StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Forecasts on Future Trends in Computer Crime - Essay Example

Cite this document
Summary
This essay "Forecasts on Future Trends in Computer Crime" presents the effective application of the rule of law as related to digital crime and terrorism and as a result prevent the occurrence of these crimes in the future and mitigate future forecasts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Forecasts on Future Trends in Computer Crime
Read Text Preview

Extract of sample "Forecasts on Future Trends in Computer Crime"

? Forecasts on Future Trends in Computer Crime of Forecasts on Future Trends in Computer Crime First Forecast The first forecast postulates that reported cases of computer crime are likely to increase significantly. This forecast however does not include the unreported computer crimes which relate to the use of electronic media formats in communication within computer systems. The important factors considered within the first forecast include the economic factor in which the forecasters reveal that there is a dire need for investing financial resources to facilitate the mitigation of digital terrorism and crimes. Additionally, the educational, training or developmental factor is also expressed within this forecast. Training for law enforcement personnel is an important process in mitigating future forecasts of computer crimes (Richard & Roussev, 2009). This is due to the fact that training will provide police officers and crime investigators with skills and knowledge of detecting and mitigating crimes in digital communication in an efficient manner. More importantly, professionals within the legal system must be trained to ensure effective application of the rule of law as related to digital crime and terrorism and as a result prevent occurrence of these crimes in future and mitigate future forecasts. Second Forecast The second forecast predicts that internet or digital fraud via electronic media which emanate from the theft of user identity by system attackers will be the largest and most significant of the computer crimes. This forecast is reflective of computer security issue in which the privacy and confidentiality of personal and private data is accessed by attackers of computer systems through loopholes in the internet communication. This can be exemplified by the hacking into financial systems and accessing credit card information of customers which leads to unauthorized access to their accounts by the system attackers (Ionescu, Irea & Blajan, 2011). Monetary loss is the major issue or factor which is represented within the second forecast. This forecast is important to the law enforcement departments, agencies and systems because it motivates them to put preventative measures of reducing the incidence of digital fraud. This can be achieved through strict enforcement of the law against digital fraudsters. Third Forecast The third forecast is predictive of more advanced digital crime and terrorism which involve virtual attacks of computing systems. The forecast specifically predicts that the advancement of computer networking systems such as social networking sites will cause virtual crimes to grow at a faster rate as compared to previous periods when computer networking was less advanced. The networking factor is expressed as the cause of the predicted growth of virtual crimes which are forms of hybrid computer crime. This form of crime can be illustrated by the psychological warfare which is mediated by electronic communication and internet based exchanges among individuals and groups (Agustina & Insa, 2011). It is apparent that this forecast acts as an important consideration of the law enforcement system because of the need to design and implement laws which are concerned with dealing with virtual crimes. Fourth Forecast The fourth forecast on the future trends in digital crime and terrorism is reflective of its advancement to the developing nations. The forecasters predict that the future of electronic communication and computer systems in developing countries will be characterized by the emergence of system attackers and hacker groups. The factors which are considered as the motivation for the forecast future trends include religious, economic and political intentions for digital crime and digital terrorism. This form of digital crime can be exemplified by terrorist groups who hack into computer systems within security department to illegally acquire intelligent cables and use them for organizing their terrorist activities (Lim, 2010). This forecast reflects that the future trends of such forms of crimes will spread to developing countries. It is in this sense that law enforcement within developing countries are mandated to come up with legislation and policies on computer security and as a result mitigate such forecasts in future. Fifth Forecast The fifth forecast on the future of digital crime and digital terrorism reflects upon organized digital crime groups. The forecast postulates that organized groups in crime will increasingly adopt and implement information and communication technology as a way of facilitating their digital crime and terrorism activities. The forecast specifically predicts that the financial factor or motivation will be the reason why digital crime groups will adopt technology in an increasing rate. This can be exemplified by the application of digital technology by the crime groups to print counterfeit currency as a way of funding their criminal activities and terrorism. Moreover, digital crime groups are likely to adopt such computing technologies to facilitate criminal activities such as smuggling drugs and human trafficking. The adoption of computer technology as an instrument for crime as postulated by the fifth forecast means that law enforcement systems across the world must coordinate in mitigating international crime. Sixth Forecast The sixth forecast is predictive of terrorist groups and the use of networked environment to foster digital terrorism. The forecast postulates that the future trends in digital terrorism will involve and increasing use of internet based networking systems in facilitating their terrorist ends. Examples of such applications include the use of global networks for psychological brainwashing and recruitment. This forecast demonstrates the communication factor as the motivation for the terrorist implementation of internet based information systems as an effective way of coordinating their global terror activities. This forecast means that the future trends in the use of technology by terrorists will include cyber terrorism and attack of the target security systems (Ionescu, Irea & Blajan, 2011). This forecast has an implication on the legal systems especially in the implementation and enforcement of international laws related to cybercrimes and digital terrorism. Seventh Forecast In accordance to the seventh forecast, espionage will evolve in the future and expand in its applications. Examples of these applications include economic espionage and information warfare. This demonstrates the military and economic factors as reflected within the seventh forecast and the increased application of computer systems and global networks to facilitate political and economic warfare. This forecast also predicts that the future in computing systems will be characterized by growth and advancement of intellectual property infringement and theft which is coordinated by technology. It is evident that the law investment and its investigative role requires to apply this forecast in mitigating future use of technology for negative political and economic espionage and the infringement of intellectual property rights. Eighth Forecast The eighth forecast demonstrates a future prediction of increased application of technology and applications criminal groups, anarchists, patriots and states in the capture of data and information. For example, computer software applications are likely to increasingly find applications in destroying digital communications and tracking. Additionally, various groups will increasingly use technological methods to store and process information with efficiency and accuracy. This forecast means that technology will increasingly be used both for positive and negative ends to meet the goals of various groups, agencies and states. In this regard in accordance to this forecast and the law enforcement is mandated to effectively monitor the use of technology by various groups and implement the relevant laws so that future forecasts on negative use of technology and digital crime would be prevented. References Agustina, J. R., & Insa, F. (2011). Challenges before crime in a digital era: Outsmarting cybercrime offenders -- Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society. Computer Law & Security Review, 27(2), 211-212. Ionescu, L., Irea, V., & Blajan, A. (2011). Fraud, Corruption and Cyber Crime in a Global Digital Network. Economics, Management & Financial Markets, 6(2), 373-380. Lim, N. (2010). Crime Investigation: A Course in Computer Forensics. Communications of AIS, 2006(18), 2-34. Richard, I. G., & Roussev, V. (2009). Next-Generation: DIGITAL FORENSICS. Communications of the ACM, 49(2), 76-80 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Case Study Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/other/1401120-case-study
(Case Study Essay Example | Topics and Well Written Essays - 1000 Words)
Case Study Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/other/1401120-case-study.
“Case Study Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/other/1401120-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forecasts on Future Trends in Computer Crime

