Tuesday, May 21, 2019

Cyber Crime as 21st Century Problem Essay

AbstractSubsequent enquiry has focused in establishing Cybercrime as an activity only for computer programmers. However, Cybercrime has recently grow to appear as a full capital offense since it integrates multiple forms of criminal activities. Per se, Cybercrime has proved to be a social, economic, and political form of disturbance, or in other words, a mother of 21st century crimes. The commencing explore will endeavor to prove that Cybercrime should be managed in a more responsive method acting since it encourages the development of other crimes. The research is defragmented into three main sections, firstly, a background establishing the crude nature of Cybercrime. Secondly, the research will provide a critical polish up of forms and the extent of crime. Thirdly, the research will provide the authors opinion on what should be done in relation to Cybercrime.BackgroundHalf a decade ago, when computers were evolving to their occurrent state, little was known of any criminal acti vity, which could substantiate been associated with the process. However, with time, Cybercrime grew leading to the introduction of malicious activities that attempts to swindle the information wealth of the user. In recent times, most countries, regular in the developing world are processing laws, which should mitigate or even extinguish Cybercrime. Cybercrime is one of the most sophisticated crimes since the attacker is remotely rigid and can lead to losses of information, or even financial wealth.Forms and Crime ExtentThere have been different forms of Cybercrime activities. This includes, but not limited, Denial of suffice (DOS) attacks, Malware, and computer viruses.The second class of Cybercrime activities includes, information warfare, phishing, swindles, fraud (Cybercrime, 2012) as well as, cyber-stalking. Computer fraud involves insincere misrepresentations of facts. This could be, altering, destroying and suppressing unauthorized transactions of information. In additio n, altering, or deleting stored info (Lusthaus, 2013). Besides, this could include, altering or misusing existing system tools or software packages by altering writen code for fraudulent purposes. Cybercrime (2012) has also argued the possibility of altering or manipulating electronic images, for instance, pictures, which can be applied as evidence in a court of law. Jewekes (2006, p. 349) assess that, there has been a subsequent debate attempting to justify the rigour of offensive content as part of Cybercrime.For the last one decade, the world has been evolving to embrace a rapid social media, with websites such as Facebook, Twitter and LinkedIn registering billions of users. However, attackers and scammers have utilized this opportunity to harm innocent users against proper web usage. A common form of offensive content is pornography, alongside, hate speech, racism and blasphemy (Greece, 2014, pp. 45-48). The research cannot overlook the presence of other Cybercrime related off enses such as, cyber terrorism, harassment, drug trafficking, human trafficking, prostitution and threats. The presence of these vices means Cybercrime should be recognized as form of design crime but only happening on the internet.ConclusionFollowing the increased levels of Cybercrime related incidences, it is necessary to enroll combative systems, which will counter Cybercrime. The research has identified various damages related with Cybercrime. Woollacott (2007) seconds the research in arguing that, while it is evident that previous criminal instances in relation to Cybercrime focused but on information related malpractices, recently, the presence of the radical activities, for example racism, pornography etc, has proved the necessity to encourage Cybercrime responsive mechanisms. For that reason, this research proposes the inclusion of more cast-iron mechanisms whereby, software developers, researchers, and legal advisers act proactively in mitigating Cybercrime related incid ences. As such, the society will be encouraged tothrive in a free and reliable environment where Cybercrime is extinct.ReferencesCybercrime. (September, 2012). Understanding Cybercrime Phenomena, challenges and legal response. Cybercrime. Retrieved August 26, 2014, from http//www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf Greene, S. S. (2014). Security program and policies principles and practices (2nd ed.). Indianapolis, Ind. Pearson.Jewkes, Y. (2006). Book Review Cybercrime and Society. Crime, Media, Culture, 2(3), 348- 349.Lusthaus, J. (2013). How organised is organised Cybercrime?. Global Crime, 14(1), 52-60. Woollacott, P. (2007). Cybercrime comes of age. ITNOW, 49(2), 6-7.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.