StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Crime In The Digital Sphere - Case Study Example

Cite this document
Summary
The computer technology is considered as a technology that can be utilized in almost any field of application. The paper "Crime In The Digital Sphere" discusses how the unprecedented success in the application of the computer and the internet can attract both the legal and illegal application…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Crime In The Digital Sphere
Read Text Preview

Extract of sample "Crime In The Digital Sphere"

Running head: Crimes Against Information Systems Analysis Crimes on Information Systems In APA Style Introduction The computer technology is considered as a technology that can be utilized in almost any field of application. The unprecedented success in application of the computer and the internet can attract both the legal and illegal application. This view is due to the fact that the computer technology revolution, due to its wide range of applicability can be utilized for the benefit of the society and also, for some, can be used in unlawful acts. The applicability of the technology can be deemed appealing to exploitation by the delinquent users that can be pointed out to perceive the technology in criminal acts due to certain factors. One of the most attractive features of the computer and the internet technology is the power to access information. This can be considered as an effective form of enterprise due to the fact that information can be considered influential specifically retrieval and acquisition of confidential and classified information. Another is the application of the access to destroy or disrupt systems due to certain goals and even at certain price (Franda, 2001). These are only some of the scenario for which the potentials of the technology can be applied in unlawful acts. In doing so the most dominant affective factor for such actions is the use of the computer technology and the internet as a venture and scheme on the basis of financial gains. Due to increasing occurrence of illegal activities through the utilization of the computer systems, it has gained attention and earned a category on its own for research, legal attention and advocacies. Such actions are aimed to educate and avoid the detrimental effects of such attempts in different information systems through the computer technology utilization. Knowledge can be considered as the most essential tool in the fight against unlawful exploitation and prevention of the disadvantageous effects of any technology that is released for utilization by the masses and the international community. Computer Crime Defined Due to the rapidly developing state of technology in the present society, crimes can take a variety of forms. In the age of technological revolution initiated by the rise of the computer technology, forms of crime that apply the use of computers are rapidly increasing in occurrence. These crimes can be classified as computer crimes also referred to cyber crimes. There are various manifestations of computer crimes that use different forms. The categories of computer crimes are based on the object of the crime. These are classified according the victim of the committed scheme. Cyber crimes can be perpetuated with a particular person; group or property; or the government as the victim (Babu and Parishat, 2004). The emergence of new forms of crimes such as those utilizing new technologies requires attention from the masses and from the authorities. Thus, the study of the different forms and classifications of cyber crimes can be considered emergent in the present society. New technologies can be equated as new ways and possibilities for the perpetration of crimes. In this case, new methods in fighting such crimes are required. Information dissemination is the primary phase to counteract such crimes (Wall, 2001). Crimes that are done against person affect the different aspects of personality such as the pornography and distribution of offensive materials through the internet and e-mails. These types of crime are considered as having the most common occurrence in cyberspace. Harassments also occur to the persons that utilize computers. The crimes that can affect certain groups in the society are another form that is needed to be given attention by the authorities due to the fact that these types of computer crimes can affect a larger part of the population. An example is the spread of programs and computer software that can destroy computer systems and disrupt activities and operations of companies (Brenner, 2001). Another category of cyber crimes that can be considered as the most dangerous cases of such illegal acts are those that victimize and target the government institutions. Due to the classified information that can be accessed from government institutions, the nation can be endangered if retrieval of such data is acquired by the wrong people (Babu and Parishat, 2004; Wall, 2001). This can be exemplified in cases wherein access to the military and defense can be gained by the groups that can apply data to undertake terrorism. These categories of cyber and computer crimes can be exemplified by the different forms and manifestations of such crimes. The specific computer crimes are hacking, fraud, scams, piracy, extortion, pornography, offensive content, harassment, cyber terrorism and even drug trafficking (Brenner, 2001). Hacking Hacking can be considered as of the cyber crimes that are committed by present day criminals through the utilization of the computer technology. The individuals and groups that exercise such application of the computer technology can be considered as criminals due to the fact that these activities are done against the rights of other people specifically the victims. The detrimental effects can either be towards the rights to intellectual property and privacy (Franda, 2001). Being one of the crimes that can be committed through the cyber space and the computer network, hacking can either be employed and classified to be undertaken on an unprecedented method or as an application of an old scheme but through a different technique (Wall, 2001). This implies that hacking can take different forms and continuously be developed on the basis of the application. Hacking can take different forms but the common notions between these modes of hacking are the access to classified information. One of the most serious cases of hacking is through industrial espionage that can be considered as a serious criminal offense. Cases of gaining information especially from the government agencies can even involve issues on national defense (Brenner, 2001). The occurrence of hacking can result to different effects. One example of situation may result to terrorism when the information that was accessed can affect the security of the public such as armament in the military. Hacking can also result in the deficiency in assets of the