONIC SYSTEM OR ELECTRONIC DEVICE

Whoever produces, possesses, sells, procures, transports, imports, distributes or otherwise makes
available an electronic system or electronic device, including a computer program, designed or
adapted primarily for the purpose of committing any of the offences established under this
Ordinance or a password, access code nor similar data by which the whole or any part of an
electronic system or electronic device is capable of being accessed or its functionality
compromised or reverse engineered, with the intent that it be used for the purpose of committing
any of the offences established under this Ordinance, is said to commit offence of misuse of
electronic system or electronic devices: Provided that the provisions of this section shall not
apply to the authorized testing or protection of an electronic system for any lawful purpose. (2)
Whoever commits the offence described in sub-section (l) shall be punishable with imprisonment
of either description for a term which may extend to three years, or with fine. or with both.

8|Page
Assignment II- Computer Application for Business (566)

1.6.2.8 UNAUTHORIZED ACCESS TO CODE

Whoever discloses or obtains any password, access as to code, system design or any other means
of gaining access to any electronic system or data -with intent to obtain wrongful gain, do
reverse engineering or cause wrongful loss to any person or for any other unlawful purpose shall
be punished with imprisonment of either description for a term which may extend to three years,
or with, or with both.

1.6.2.9 MISUSE OF ENCRYPTION

However for the purpose of commission of an offence or concealment of incriminating evidence


knowingly and willfully encrypts any incriminating communication or data contained in
electronic system relating to that crime or incriminating evidence, commits the offence of misuse
of encryption shall be punished with imprisonment of either description for a term which may
extend to five years, or with fine, or with both.

1.6.2.10 OTHER TYPES

 Sending Malicious code


 Cyber stalking
 Spamming
 Spoofing
 Unauthorized interception
 Cyber terrorism
 Enhanced punishment for offences involving sensitive electronic systems
 Of abets, aids or attempts to commits offence
 Other offences.-Whoever commits any offence, other than those expressly provided
under this Ordinance, with the help of computer, electronic system, electronic device or
any other electronic means shall be punished, in addition to the punishment provided f or
that offence, with imprisonment of either description for a term which may extend to two
years, or with fine not exceeding two hundred thousand rupees or with both.

9|Page
Assignment II- Computer Application for Business (566)

PRACTICAL STUDY
The business that I chose for my research paper is facebook. Cybercrimes are though common
but most of the companies in Islamabad do not keep record of the relevant data, therefore, I had
to choose facebook, since facebook is a live example of cyber crimes, and almost each one of us
is a victim to it.

1.7 INTRODUCTION TO FACEBOOK

Facebook is a social networking service and website launched in February 2004, operated and
privately owned by Facebook, Inc. As of January 2011, Facebook has more than 600 million
active users. Users may create a personal profile, add other users as friends, and exchange
messages, including automatic notifications when they update their profile. Additionally, users
may join common interest user groups, organized by workplace, school or college, or other
characteristics. The name of the service stems from the colloquial name for the book given to
students at the start of the academic year by university administrations in the United States to
help students get to know each other better. Facebook allows anyone who declares themselves to
be at least 13 years old to become a registered user of the website.v

Facebook was founded by Mark Zuckerberg with his college roommates and fellow computer
science students Eduardo Saverin, Dustin Moskovitz and Chris Hughes. The website's
membership was initially limited by the founders to Harvard students, but was expanded to other

10 | P a g e
Assignment II- Computer Application for Business (566)

colleges in the Boston area, the Ivy League, and Stanford University. It gradually added support
for students at various other universities before opening to high school students, and, finally, to
anyone aged 13 and over.

A January 2009 Compete.com study ranked Facebook as the most used social networking service
by worldwide monthly active users, followed by MySpace. Entertainment Weekly included the
site on its end-of-the-decade "best-of" list, saying, "How on earth did we stalk our exes,
remember our co-workers' birthdays, bug our friends, and play a rousing game of Scrabulous
before Facebook?" Quantcast estimates Facebook has 135.1 million monthly unique U.S. visitors
in October 2010. According to Social Media Today, in April 2010 an estimated 41.6% of the
U.S. population had a Facebook account.

