Online Crime
by Wayne A. Thorp, CFA
According to a new study, “The Norton Cybercrime Report: The Human Impact,” about two-thirds of Internet users have been victims of online crime. In the U.S., that number increases to nearly three-quarters of all online users. The U.S. ranked third behind China, Brazil and India (who were tied for second).
The survey highlighted the fact that users’ complacency could be aiding cyber criminals. Among the respondents, nearly 80% felt that cyber criminals would be caught. As a result, less than half of those surveyed that had fallen victim to a cyber crime actually reported it to authorities. Failing to report such crimes, however, allows cyber criminals to avoid detection and to victimize other online users.
Print this article
In this article
Share this article
According to the survey, a little more than half of online attacks take the form of viruses and malware. Unfortunately, many computer users needlessly leave themselves open to possible attack by not using antivirus or firewall software because they think the software is too complicated to install or that it costs too much. Today, however, there are many anti-virus and firewall applications that are available for free and easy to install and set up. On my own home systems, I use ZoneAlarm firewall and Avast anti-virus and, knock on wood, have not been a victim of a cyber crime. And both programs are free.
Henning Trading Models
In this issue, I conclude my three-part series of articles on Grant Henning’s quantitative stock trading models. In the August 2010 Online Exclusive, I began with his technical-momentum model, which focuses on price momentum to identify stocks that are currently under accumulation. The second article, which was the September 2010 Online Exclusive, discussed Henning’s fundamental-value model, which focuses on reasonably priced stocks with projected future earnings growth and positive cash flows.
As the market meanders through its cycle, technical-momentum and fundamental-value approaches fall in and out of favor. The problem is identifying where in the cycle we currently are, so knowing whether we should be focusing on growth and momentum or value is difficult. Oftentimes, we may not know it until it is too late to capitalize on the shift.
The final Henning model is a blend of the first two, creating a “hybrid” technical-fundamental strategy. With this approach, Henning feels he has created a trading system that you can use across the entire market cycle without having to try to time the market.
Online Portfolio Managers
Lastly, for the first time I handled the comparison of online portfolio trackers. You can see my top three picks in the category. Since our last comparison two years ago, some changes have taken place at the top, so be sure to check it out. You will also find an expanded comparison grid of worthwhile online services at the Computerized Investing website.
CI Editor Speaking at Local Chapters
Wayne A. Thorp, CFA, editor of Computerized Investing and senior financial analyst at AAII, will be giving presentations at the following local chapters this fall. Please go to AAII’s Local Chapters web page at www.aaii.com/chapters for more information and to register for these meetings.
Denver Chapter
Topic: “How to Analyze a Stock With AAII and Other Online Investor Tools”
Date: Monday, October 11, 2010, 6:30 p.m.
Location: Clements Community Center, 1580 Yarrow St., Lakewood, Colorado
Sacramento Chapter
Topic: “How to Analyze a Stock”
Date: Thursday, October 7, 2010, 6:30 p.m.
Location: Dante Club, 2330 Fair Oaks Blvd., Sacramento, California
Silicon Valley Chapter
Topic: “All-Day Investing Seminar”
Date: Saturday, October 9, 2010, 8:00 a.m.
Location: Lookout Restaurant at Sunnyvale Muni Golf Course, 605 Macara Ave., Sunnyvale, California
Discussion
No comments have been added yet. Add your thoughts to the discussion!