victim due to the access of the information by hackers. Such cases can occur in financial records and transactions. Another detrimental effect of hacking is with regards to the lost of trust of the public specifically on well established organizations that have failed to prevent hacking attacks. The main issue that can arise is with regards to the security system of the company or organization (Brenner, 2001). Although other can be considered as accidental hackers that have no intent in finding fault to security systems of the different organizations and individual victim, the misuse of the information gathered is considered a crime. Methods and Intentions in Hacking The potentials that was offered by the computer technology cannot be ignored by certain group in the society specifically those that operate on the basis of certain intentions. Due to the power that the computer and the information technology possess the application of the system continue to expand. As the technology improves the more attractive it become to the perpetrators of crimes (Wall, 2001) There are different methods that are applied in the accomplishment of hacking and other related cyber crimes. These techniques include programs and software that has the capability to decode security systems and others can initiate damage or malfunction to the system causing the hackers to enter and access the information located within the set barrier (Brenner, 2001). These are only some of the techniques undertaken to be able to achieve the intent in cyber crime such as hacking. These actions are undertaken due to certain goal. Although hacking can be considered as one of the serious cyber crimes, the act of accessing and breaking the security system can be considered as one of the ways researchers of particular companies are able to test the strength of security system. Thus, hacking can be applied by the organizations themselves to be able to determine the defense that is needed to be established by the system hacking from outside the system itself that can cause leakage of confidential information. Interests of illegal hackers can be stirred due to the fact that organizational success and profitability cannot be observed form the physical structure of the company but in the backend processes that involve a structured information system. The access to such system is the main motivation of hacking (Taylor, 1999). Hacking can be a technique in the improvement of the security system of a company. It leads to crime when there is no permission from the owner of the information. This can occur on the basis of the underground groups that use the classified knowledge of hacking to be able to fulfill personal goals and targets (Taylor, 1999). To cause havoc, to attain financial benefits and other reasons are amongst the stimulus that causes the hackers to do such actions (Brenner, 2001). Impacts of Computer and Cyber Crimes Hacking can greatly affect the society. Such effects are needed to be considered carefully and tackled through intelligent techniques such as information dissemination and in-depth research. To be able to counteract a technical and technological crime, the basic need is to acquire knowledge and information regarding the nature and operation of the crime. Misconceptions about the particular problem such as hacking can lead to intensification of the detrimental effects of the crime. Also, wrong information can also cause negative effects specifically when it is magnified by the media. Solutions to such problems can be hindered by when the public has wrong notions due to misinformation by the media (Taylor, 1999). The job then of the authorities intensifies and the need for a concerted effort and more modern techniques are required. Aside from these laws are needed to be made, specifically for the crimes that are increasing in occurrence in the cyber world that has detrimental effects in the real society. Actions Against Cyber Crimes The cyber technology advances the perpetration of crimes, thus, law enforcement also needs innovations. The situation regarding cyber crimes brings about the need for law and crime-fighting in the cyber world. In the present situation, cyber crimes are not directly acted upon. The move and advocacy undertaken are still in the process viability. Difficulty in policy making can be encountered due to the fact that computer technology and internet systems transcends national boundaries, thus, it requires in internationally unified law that can be applied effectively in the cyber word (Franda, 2001; Wall, 2001). These types of laws and policies are still being developed resulting to increasing occurrence of cyber crimes. The protection that can be applied at present are additional security blocks that can hinder hacking but real policies are greatly needed (Wall, 2001). Other perceived solution to the problems of hacking is the 'professionalization' or the employment of the group to work for the government or organization to be able to avoid illegal hacking. Another is the establishment of computer ethics (Taylor, 2001). Although these suggestions can be feasible to fight cyber crimes, it is still the enforcement of laws and the capability of the authorities to act upon the crimes that can prevent the occurrence of cyber offenses. Based on gathered information, the action of the authorities to safeguard the public against cyber crimes is minimal to cause significant prevention of perpetration of such crimes, thus, increased efforts are required along with the concerted efforts of different groups in the society. References Babu, M. and Parishat, M.G. (2004). What is Cybercrime. Retrieved September 14, 2006, from http://www.crime-research.org/analytics/702/. Brenner, S. W. (2001). Is There Such a Thing as 'Virtual Crime'. Cal. Crim. Law Rev., 4. Franda, M. (2001). Governing the Internet: The Emergence of an International Regime. Boulder, CO: Lynne Rienner. Taylor, P.A. (1999). Hackers: Crime in the Digital Sublime. London: Routledge. Wall, D. (2001). Crime and the Internet. New York: Routledge. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Crime In The Digital Sphere Case Study Example | Topics and Well Written Essays - 1750 words - 1, n.d.)
Crime In The Digital Sphere Case Study Example | Topics and Well Written Essays - 1750 words - 1. Retrieved from https://studentshare.org/law/1525662-crimes-against-information-systems-analysis-essay
(Crime In The Digital Sphere Case Study Example | Topics and Well Written Essays - 1750 Words - 1)
Crime In The Digital Sphere Case Study Example | Topics and Well Written Essays - 1750 Words - 1. https://studentshare.org/law/1525662-crimes-against-information-systems-analysis-essay.
“Crime In The Digital Sphere Case Study Example | Topics and Well Written Essays - 1750 Words - 1”, n.d. https://studentshare.org/law/1525662-crimes-against-information-systems-analysis-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Crime In The Digital Sphere

