Wednesday, July 17, 2019

Cyber crime Essay

The pro lookration of the occasion of inter give the sack technology for many time now has seen the development of offences that argon perpetrate over the net which is similarly referred to as the cyberspace. These offenses be referred to as cyber- curse. Basic onlyy cyber- offensive activity is get approximately of electronic crime and it is a twist activity that is exe cut offed through electronic computer network (Balkin, 2007). Tradition every(prenominal)y the term espo accustoms such crimes as bosh, thievery, forgery, blackmail, and opposite illicit activities that ar do over the network.However as the use of computer networks give way increase and more types of computer crimes see get on up and the definition of the crimes has also put forward up expounded. The wind vane is a worldwide intimacy in which materials ar posted and narked from exclusively corners of the world. This worldwide coverage of the net gives maturate to a diversity of study that is ensn ar in the net and it follows that cyber-crimes be a worldwide crimes. The nature of the differences in cultures in the world for example give fount to a need misrepresent sure as shooting the net is an objective platform of information dissemination, be it religious, social, or political material.The growth of business over the net e-business has also brought in some early(a) type of cyber crime w presentby mountain may defraud akinly customers of their money by advertising goods, work or even jobs that be non existent. separate types of cyber crimes exist, and they shall be looked at in the quest discussion. According to the USAs section of Justice, on that point have been very umteen cases of cyber-crime that argon tarradiddleed annually. This made the US government to join hands with the European councils Convention against Cyber crime in 2006.Look morethe issues concerning identity theft essayTypes of cyber-crimes The crimes that ar common in the cy ber are fraud. Fraud is a roguish misrepresentation of facts that is intend to cause passage for somebody else and benefit the fraud doer. This includes ever-changing inputs in internet in unaccredited manner, altering or de allowing data that is already stored in the net, altering existing clay tools, manipulating bank systems so as to make unauthorized access to bank automated teller machines (Shinder, 2002). Offensive content is a nonher(prenominal)(prenominal) form of cyber crime. Harmful contents of websites are considered as cases of cyber crime.Also distasteful or offensive the information carried in a cyber sites is not allowed. All materials that have the capableness of inciting hate crimes in societies, materials that encourage political rebellion, or blasphemous material are not allowed also as they are basically offensive in earthshaking manner. If these kinds of materials are found posted on the web their owners are accused of cyber crime. The antecedent for the restriction of these materials is that they lead to hostilities based on faith, race, etc that the modern world does not have a place for. Harassment is another type of crime that chokes over the net.It includes the circulation of uncomplimentary comments, and obscenities that are directed at authoritative individuals that are based on their aspects of gender, religion, race, knowledgeable orientation or national identity. This is generally done through news groups, e mails with hate messages, and chat rooms. Another crime that is supported by the net is dose trafficking. Drug trafficking is done through the net in that the illegal substance sellers use encrypted e-mail and other available internet technologies. The substances themselves are delivered to the buyer after they make payments.This crime leads to more sales for the medicine sellers since the trade is restricted in nearly countries and the intimidated users of the drugs resort to this option as a save haven. Cybe r act of terrorism is another kind of cyber crime. This crime is the coercion or intimidation of organizations or the government to come out a certain persons political or social goals. This is done by entryway attacks on their computer networks, and the information stored thither using computer. This vice loafer be defined as an act of terrorism that is actted via the use of computer resources or cyberspace.It ranges from simple propaganda to the use of the internet to commit a serious terrorist attack (Blane, 2003). Hacking activities are classified as acts of cyber terrorism. This activity is the assail of websites of families, individuals, and groups within a network, in separate to collect information that is useful for roughshod activities such as blackmailing, robberies, or ruin the activities of the web owners. A Canada case in 2000, which heterogeneous a Mafia male child who had committed 54 counts of illegal access to computers, is a classical case of cyber crim e.The suspect also faced ten counts for condescending data attacks on dell computer, yahoo, among other companies websites. There are many let downs in the fight