Cybercrime Problems And Alternatives Information Technology Essay

The increasing access to and following use of technology has significantly impacted how people connect and carry out their daily lives. The web for example links people and companies from contrary sides of the world quickly, easily, and relatively cheaply.

However, the computer and internet can be utilized in negative ways, which can have damaging effect on societies. Cybercrime is a danger against different organisations and people who computers connected to the internet and specifically mobile technology.

Cybercrime can be explained as a kind of crime devoted by cybercriminals who use some type of computer as a tool and the internet as a connection in order to reach a number of objectives such as fraudulence, unlawful downloading of files such as music and motion pictures, and spam mailing which is sending a phony e-mail in order to steal private information or access to a secured website (Mix, 2002:2). Cybercrime is a concern that has been attracting marketing attention since 1945, when the United Nations created a global co-operation and collective security network of 192 countries to cooperate and solve international problems and one of an evergrowing issue is cybercrime (Portnoy and Goodman, 2009).

This essay aspires to classify cybercrime with respect to the taget of the crime to two common teams, that happen to be Cyber crime against individuals and Cybercrime against organisations as well as address this problems of every group by recommending possible solutions to each problem independently.

 

 

 

Cybercrime

Cyber offense is the latest and perhaps the most complicated problem in the cyber world. "Cyber crime may be reported to be those species, of which, genus is the traditional criminal offense, and where either the computer can be an object or subject matter of the carry out constituting offense" (13). "Any criminal activity that uses a computer either as an instrumentality, goal or a means for perpetuating further offences comes within the ambit of cyber crime"(12)

A generalised explanation of cyber offense may be " unlawful functions wherein the computer is the tool or focus on or both"(3) The computer may be used as a tool in the next kinds of activity: financial crimes, sale of illegitimate articles, pornography, online gambling, intellectual property criminal offense, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful functions in the following instances- unauthorized access to computers / personal computers / computer networks, theft of information contained in the electric form, e-mail bombing, data diddling, salami episodes, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, literally harming the computer system.

 

Reasons for cybercrime :

Hart in his work " The idea of Regulation" said that 'human being beings are susceptible so guideline of law must protect them'. Through the use of this to the cyberspace we may say that pcs are vulnerable so guideline of law must protect and guard them against cyber criminal offense. The reasons for the vulnerability of pcs may be said to be:

1. Capacity to store data in relatively small space:-

The computer has a distinctive feature of storing data in an exceedingly small space. This enables for much easier access or removal of information through either physical or digital media.

2. Accessible:-

The problems encountered in guarding your computer system from unauthorised gain access to are that there surely is every likelihood of unauthorised access not credited to human problem but because of the intricate technology. By secretly implanted a reasoning bomb, key loggers that can grab access codes, advanced words recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilised to get past many security systems.

3. Complex-

The computers focus on operating systems and these os's in turn are composed of an incredible number of lines of code. The human being head is fallible which is extremely hard that there could not be considered a lapse at any level. The cyber thieves take good thing about these lacunas and penetrate into the computer system using often more complex means than at first anticipated by the systems technicians.

4. Negligence:-

Negligence is very directly connected with real human conduct. Hence, it is very possible that while safeguarding the computer system there could be any negligence, which offers a cyber criminal to get access and control over the computer system. This neglect is usually a property of under resourced IT security provisions and the improvement of security barriers within software packages and network constructions may lead to improved security.

5. Decrease in evidence:-

Lack of evidence is an extremely common & clear problem as all the data is routinely ruined. Further assortment of data beyond your territorial level also paralyses this system of crime inspection.

 

Cybercrime against Individuals

A significant problem of cybercrime against specific may take place towards different types of people such as cybercrime against children, cybercrime against consumers and cybercrime against normal users. It really is clear that cybercrime against children is the most significant issue that ought to be focused on. One of the key regions of cybercrime is child pornography, which is the documented sexual abuse of children, however this excludes pseudo-photographs or computer produced items such as images, pulling, cartoons and painting (Akdentiz, 2008:4).

Newville (2001) highlights that the internet has certified to child pornography by offering offenders many means of swapping information without restraint and giving them a chance of learning and improving skills illegally. Thus, under a high activity by predators of finding open connections with young patients such as young adults, a rise in the amount of children who use the internet and propagate child pornography that result in a serious hazard to the safety of children. There are many ways that predators used to meet their young patients in public place and one of the normal ways is chartrooms (Medaris and Girouard, 2002)

A Suggested Solution of cybercrime against children

One of the solutions that is often offered is the fact parents should be accountable for their children's actions on the internet, however, parents are not able to take this responsibility only because it is difficult and challenging for them to always stick with their children whilst they are surfing the web. Thus, this task can be tackled by the close cooperation between parents and governments. In conditions of the duty parents have over their children of their homes, parents are required to be educated enough to identify the chance of cybercrimes that their children may face while using the internet. This may be rectified by putting in defensive software on the Laptop or computer which restricts usage of certain websites filled with pre-determined key phrases, for example "sex". In addition, they should also suggest their children to avoid these hazards such as talking to the strangers on the net which can lead to dangerous situations. Parents should not just rely on using various software andmonitor which websites that their children sign up for. They could restrict their children's access by only allowing providing them with usage of pre-screen or pre-approved content on the internet and for that reason have the ability to keep their children safe from any sexually orientated content. . Outside the home responsibility can be taken by states, which have a real influence on security of children. Matching to Yar (2006) (cited in Creighton, 2003: 3), " Operation Ore 2003 led to 1, 600 arrests in the UK of individuals who had registered to a US-based child pornography website; the arrests were made possible by cooperation with US law enforcement specialists who provided credit-based card details of UK residents who experienced subscribed to the service".