Crimes Against Property

Crimes against Property Name Institution Crimes against Property The broader use of the term crime includes both felonies and misdemeanors.... Shoplifting is often considered to be a crime against property that is punishable by law (Orthmann & Hess, 2009).... Although there is no economic theory of shoplifting, the decision to commit this crime is one that is taken rationally, weighing up the implications and advantages of this choice now and in the future....
4 Pages (1000 words) Assignment

Use Of Benford's Law In Fraud Investigation

The mathematical validation of the law and the technological advances in the recent past, which facilitate faster and easier programs for digital analysis, have enhanced the usefulness of the law in detecting fraud, as the law is increasing used by forensic accountants and auditors....
20 Pages (5000 words) Essay

Law: Computer Misuse

They would like you to research on the following area: The Internet has… Countless individual Internet users and companies become subjected to ever increasing e-crimes because Government has failed to provide The cost of the crime in many cases is immense.... You work as a researcher for the Association of Police Force Chiefs England and Wales (a fictitious group) who are concerned that the law in England and Wales in unable to meet the challenges of e-crime....
7 Pages (1750 words) Essay

Management Information Systems and Cybercrimes

Hence, teenagers become experts at the technological sphere.... Your responses should be a minimum of a paragraph (125-175 words) per question, be grammatically correct, and demonstrate through… Presnky, in his infamous article “digital Natives and digital Immigrants,” coined the notion that the youth are digital natives and the older generation digital immigrants....
2 Pages (500 words) Essay

Criminology 1 question future crime

Therefore, it can be said that the future crimes will be mostly in the digital field and in order to combat as well as prevent these crimes, there needs to be developed specific systems that can preempt these crimes from taking place.... Whatever they do now, it is always encompassed within the digital world.... Therefore, it can be said that future crimes will definitely be directed towards the digital world.... This fact is evident from the ever increasing crime rates all over the world....
2 Pages (500 words) Essay

Computer Forensics

What additional sources of evidence might there be besides the digital equipment and media that would have been seized?... In these investigations, what is the minimum number of copies that should be made of each digital media device?... In these investigations, what is the minimum number of copies that should be made of each digital media device?... True or False: Of the three phases of an investigation: Acquisition, Authentication, and Analysis, Acquisition is the process of retrieving digital evidence and verifying that it is authentic....
2 Pages (500 words) Coursework

Digital Signature Algorithms and Application of a Scheme of Digital Signature in Electronic Government

However, some factors should be considered; first is the flexibility and complicate the flow of information in electronic enterprises; second is the security of the digital signature algorithm, and third is the problem of the speed in signing and verification in digital signatures (Yun-Kyung Lee et al 245).... These signatures are made up of ones and zeroes and are generated by the use of the digital signature algorithm.... The author of the paper "digital Signature Algorithms and Application of a Scheme of digital Signature in Electronic Government" states that digital signatures are hard to be attacked by the intruders who tried to distort the messages hence making them popular....
13 Pages (3250 words) Literature review

Corporate Digital Forensic Investigations

… The paper "Corporate digital Forensic Investigations" is a great example of an essay on logic and programming.... The paper "Corporate digital Forensic Investigations" is a great example of an essay on logic and programming.... When such crimes are committed, law enforcement agencies use digital forensic techniques to gather and collect evidence that is used to identify and prosecute the perpetrators of the crimes.... When crimes are committed on cloud computing platforms, law enforcement agencies cannot rely on traditional digital forensic techniques in conducting investigations (Plunkett et al....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us