StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK - Literature review Example

Cite this document
Summary
The paper "Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK" tells that cyber victimization is the case where crimes are committed using computers or information communication technologies to offend or defraud unsuspecting individuals. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful

Extract of sample "Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK"

Download file to see previous pages

A computer or a device related to a computer is the channel to commit the crime and therefore acts as a buffer that comes between the victim and the offender. McCusker for instance, while researching Transnational Organised Crime, shows that acts of cyber victimization are ill or greed-motivated with the aim of acting on the crime for financial gains and therefore they have to target financial institutions such as banks and e-commerce sites, where such financial benefits can be accrued. For instance, in January 2008, there was such cyber victimization on the United Arab Bank headquartered in Sharjah.

Having established one aspect that constitutes cyber victimization, there have been studies that have widely considered legal solutions within a broader context, with such studies including what has been considered in the United Arab Emirates (UAE) as alternative approaches to regulating online conduct like public education.. Additionally, researchers such as Ball note that laws in the United Kingdom (UK) that have been designed to deal with cyber victimization make specific suggestions regarding reform for criminal laws, however, more significantly it places the legal debate into a larger multi-modal framework targeted at protecting online reputations.

The place where people can report cyber-related victimizations owing to the nature of legal frameworks and structures currently available is an essential area to review. Contextualizing this position, according to the research conducted by Inman and Rudin, only 5% of the total cases of cyber victimization in Saudi Arabia were reported to banks and other financial institutions. This finding is indeed hardly surprising since the large majority of victimizations would likely involve illegally accessing the victims’ bank details with the objective of transferring money from these accounts.

In contrast, research by Ipsos MORI (2013) has indicated that most victims of cyber victimizations report their incidences to Internet Service Providers.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Combating Cyber Victimisation: A Comparative Investigation of the Literature review, n.d.)
Combating Cyber Victimisation: A Comparative Investigation of the Literature review. https://studentshare.org/information-technology/2052619-review-research-systematic
(Combating Cyber Victimisation: A Comparative Investigation of the Literature Review)
Combating Cyber Victimisation: A Comparative Investigation of the Literature Review. https://studentshare.org/information-technology/2052619-review-research-systematic.
“Combating Cyber Victimisation: A Comparative Investigation of the Literature Review”. https://studentshare.org/information-technology/2052619-review-research-systematic.
  • Cited: 0 times

CHECK THESE SAMPLES OF Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK

Malware Forensic Computing

… This report is a discussion about malware used by cyber criminals to do cyber attacks, and respective computer forensics investigation.... The whole concept revolves around the idea that a structured investigation is carried out to find out what exactly happened to the computer, when it happened, how it happened, and who did it.... Common cyber crimes and types of malware are discussed.... Computer forensics or cyber forensics is a very imperative topic in information systems and networks management....
10 Pages (2500 words) Assignment

Combatting International Organized Crime

??Are governed by explicit rules and regulation” We know a great deal of the structure of organised crime, what has emerged from the police having to develop new strategies of investigation is a painted stereotypical picture of detective work.... In countries governed by the rule of law, the essential tactics for combating these syndicates are similar; with a focus on intelligence gathering.... Increased scrutiny of the police has encouraged differentiation and specialisation in the interest of combating organised crime....
13 Pages (3250 words) Essay

Problems of Bullying, Cyber-Bullying and Cyber-Victimization in Greek Schools

The paper "Problems of Bullying, Cyber-Bullying and Cyber-Victimization in Greek Schools" focuses on the critical analysis and investigation of the experiences of bullying in primary school in contrast with secondary school, as well as how bullying or victimization affect a child's health system.... While the investigation of the age and gender on cyber-bullying or victimization was achieved through the use of the stepwise regression analysis with statistical Package for the Social Sciences being used for the analysis of data using the prespecified level of statistical significance of p < 0....
54 Pages (13500 words) Dissertation

The use of covert human information sources within an investigation

The use of covert human information sources in the investigation of various criminal cases is a practice in vogue among law enforcement agencies of all countries across the globe.... The practice has derived from the fact that when a police officer directly approaches people for the collection of information....
4 Pages (1000 words) Essay

UK, USA and UAE Cybercrime Law

To this effect, high-tech cyber based crimes such as terrorism, computer intrusions, espionage, identity theft, child pornography and fraud have become a major concern to the US and the uk.... For this reason, the US and the uk have made legislation to counter and extirpate cybercrime, albeit these laws have their strong and weak points.... The state-specific nature of cybercrime in turn brings about an aspect of variance and makes it possible to identify the pros and cons and strengths and weaknesses of these cybercrime laws, as shall be seen forthwith, in the cases of the US and the uk....
4 Pages (1000 words) Essay

Cyber-Bullying in Adolescence

cyber-Bullying in Adolescence University Name cyber-Bullying in Adolescence Bullying has, unfortunately, been a part of adolescent life for decades.... Today's adolescent is likely to either be a victim or cyber bully before finishing high school, being such a bully themselves, or surprisingly enough, ending up on both ends of the spectrum.... Studies have largely been conducted specifically about cyber bullying for the past eight years and, on average, upwards of 27% of respondents are victims of some level of extreme cyber bullying, while other studies point that this percentage is much higher and increasing at staggering rates (Wang & Ianotti, 2012)....
5 Pages (1250 words) Research Paper

Use of informants in criminal investigation

The use of informants in investigation has a long history of Identifying motivators, insuring the informant has access to the information that is desired, and maintaining control over the informant are the essential components for successful use of an informant in an investigation....
5 Pages (1250 words) Essay

Chronics of Cyber Crime Complaint Center in the United Arab Emirates

The paper "Chronics of cyber Crime Complaint Center in the United Arab Emirates" names Cybercrime as the bitter reality of advancement.... Usually, the large organizations become the victim of cyber-crime because either the hackers are more interested in the financial gain or they want to attain the prestige by getting access illegally to their secret data.... According to the statistics from 2008 to 2009, it is found that financial fraud via cyber is doubled....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us