Cybercrime against organisations

The second issue of cybercrime is one which is extremely threatening to organisations such as business and politics websites, to mention but a few. It really is quite common that cybercriminals are focused on attacking a definite sector which is commercial websites such as shopping websites and banks. Regarding to a 2001 pilot study, which 198 businesses responded and proven that 74% have been attacked by cybercriminals who used several tools against them such as a computer varies (Rantala, 2004). Cybercrimes against commercial websites can be accrued in several ways, however, on the net there may be one common activity between cybercriminals which is piracy such as downloading music, movies and video games illegally and stealing information or any substances that are private or not made readily accessible. For example, the Record Industry Connection of America (RIAA) claims that illegally downloaded music costs per annum about $12. 5 billion in financial deficits (Bazarsky, 2008). A software piracy which is employed by cybercriminals can cause a serious problem on the net, as Mix (2002:39) points out, " the common bag snatcher gets only $20 or $30 per taken purse, and the average strong-arm robbery (mugging) produces $50 or less. On the other hand, pirated software programs often cost from several hundred to many thousand dollars. Thus, economically, one function of software piracy is many times more "serious" than victimization by the petty thief or robber".

A Suggested Solution of cybercrime against company (commercial website)

Organisations and companies come under cybercrime attacks in every business activity on the net, therefore, some alternatives can be advised that may help to safeguard business websites. Companies should develop and secure their websites by giving anti-piracy software which could possibly help to reduce the risk of cybercrime and their activities. Furthermore, businesses must hire a lot of people who are advanced and experts in computer security to supervise their content and materials which give a secure environment in cyberspace. In addition, companies should be encouraged to join some organisation and international cooperation groups to be able to get rid of piracy as well as establish a global law in cyberspace, which punishes anyone who commits action of cybercrime.

Conclusion

This essay has truly gone some way in explaining the concept of cybercrime as well as handling two important problems of cybercrime, that happen to be cybercrime against specific such as child pornography and cybercrime against company such as piracy. Furthermore, there are a few suggested answers to each problem that may be met with regards to the difficulty of applying and monitoring them. Alternatively, cybercrime is a growing concern across the world, thus, research must continue steadily to take place in order to keep cyberspace as safe as possible and guarded from the actions dedicated by cybercriminals. On the other hand it has been established that it's the responsibility of the individual to protect his/her own Internet connection. It might therefore be recommended that Government authorities and local authorities including Law enforcement officials and Education Services should work more meticulously with the Internet Service Providers to protect minors on the Internet. Despite all the trends in the area of Child Security Software, teenagers will always find a way of preventing a defensive firewall. Therefore education would provide an important role in protecting children. Furthermore if the culprits are recognized legislation enforcers could punish and remove the criminals' usage of the nternet. The misuse of computers is a serious issue in the sight of regulations, and under British Regulation, the Computer Misuse Act (1990) would be central to prosecuting any individual who attempts to use a computer unlawfully.

By handling their weaknesses, as I have mentioned in this essay both businesses and individuals could fortify their Internet security in so doing stopping these avoidable problems of Cybercrime.

  • More than 7,000 students prefer us to work on their projects
  • 90% of customers trust us with more than 5 assignments
Special
price
£5
/page
submit a project

Latest posts

Read more informative topics on our blog
Shiseido Company Limited Is A Japanese Makeup Company Marketing Essay
Marketing Strength: Among the main talents of Shiseido is its high quality products. To be able to satisfy customers, the company invested a great deal...
Fail To Plan You Plan To Fail Management Essay
Management This report will concentrate on two aspects of project management, their importance within the overall project management process. The report...
Waste To Prosperity Program Environmental Sciences Essay
Environmental Sciences Urban and rural regions of India produce very much garbage daily and hurting by various kinds of pollutions which are increasing...
Water POLLUTING OF THE ENVIRONMENT | Analysis
Environmental Studies Pollution Introduction Many people across the world can remember having walked on the street and seen smoke cigars in the air or...
Soft System Methodology
Information Technology Andrzej Werner Soft System Methodology can be described as a 7-step process aimed to help provide a solution to true to life...
Strategic and Coherent methods to Recruiting management
Business Traditionally HRM has been regarded as the tactical and coherent method of the management of the organizations most appreciated assets - the...
Enterprise Rent AN AUTOMOBILE Case Analysis Business Essay
Commerce With a massive network of over 6,000 local rental locations and 850,000 automobiles, Organization Rent-A-Car is the greatest rental car company...
The Work OF ANY Hotels Front Office Staff Travel and leisure Essay
Tourism When in a hotel there are careers for everyone levels where in fact the front office manager job and responsibilities,assistant professionals...
Strategy and international procedures on the Hershey Company
Marketing The Hershey Company was incorporated on October 24, 1927 as an heir to an industry founded in 1894 by Milton S. Hershey fiscal interest. The...
Check the price
for your project
we accept
Money back
guarantee
100% quality