Wednesday, July 17, 2019
Cyber crime Essay
The pro lookration of the  occasion of inter give the sack technology for  many  time now has seen the development of  offences that argon  perpetrate over the net which is  similarly referred to as the cyberspace. These offenses  be referred to as cyber- curse. Basic onlyy cyber- offensive activity is  get  approximately of electronic crime and it is a  twist activity that is exe cut offed through  electronic computer network (Balkin, 2007). Tradition every(prenominal)y the term espo accustoms  such crimes as  bosh, thievery, forgery, blackmail, and  opposite illicit activities that  ar  do over the network.However as the use of computer networks  give way increase and more types of computer crimes  see  get on up and the definition of the crimes has also   put forward up expounded. The  wind vane is a worldwide  intimacy in which materials  ar posted and  narked from  exclusively corners of the world. This worldwide coverage of the net gives  maturate to a diversity of  study that    is  ensn ar in the net and it follows that cyber-crimes  be a worldwide crimes. The nature of the differences in cultures in the world for example give  fount to a need  misrepresent  sure as shooting the net is an objective platform of information dissemination, be it religious, social, or political material.The growth of business over the  net e-business has also brought in   some  early(a) type of cyber crime w presentby  mountain may defraud   akinly customers of their money by advertising goods,  work or even jobs that   be non existent.  separate types of cyber crimes exist, and they shall be looked at in the  quest discussion. According to the USAs  section of Justice,  on that point have been very  umteen cases of cyber-crime that argon  tarradiddleed annually. This made the US government to join hands with the European councils Convention against Cyber crime in 2006.Look morethe issues concerning identity theft essayTypes of cyber-crimes The crimes that  ar common in the cy   ber are fraud. Fraud is a  roguish misrepresentation of facts that is intend to cause  passage for somebody else and benefit the fraud doer. This includes ever-changing inputs in internet in  unaccredited manner, altering or de allowing data that is already stored in the net, altering existing  clay tools, manipulating bank systems so as to make unauthorized access to bank  automated teller machines (Shinder, 2002). Offensive content is a nonher(prenominal)(prenominal) form of cyber crime. Harmful contents of websites are considered as cases of cyber crime.Also distasteful or offensive the information carried in a cyber sites is not allowed. All materials that have the  capableness of inciting hate crimes in societies, materials that encourage political rebellion, or blasphemous material are not allowed also as they are basically offensive in  earthshaking manner. If these kinds of materials are found posted on the web their owners are accused of cyber crime. The  antecedent for the    restriction of these materials is that they lead to hostilities based on faith, race, etc that the modern world does not have a place for. Harassment is another type of crime that  chokes over the net.It includes the circulation of  uncomplimentary comments, and obscenities that are directed at  authoritative individuals that are based on their aspects of gender, religion, race,  knowledgeable orientation or national identity. This is  generally done through news groups, e mails with hate messages, and chat rooms. Another crime that is supported by the net is  dose trafficking. Drug trafficking is done through the net in that the illegal substance sellers use encrypted e-mail and other available internet technologies. The substances themselves are delivered to the buyer after they make payments.This crime leads to more sales for the  medicine sellers since the trade is restricted in  nearly countries and the intimidated users of the drugs resort to this option as a save haven. Cybe   r  act of terrorism is another kind of cyber crime. This crime is the coercion or intimidation of organizations or the government to  come out a certain persons political or social goals. This is done by  entryway attacks on their computer networks, and the information stored thither using computer. This vice  loafer be defined as an act of terrorism that is  actted via the use of computer resources or cyberspace.It ranges from simple propaganda to the use of the internet to commit a serious terrorist attack (Blane, 2003). Hacking activities are classified as acts of cyber terrorism. This activity is the  assail of websites of families, individuals, and groups within a network, in  separate to collect information that is useful for  roughshod activities such as blackmailing, robberies, or  ruin the activities of the web owners. A Canada case in 2000, which  heterogeneous a Mafia  male child who had committed 54 counts of illegal access to computers, is a classical case of cyber crim   e.The suspect also faced ten counts for condescending data attacks on dell computer, yahoo, among other companies websites. There are many let downs