Page 210 - Encyclopedia of Business and Finance
P. 210

eobf_C  7/5/06  2:57 PM  Page 187


                                                                                                    Cyber Crime


                11. Never take me for granted. I will drop you in a  Wide Web. According to U.S. law, cyber crimes have been
                   heartbeat.                                    committed if someone intentionally accesses a network
                12. My time is as important as my funds … maybe  facility without authorization or intentionally exceeds his
                   more.                                         or her given level of authorization to access that facility. If
                                                                 the crime is committed for commercial advantage, mali-
                13. Help me integrate … link stuff together to increase  cious destruction, private commercial gain, or in further-
                   the efficiency of my life.                    ance of any criminal act, the punishment is a fine and/or
                14. Life is complex: Make service simple. Life is harried:  imprisonment for up to five years for a first offense. For
                   Make service calm. Life can be shallow: Make serv-  any subsequent offense, the punishment is a fine and/or
                   ice have resonance and depth. Life can be painful:  imprisonment for up to ten years.
                   Make service joyful. Life is too fast: Help me keep
                   up. Life can be lonely: Make service a value connec-  TYPES OF CYBER CRIMES
                   tion. (quoted in Zemke, 2002, p. 49)
                                                                 Cyber crimes fall into three categories: (1) when comput-
                SEE ALSO Marketing                               ers or computer systems are the targets of crimes, such as
                                                                 hacking, denial of service, and viruses and Trojan horses;
                                                                 (2) when computers are the medium by which criminal
                BIBLIOGRAPHY
                Albrecht, Karl, and Zemke, Ron (2002). Service America in the  activity is committed, such as phishing, sniffing, spam-
                  new economy (rev. ed.). New York: McGraw-Hill.  ming, and spoofing; and (3) when computers are abused
                                                                 by rogue employees to illegally access organizational net-
                Bell, Chip R. (2000). Customer love: Attracting and keeping cus-
                  tomers for life. Provo, UT: Executive Excellence.  works and steal valuable information. The following is a
                                                                 discussion of these cyber crimes.
                Hoffman, K. Douglass (2006). Marketing principles and best
                  practices (3rd ed.). Mason, OH: Thomson South-Western.
                Lascu, Dana-Nicoleta, and Clow, Kenneth E. (2004). Marketing  Crimes against Computers and Computer Systems.
                  frontiers: Concepts and tools. Cincinnati: Atomic Dog.
                                                                  • Hacking: Breaking into a computer network or Web
                Lovelock, Christopher, and Wirtz, Jochen (2004). Services mar-
                  keting: People, technology, strategy (5th ed.). Upper Saddle  site such as a bank’s intranet by using a software
                                                                    program that can generate multiple login usernames
                  River, NJ: Pearson Prentice Hall.
                                                                    and passwords until a valid combination is found
                Manning, Gerald L., and Reece, Barry L. (2004). Selling today:
                  Creating customer value (9th ed.). Upper Saddle River, NJ:  and access is granted. Once in the system, the
                  Pearson Prentice Hall.                            hacker is able to steal, alter, or delete any files within
                Pride, William M., and Ferrell, O. C. (2006). Marketing concepts  the system.
                  and strategies. Boston: Houghton Mifflin.       • Denial of service: By using a computer to flood a
                Reece, Barry L., and Brandt, Rhonda (2005). Effective human  given Web site with so much useless traffic (e-mail,
                  relations: Personal and organizational applications (9th ed.).  interactions, etc.) the site becomes frozen and stops
                  Boston: Houghton Mifflin.
                                                                    the regular service thus losing business for a period.
                Sewell, Carl, and Brown, Paul B. (2002). Customers for life: How
                                                                  • Viruses, worms, and Trojan horses: Small, malicious
                  to turn that one-time buyer into a lifetime customer (rev. ed.).
                  New York: Doubleday.                              software programs that are sent as attachments to e-
                                                                    mails with the intent of paralyzing the receiving
                Solomon, Michael R., Marshall, Greg W., and Stuart, Elnora W.
                  (2006). Marketing: Real people, real choices (4th ed.). Upper  computer(s). Once an e-mail recipient opens such
                  Saddle River, NJ: Pearson Prentice Hall.          an attachment, the virus, worm, or Trojan horse is
                Zemke, Ron (2002). The customer service revolution. Training,  released, disabling computers and replicating itself
                  39(7), 44–49.                                     by contaminating the whole e-mail system.


                                                                 Crimes Using Computers to Deceive Users.
                                                  Thomas Baird
                                                  Barry L. Reece
                                                                  • Phishing: Cyber criminals send legitimate looking e-
                                                                    mails to customers of banks and credit card compa-
                                                                    nies asking them to update their account
                                                                    information by clicking on a Web link that sends
                CYBER CRIME                                         the customer to an official-looking but actually fake
                Cyber crime refers to criminal conduct occurring in  site. By doing so, the criminals can steal customers’
                cyberspace—computerized, networked environments     account information and thus masquerade as that
                such as those in an office or on the Internet and the World  customer.


                ENCYCLOPEDIA OF BUSINESS AND FINANCE, SECOND EDITION                                       187
   205   206   207   208   209   210   211   212   213   214   215