1.8 CYBER CRIMES ON FACEBOOK

Cyber crime on Facebook involves a variety of offenses such as cyber-bullying and stalking; first
and foremost among the dangers of using this premier social networking site is phishing.vi

Quite possibly the most well known cyber crime on Facebook involves the scam that has the
thief send messages to a Facebook user’s friends, alleging that the person got stranded and needs
urgent transfers of emergency cash to return home.

This scam works especially well if the Facebook user in question is a gamer and has a large
network of ‘friends’ who only known him in passing.

Not surprisingly, out of the average gamer’s network -- exceeding 1,000 to 2,000 ‘friends’ --
there are always some that are more than willing to part with a couple of dollars to help their
gaming buddy. Needless to say, the Facebook user never actually sees any of the money and is
usually mortified to find out that he was the subject of an online hoax.

Other Facebook cyber crimes involve the impersonation of a celebrity, the threat of malware –
the recent Koobface virus warnings come to mind – and also phishing scams that seek to ferret
out users’ private info.

11 | P a g e
Assignment II- Computer Application for Business (566)

Violating the rules and regulations of facebook, and yet surviving, insulting or violating human
rights and surviving is also a cyber crime, that is often seen on several pages of facebook, where
people make pages to disrespect a group or community of people.

Adult advertisements, spam, illegal chats are also seen common on facebook, after evry alternate
month. Information theft is also commonly found when accessing unknown games/pages on
facebook.

1.9 EFFECTS OF CYBER CRIMES ON FACEBOOK

There have been several effects and criticisms on Facebook because of several cyber crimes.

1.9.1 FB IN BAD BOOKS

Symantec's annual threat analysis warns that the technologies are increasingly being used to
spread malicious code. Users of Facebook, Twitter and Google's mobile operating system,
Android, are said to be particularly vulnerable.vii

1.9.2 IDENTITY THEFT

One can easily create an account and impersonate another person, often for malicious or
mischievous reasons and to harass others. This criticism is not unique to Facebook, since any site
using user accounts has the potential for users to create false accounts.

1.9.3 DEFAMATION

On July 24, 2008, the High Court in London ordered British freelance cameraman Grant Raphael
to pay £22,000 (then about US$43,700) for breach of privacy and libel. Raphael had posted a
fake Facebook page purporting to be that of a former schoolfriend and business colleague,
Mathew Firsht, with whom Raphael had fallen out in 2000. The fake page claimed that Firsht
was homosexual and untrustworthy. The case is believed to be the first successful invasion of
privacy and defamation verdict against someone over an entry on a social networking site.

12 | P a g e
Assignment II- Computer Application for Business (566)

1.9.4 ANOREXIA AND BULIMIA

Facebook has received criticism from users and from people outside the Facebook community
about hosting pro-anorexia and pro-bulimia information.[110] British eating disorder charity B-
EAT called on all social networking sites to curb "pro-ana" (anorexia) and "pro-mia" (bulimia)
pages and groups, naming MySpace and Facebook specifically.

1.9.5 ADVERTISER CONCERNS

On August 3, 2007, British companies including First Direct, Vodafone, Virgin Media, The
Automobile Association, Halifax and the Prudential removed their advertisements from
Facebook. A Virgin Media spokeswoman said "We want to advertise on social networks but we
have to protect our brand". The companies found that their services were being advertised on
pages of the British National Party, a far-right political party in the UK. New Media Age
magazine was first to alert the companies that their ads were coming up on BNP's Facebook
page. The Automobile Association also pulled its advertising from YouTube when a BBC
documentary showed that videos of school children fighting were available on that site.

1.9.6 HOLOCAUST DENIAL

In 2009, Facebook received criticism for including Holocaust denial groups.[113] Barry Schnitt,
a spokesman for Facebook, said, "We want Facebook to be a place where ideas, even
controversial ideas, can be discussed." While Facebook's terms of use include the warning that
users may "be banned if they post 'any content that we deem to be harmful, threatening,
unlawful, defamatory, infringing, abusive, inflammatory, harassing, vulgar, obscene, fraudulent,
invasive of privacy or publicity rights, hateful, or racially, ethnically or otherwise
objectionable,'" Schnitt said, "We can't guarantee that there isn't any content that violates our
policies."