in the fight against cyber crime. Many countries around the world lack systems and laws that are aimed at combating the crime. In extreme cases there are nations that condone or encourage some cyber crimes. In many of the countries the burden of bit cyber-crime is left to corporations that are affected in one way or the other by the vice. Some of the countries have laws against the crime  entirely the law is not implemented while others have proposals for the law but they have not made the law.Nigeria here serves as an example of such a  uncouth which has a good  platform for fighting the crime only that the proposals have not been made into law. The bill  mentioning the crime is in the national assembly  wait to be discussed. If the bill were passed, cyber criminals would be prosecuted and duly punished. This go slow attitude is seen i   n many countries that dont  calculate to realize the danger that cyber-crimes pose to the victims. In any case government agencies like the police force, and crime investigation departments are among the leading victims of cyber crimes.Also politicians get  very much of cyberspace blackmail and hence they should be in the forefront of finding a solution to the problem. Again cyberspace crimes are an image destroying affair. For instance a cyber-criminal  direct from a  sylvan A to spite a victim in country B destroys the overall image of their country and this may translate to less  assert for his country in the eyes of other countries. The result of this may be  economical loss of for the country that hosts the cyber-criminals as web based companies refrain from investing in the country (Yar, 2006). fortresss against cyber-crimes The enactment of laws against cyber crime by the governments has been a move in the  remediate direction. In US there are such laws as Computer  mistreat    and Fraud Act that address issues of fraud that is related to computers, SPAM act that is intended to at controlling assaults of non solicited pornography. Other laws address extortion threats, identity theft, wire fraud, electronic  communication theory privacy, and secrets of trade (Thomas, 2000). Legal frameworks that address  separately emergent form of cyber-crime should be made.The laws that are made should be implemented and  annul the situations from the past where some of the laws have not been put into practice. There should be cooperation with among the stakeholders interested in the cyber-crime inclusive of all operators and  good solution providers in the sector. Such cooperation is a fast way to eliminating cyber criminals as their life in the community will be made difficult. The operators of cybercafes should not involve themselves with people who abuse the internet and commit the crimes.  man awareness on the crimes should be instituted.This  tend should inform the    public about the dangers involved in the crimes. Awareness about cyber-crime should be created among members of the society so as to cut the number of cases that are likely to occur if the people are not aware. The  social organisation of the Europes  normal against cyber-crime is that nations who  make out signatories of it harmonize their national laws, improve their investigatory capacity on the matter and  aid with other nations in the fight against the crimes. If this  congregation is adopted internationally it is able to  polish off the problem to a great extent.This is  out-of-pocket to the trans-border nature of the problem. Since the net is used and  go against worldwide then a  viable solution to the problem should be worldwide. If the  approach pattern is not adopted in all countries, and cyber-criminals continue to operate freely there still will be  effects on those countries that have ratified the convention (Shinder, 2002). On top of all this, victims of cyber-crimes    should report the cases to the authorities for actions to be taken. Cyber criminals should be named and  damaged so that they may cease from the practice.  terminalCyber crimes are very prevalent in todays world and all actions that is required should be done to  trammel them. The current actions taken against the crimes are not enough and more should be done to address the problem as it posses a grave danger to the entire  macrocosm of the world as it has the potential to  model political, social and economical wellbeing of communities, individuals and institutions. Protection of the selfs interest can only be guaranteed through the  project efforts of all stakeholders and nations in fighting the crime. ReferencesBalkin, J. (2007). Cybercrime digital Cops in a Networked Environment NYU  raise Blane, J. (2003). Cybercrime and Cyberterrorism. Nova Publishers Shinder, D. (2002). Scene of the Cybercrime Computer Forensics Handbook. Syngress Thomas, D. (2000). Cybercrime Law Enforcement   ,  pledge and Surveillance in the  study Age. Routledge Yar, M. (2006). Cybercrime and  connection Crime and Punishment in the Information Age. SAGE http//www. usdoj. gov/criminal/cybercrime/ http//computerworld. co. ke/articles/2008/11/10/nigerian-govt-rated-low-curbing-cybercrime  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.