What will be the hot jobs in the next decade

Analysts might also supervise computer programmers and work as specialists who handle the interfacing of computers and communications... Employment trends are constantly evolving and jobs that are popular today can quickly become obsolete as these changes occur.... Thus the concept of “hot jobs”, which is used to describe the best selling jobs in the near future, is not only misleading but also difficult to define.... Indeed, predicting the jobs or skills that will be in demand in the future is as tricky as is challenging....
6 Pages (1500 words) Research Paper

Study of Risk and Perceptions of Crime or Danger

Running Head: Stay Safe Stay Safe Stay Safe Part 1 In more or less all stages of western culture, the unstoppable rise in crime has been regretted in the “corridors of authority, the media, and the public” (Zimring, p.... Worried by reminiscences of an earlier golden period, specialists have applied crime data research, and the approximately daily stream of media reports as a basis to speculate regarding the varying nature as well as extent of crime, together with terrible forecasts for the time to come....
9 Pages (2250 words) Essay

LOVE. - Forecasting

Unless an organization measures correct forecast, it will be unable to provide appropriate products or services, which would result in delay in operation and… Generally, forecast is just a guess for future occurrences, and despite using best computer systems and best applications, the forecast can be wrong.... Generally, forecast is just a guess for future occurrences, and despite using best computer systems and best applications, the forecast can be wrong....
2 Pages (500 words) Essay

The Concept of Digital Crime

Recent studies show that that officer in computer crime department are overworked and are stressed.... To know about the future digital crime and terrorism large number of analysis and data collection is being done all over the world to minimize the digital terror (Taylor, Tory J.... he third forecast is to create new laws and also to come up with new methodologies to fight these crimes, that is, people should have more education about them, how to prevent such crime and also how the investigation should be done....
5 Pages (1250 words) Research Paper

Corporate Valuation and Strategy

The name had been developed from a food industry that was established in 1869 in Sharpsburg by Henry Heinz.... It has numerous subsidiaries.... It produces… The Company has existed as one of the most competitive companies in the food industry for over 140 years.... The Company's main products include condiments, frozen food, beans, infant nutrition, ketchup and The company's products are manufactured and packaged in line with the required customer standards to provide safe and wholesome foods to the consumers....
6 Pages (1500 words) Assignment

Statistical Models for Forecasting milk production

Forecasting of milk production enables policy makers and planners to estimate the supply of milk requirement in the future.... In the paper “Statistical Models for Forecasting milk production” the author analyzes dairy farming sector, which faces a number of technical, economic and institutional problems in milk production, processing and marketing....
6 Pages (1500 words) Statistics Project

The American System of Criminal Justice

This essay "The American System of Criminal Justice" discusses a number of various qualitative approaches that can be adopted to study crime perceptions.... hellip; One of the messages from this study is that better highlighting should be placed on expecting and acting in response to prospect crime series.... In turn, this will need the improvement and achievement of more thorough as well as incorporated research approaches that can forecast more precisely the extent, and as significantly, the type of potential crime series....
9 Pages (2250 words) Essay

Supply Chain Management in the Computer Industry

This paper "Supply Chain Management in the computer Industry" uncovered how the efficient use of supply chain management results in a company having the potential to secure additional market share by end-product price savings generated by internal cost reductions.... The computer industry is a prime example regarding the use of supply chain management.... nbsp; The other characteristics of the computer industry are that models change almost yearly (Purdue University, 2018)....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us