1.9.7 CYBERBULLYING, STALKING AND MURDER

Many critics, including Archbishop of Westminster Vincent Nichols, have criticized Facebook as
a possible tool for cyberbullying, with the possibilities of anonymous profiles and the creation of

13 | P a g e
Assignment II- Computer Application for Business (566)

groups allowing bullies to target individuals online. In 2009, an Oceanside teenager sued
Facebook, as well as four of her former classmates for $3 million after the individuals created a
password-protected Facebook group that was allegedly "calculated to hold the plaintiff up to
public hatred, ridicule and disgrace". A Facebook spokesperson stated "we see no merit to this
suit and we will fight it vigorously." On August 21, 2009, Keeley Houghton, 18, of Malvern,
Worcestershire, was sentenced to three months in a young offenders' institution after being found
guilty of bullying one of her classmates on Facebook, making her the first person in Britain to be
jailed for bullying on a social networking site.

Facebook's privacy settings, combined with the sheer volume of personal information individuals
put on their profiles, have also led to claims that Facebook could encourage cyberstalking.

1.9.8 RELIGIOUS AND POLITICAL CENSORSHIP DOCUMENTED

New site about Facebook censorship http://www.facebookcensorship.com Various new insidious


Facebook censorship events documented. Facebook is even censoring Bible verses from wall
comments.

1.9.9 LOSS OF BUSINESS DUE TO RELIGIOUS CONTROVERSY

Facebook has been met with controversies. It has been blocked intermittently in several countries
including the People's Republic of China, Vietnam, Iran, Uzbekistan, Pakistan, Syria, and
Bangladesh on different bases. For example, it was banned in many countries of the world on the
basis of allowed content judged as anti-Islamic and containing religious discrimination. It has
also been banned at many workplaces to prevent employees wasting their time on the site.

1.10 HOW TO BE SECURE?

The ever-changing face of the social networking site’s privacy settings adds confusion to the
process and makes cyber crime easier than ever to perpetrate. As a general rule of thumb, follow
the three rules of Facebook safety:

14 | P a g e
Assignment II- Computer Application for Business (566)

 Protect your personal profile from data miners. Hide your birth date, address, phone
number, email address and maiden name. This is especially crucial for gamers who friend
large numbers of people for the sake of online play. Since it is impossible to know all of
these individuals, assume that one of them might also be in business of finding out as
much about other online gamers as he can; hide all the information from everyone and
only divulge it on a need-to-know basis.
 Beware the status update temptation. It is tempting to broadcast to the world that you are
on your way to sunny Southern California or will be taking that long-deserved weekend
away with your honey; of course, this also signals to the crooks the one place where you
are unlikely to be during that time: at home. If your profile still displays your address, the
crooks now know where they may go and burgle with impunity.
 Status update phishing posts urge Facebook users to provide specific information. It is
interesting to note that some viral movements seem to sweep Facebook every so often. In
a recent example, they urged the (female) site users to post their bra colors in an effort to
call awareness to breast cancer. Nobody really knew how the movement started.
Although largely in good fun, other cyber crime cases show that these posting requests
are far more insidious. Take for example the latest request for everyone to just put their
year of birth into the status. Since many FB users do not display their full birth date but
only a day and month, this information completes the data required for successful
phishing operations. Other requests include posting a mother’s maiden name (a typical
password suggestion for bank accounts) or the name of a favorite teacher (another
password hint).

15 | P a g e
Assignment II- Computer Application for Business (566)

DATA COLLECTION METHODS

Facebook is a social networking website. And there is no such headquarter of it in Pakistan,


therefore I used the data from the internet. I made decisions on the basis of primary data
available on the internet. Links are provided, wherever the data is pasted.