against cyber crime. Many countries around the world lack systems and laws that are aimed at combating the crime. In extreme cases there are nations that condone or encourage some cyber crimes. In many of the countries the burden of bit cyber-crime is left to corporations that are affected in one way or the other by the vice. Some of the countries have laws against the crime entirely the law is not implemented while others have proposals for the law but they have not made the law.Nigeria here serves as an example of such a uncouth which has a good platform for fighting the crime only that the proposals have not been made into law. The bill mentioning the crime is in the national assembly wait to be discussed. If the bill were passed, cyber criminals would be prosecuted and duly punished. This go slow attitude is seen i n many countries that dont calculate to realize the danger that cyber-crimes pose to the victims. In any case government agencies like the police force, and crime investigation departments are among the leading victims of cyber crimes.Also politicians get very much of cyberspace blackmail and hence they should be in the forefront of finding a solution to the problem. Again cyberspace crimes are an image destroying affair. For instance a cyber-criminal direct from a sylvan A to spite a victim in country B destroys the overall image of their country and this may translate to less assert for his country in the eyes of other countries. The result of this may be economical loss of for the country that hosts the cyber-criminals as web based companies refrain from investing in the country (Yar, 2006). fortresss against cyber-crimes The enactment of laws against cyber crime by the governments has been a move in the remediate direction. In US there are such laws as Computer mistreat and Fraud Act that address issues of fraud that is related to computers, SPAM act that is intended to at controlling assaults of non solicited pornography. Other laws address extortion threats, identity theft, wire fraud, electronic communication theory privacy, and secrets of trade (Thomas, 2000). Legal frameworks that address separately emergent form of cyber-crime should be made.The laws that are made should be implemented and annul the situations from the past where some of the laws have not been put into practice. There should be cooperation with among the stakeholders interested in the cyber-crime inclusive of all operators and good solution providers in the sector. Such cooperation is a fast way to eliminating cyber criminals as their life in the community will be made difficult. The operators of cybercafes should not involve themselves with people who abuse the internet and commit the crimes. man awareness on the crimes should be instituted.This tend should inform the public about the dangers involved in the crimes. Awareness about cyber-crime should be created among members of the society so as to cut the number of cases that are likely to occur if the people are not aware. The social organisation of the Europes normal against cyber-crime is that nations who make out signatories of it harmonize their national laws, improve their investigatory capacity on the matter and aid with other nations in the fight against the crimes. If this congregation is adopted internationally it is able to polish off the problem to a great extent.This is out-of-pocket to the trans-border nature of the problem. Since the net is used and go against worldwide then a viable solution to the problem should be worldwide. If the approach pattern is not adopted in all countries, and cyber-criminals continue to operate freely there still will be effects on those countries that have ratified the convention (Shinder, 2002). On top of all this, victims of cyber-crimes should report the cases to the authorities for actions to be taken. Cyber criminals should be named and damaged so that they may cease from the practice. terminalCyber crimes are very prevalent in todays world and all actions that is required should be done to trammel them. The current actions taken against the crimes are not enough and more should be done to address the problem as it posses a grave danger to the entire macrocosm of the world as it has the potential to model political, social and economical wellbeing of communities, individuals and institutions. Protection of the selfs interest can only be guaranteed through the project efforts of all stakeholders and nations in fighting the crime. ReferencesBalkin, J. (2007). Cybercrime digital Cops in a Networked Environment NYU raise Blane, J. (2003). Cybercrime and Cyberterrorism. Nova Publishers Shinder, D. (2002). Scene of the Cybercrime Computer Forensics Handbook. Syngress Thomas, D. (2000). Cybercrime Law Enforcement , pledge and Surveillance in the study Age. Routledge Yar, M. (2006). Cybercrime and connection Crime and Punishment in the Information Age. SAGE http//www. usdoj. gov/criminal/cybercrime/ http//computerworld. co. ke/articles/2008/11/10/nigerian-govt-rated-low-curbing-cybercrime

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.