Friday, March 1, 2019

Cyber Crime as 21st Century Problem Essay

AbstractSubsequent research has focused in establishing Cybercrime as an activity lone(prenominal) for computer platformmers. However, Cybercrime has recently expanded to appear as a full capital offense since it integrates multiple forms of criminal activities. Per se, Cybercrime has be to be a social, economic, and political form of disturbance, or in another(prenominal) words, a mother of 21st century crimes. The commencing research will effort to prove that Cybercrime should be managed in a more responsive method acting since it encourages the development of other crimes. The research is defragmented into three main sections, firstly, a emphasize establishing the crude nature of Cybercrime. Secondly, the research will provide a little review of forms and the extent of crime. Thirdly, the research will provide the authors opinion on what should be d unitary in relation to Cybercrime.BackgroundHalf a decade ago, when computers were evolving to their current state, little was known of any criminal activity, which could crap been associated with the process. However, with time, Cybercrime grew leading to the introduction of malicious activities that attempts to swindle the information wealth of the user. In recent times, or so countries, even in the developing world argon processing laws, which should mitigate or even extinguish Cybercrime. Cybercrime is one of the most sophisticated crimes since the attacker is remotely located and can lead to losings of information, or even financial wealth.Forms and Crime ExtentThere swallow been different forms of Cybercrime activities. This includes, but not limited, Denial of Service (DOS) attacks, Malware, and computer viruses.The blurb class of Cybercrime activities includes, information warfare, phishing, swindles, subterfuge (Cybercrime, 2012) as well as, cyber-stalking. Computer fraud involves insincere misrepresentations of facts. This could be, fix, destroying and suppressing unauthorized transactions of information. In addition, fixing, or deleting stored data (Lusthaus, 2013). Besides, this could include, altering or misusing existing system tools or software packages by altering writen code for fraudulent purposes. Cybercrime (2012) has also argued the possibility of altering or manipulating electronic images, for instance, pictures, which can be applied as evidence in a court of law. Jewekes (2006, p. 349) assess that, there has been a subsequent debate attempting to un forgoze the validity of offensive content as part of Cybercrime.For the last one decade, the world has been evolving to embrace a rapid social media, with websites such as Facebook, Twitter and LinkedIn registering billions of users. However, attackers and scammers have utilized this opportunity to harm innocent users against puritanical web usage. A common form of offensive content is pornography, alongside, despise speech, racism and blasphemy (Greece, 2014, pp. 45-48). The research cannot overlook the p resence of other Cybercrime colligate offenses such as, cyber terrorism, harassment, drug trafficking, human trafficking, prostitution and threats. The presence of these vices means Cybercrime should be recognized as form of normal crime but only happening on the internet.ConclusionFollowing the increased levels of Cybercrime related incidences, it is needful to enroll combative systems, which will counter Cybercrime. The research has identified several(a) damages related with Cybercrime. Woollacott (2007) seconds the research in arguing that, while it is unpatterned that previous criminal instances in relation to Cybercrime focused entirely on information related malpractices, recently, the presence of the radical activities, for example racism, pornography etc, has turn up the necessity to encourage Cybercrime responsive mechanisms. For that reason, this research proposes the inclusion of more copious mechanisms whereby, software developers, researchers, and legal advisers a ct proactively in mitigating Cybercrime related incidences. As such, the familiarity will be encouraged tothrive in a free and fair environment where Cybercrime is extinct.ReferencesCybercrime. (September, 2012). Understanding Cybercrime Phenomena, challenges and legal response. Cybercrime. Retrieved August 26, 2014, from http//www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf Greene, S. S. (2014). Security program and policies principles and practices (2nd ed.). Indianapolis, Ind. Pearson.Jewkes, Y. (2006). Book Review Cybercrime and Society. Crime, Media, Culture, 2(3), 348- 349.Lusthaus, J. (2013). How organised is organised Cybercrime?. Global Crime, 14(1), 52-60. Woollacott, P. (2007). Cybercrime comes of age. ITNOW, 49(2), 6-7.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.