16 | P a g e
Assignment II- Computer Application for Business (566)

SWOT ANALYSIS
Strengths

 Rapid growth in US and international


 One of the top leading social networking sites
 One of the fastest evolving and adopted websites
 Attracts top talent from Google
 Easy use, user friendly
 Customer loyalty
 Strong financial position
 Leader in market share for industry
 Translated in over 70 languages
 Millions of users
 Acts as a virtual reality
 Fun element
 Businesses can connect to consumers
 Advertising
 Businesses can create profiles and pages for free
 Number 1 app on all cell phones
 Connect with old friends
 Easy-to-use features
 A way to follow friends, celebrities, companies

1.11 WEAKNESSES

 Security/Privacy
 Complex interface
 Becoming corporate
 Over use of advertising
 Constant change to page design

17 | P a g e
Assignment II- Computer Application for Business (566)

 Confusing for Businesses to use (properly market, advertrise, etc.)


 Liabilities regarding bugs and problems that users face when operating the website
 Don't get real answers to your problems, have to figure out problems based on FAQs
 Lack of ability to customize page
 Flash animation banners are distracting and need to be positioned differently so it won't
get in the way of the user
 Too many irrelevant and useless applications
 Facebook chat has too many glitches in its system

1.12 OPPORTUNITIES

 Become a default address book


 Creates business partners
 Advertising impact will be an opportunistic approach in reaching target markets globally
 Way of showing consumer behavior for businesses
 A way of drawing people into stores by offering promotions etc. to them via the facebook
page
 Businesses can collect user data through polls and surveys
 Communication that is free
 Buy/sell via Facebook marketplace
 Innovation
 Facebook Email
 Facebook Video chat

1.13 THREATS

 Other social media networks (twitter, etc.)


 Social networks come and go (ex=myspace, friendster)
 New entrants into the industry
 Privacy settings- leak millions of photos a year
 Spamming
 Users get bored easily when using applications and programs(one time usage)

18 | P a g e
Assignment II- Computer Application for Business (566)

CONCLUSION

As the information industry is expanding vigorously, the ways of committing cyber crimes are
also increasing. The only way to avoid this is to be on the safe side, by installing antivirus and
anti-malwares, and avoiding opening unknown/porn websites. Several registered anti-virus
programs gives warning when some outsource object is about to enter your computer or is about
to take information from your computer. In case of any cyber crime in Pakistan, the suspect
should complain to the NR3C immediately, so that action could be taken.

19 | P a g e
Assignment II- Computer Application for Business (566)

RECOMMENDATIONS
 Avoid opening unknown, blocked or porn websites, emails and advertisements
 Protect your personal profile from data miners. Hide your birth date, address, phone
number, email address and maiden name. This is especially crucial for gamers who friend
large numbers of people for the sake of online play. Since it is impossible to know all of
these individuals, assume that one of them might also be in business of finding out as
much about other online gamers as he can; hide all the information from everyone and
only divulge it on a need-to-know basis.
 Beware the status update temptation. It is tempting to broadcast to the world that you are
on your way to sunny Southern California or will be taking that long-deserved weekend
away with your honey; of course, this also signals to the crooks the one place where you
are unlikely to be during that time: at home. If your profile still displays your address, the
crooks now know where they may go and burgle with impunity.
 Status update phishing posts urge Facebook users to provide specific information. It is
interesting to note that some viral movements seem to sweep Facebook every so often.
Take for example the latest request for everyone to just put their year of birth into the
status. Since many FB users do not display their full birth date but only a day and month,
this information completes the data required for successful phishing operations. Other
requests include posting a mother’s maiden name (a typical password suggestion for bank
accounts) or the name of a favorite teacher (another password hint).

20 | P a g e
Assignment II- Computer Application for Business (566)

REFERENCES

i
- http://www.ehow.com/facts_5005904_what-cyber-crime.html
ii
- http://www.ehow.com/list_6299041_impacts-computer-cyber-crime.html
iii
- www.fia.gov.pk
iv
- http://www.nr3c.gov.pk/ecr_laws_pakistan.html
v
- http://en.wikipedia.org/wiki/Facebook
vi
- http://www.brighthub.com/internet/security-privacy/articles/70040.aspx
vii
- http://www.bbc.co.uk/news/technology-12967254

21 | P a g e

Das könnte Ihnen auch gefallen