Tutor Quora

COMM 19997 Research Topics

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

COMM 19997 Research Topics

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

COMM 19997 Research Topics

0 Download4 Pages / 994 Words

Course Code: COMM 19997
University: Sheridan College

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Canada


This assignment is structured to assess the skills and content of the course, and the following learning outcomes:Practice college level reading strategies
Identify the thesis and main ideas in written models
Compose structured paragraphs
Apply conventions of grammar and punctuation to written assignments
Practice editing skills
Develop vocabulary skills
Apply the APA style of documentation to written assignments
Complete a short research assignment
Identify communication strengths and weaknesses

In the contemporary world, explosion of the internet technology has in different ways affected how users communicate and go about their daily lives. The internet enables people and businesses to communicate fast and convenient. However, the internet and computers are being used negatively in a way destructive to the society. Cybercrime has become a threat to the internet users, especially in the mobile technology. Cybercrime is a criminal activity committed by cybercriminals using the internet and computers as tools. These activities include but not limited to illegal file downloads and uploads such as music and videos, and sending spam emails targeted to breach the privacy of the user (Armerding, 2015). For long now, cybercrime has aroused the concerns of the government agencies as well as the users’ sensitivity to the information they share through the internet (Miller & Murphy, 2009). Various methods are used to reduce cybercrimes to the internet users especially business corporations and prominent individuals. For that reason, this paper will focus on the pertinent parts of cybercrime which include reducing identity theft, internet frauds and intrusion of computer networks.
How can the users of the internet and computer networks reduce identity theft? Identity theft is identifying with another person’s information falsely mainly for financial gain. To most internet and computer network users, the solution to this question remains bizarre. This question has been a remedial response by the Internet Service Providers and hosts. But contrary to expectations, to most users, the cyber crime has been hard to crack. Due to modern technology in computing and information, identity theft has become sophisticated with hackers’ ability to hack bank transactions, ATM vending machines, mobile phones and more. Hackers have become interested in anything that is connecting to the internet. The problems arise because the internet and computer users may not be aware of the forms cybercrimes take and the ways they occur. This is regardless of numerous sensitization campaigns aiming at reducing identity theft by the ISP, web servers, and other internet safety campaigners. To reduce cyber identity theft, the users need to be taught the types of cybercrimes and how they can protect themselves. People should also learn about the secure and safe sites where they can learn about cybercrimes, cases for cybercrimes and safety measures when using the internet and computer networks. Such informative sources include the privacy statements of most websites which includes the safety measures of the user, exploring more on the topic of internet security using scholarly literature or contacting the internet service providers and network administrators (Commonwealth of Australia, 2016).
The other one is how to reduce internet fraud. The government agencies and law enforcement for different countries work to reduce internet frauds as well as informing people on how not to fall a victim. Internet fraud is the use of the internet to commit fraud. These include the use of online services to fraudulently solicit, transact, and transfer proceeds of fraud to financial institutions. These crimes are mostly committed using personal computers whiles others use other people’s network. Agencies such as National Internal Security keep track of the internet activities for issues like money laundering, drug trafficking, and other illegal business activities. The agencies also provide guidelines on how to secure personal data and access to assistance in case of theft of personal information and if used in committing internet crimes. Some of the measures that have been put in place to protect internet users and reduce internet frauds are the provision of channels for reporting fraudulent activities and surveillance of the networks to track any suspicious activity (Cohen, 2003).
Finally, internet money transfers have become more popular today for convenience. Cybercrimes are also at the rise with identity theft and fraudulent internet transactions taking the center stage. Hackers are working tirelessly to bypass security levels of any computer as long as they have a reason to break in (Data breach, 2015). This is regardless of numerous security layers developed in software and computer systems to keep off sniffers and break in. Breaking into a computer network exposes the user information and the use of the computer network is compromised. It also exposes sensitive information which can be used by the criminals to conceal identity and be able to carry out the fraudulent transactions. Internet and computer users need to be informed of ways to reduce hacking into their computer systems and networks. Some of the ways to reduce chances of hacking into personal computer and networks are to install updated anti-spy wares and avoid accessing sites which cannot be trusted to avoid virus infection of their computer (Paulson, 2002). This is because data privacy is key when using any computer system or network.
The risk posed by cybercrimes to individuals and businesses have intensified the efforts aiming to reduce their impacts. Majority of internet users today have started taking their internet privacy seriously owing to the levels of transactions being they carry out over the internet. Also, the relevant authorities are taking a key interest in reducing internet frauds which may result to dwindling of the economies. As a result, internet criminals are left with few loopholes to exploit and which are mostly dependent on the users’ privacy measures. Because of this, internet users are advised to be extra careful when navigating through the internet web and also make sure their computers and networks are always secure.
Armerding, T. (2015). Cybercrime: Much more organized. Retrieved from https://www.csoonline.com/article/2938529/cyber-attacks-espionage/cybercrime-much-more-organized.html
Cohen, F. (2003). Internet Fraud. Computer Fraud & Security, 2003(4), 19. doi: 10.1016/s1361-3723(03)04013-2
Commonwealth of Australia. (2016). Identity crime and misuse in Australia 2016 (pp. 1-91). Commonwealth of Australia. Retrieved from https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/Identity-crime-and-misuse-in-Australia-2016.pdf
Data Breach. (2015). Retrieved from https://en.wikipedia.org/wiki/Data_breach
Miller, H., & Murphy, R. (2009). Secure Cyberspace: Answering the Call for Intelligent Action. IT Professional, 11(3), 60-63. doi: 10.1109/mitp.2009.60
Paulson, L. (2002). Stopping intruders outside the gates. Computer, 35(11), 20-22. doi: 10.1109/mc.2002.1046967

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 4 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2020). COMM 19997 Research Topics. Retrieved from https://myassignmenthelp.com/free-samples/comm-19997-research-topics/internet-fraud.html.

“COMM 19997 Research Topics.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/comm-19997-research-topics/internet-fraud.html.

My Assignment Help (2020) COMM 19997 Research Topics [Online]. Available from: https://myassignmenthelp.com/free-samples/comm-19997-research-topics/internet-fraud.html[Accessed 18 December 2021].

My Assignment Help. ‘COMM 19997 Research Topics’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. COMM 19997 Research Topics [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/comm-19997-research-topics/internet-fraud.html.

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Myassignmenthelp.com helps in writing all types of discussions for any essay topics and any subjects. With a group of over 4000+ PhD experts we have most insightful resource for writing any discussion. So the next time you are wondering how to write a discussion essay, get essay help from us. We segregate the topics of discussions into general and specific, link explanation, description, theory and findings to literature in the best possible way, using the best possible narration. Over periods of time our team has mastered the art of writing great essay. So our work gets accolades from teachers and secures grades. Connect with us today if you have any discussion writing woes.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »