StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advances in Information and Communication Technology and Newer Forms of Criminality - Essay Example

Summary
The paper "Advances in Information and Communication Technology and Newer Forms of Criminality" discusses that the relevant mandated government agencies and local authorities should stay abreast of issues concerning cyber crime to ensure public security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful

Extract of sample "Advances in Information and Communication Technology and Newer Forms of Criminality"

Advances in Information and Communication Technology and Newer Forms of Criminality Client Inserts His/her Name Client Inserts Grade Course Client Inserts Tutor’s Name 02/04/2012 In the current emerging knowledge society, globalization and digital convergence has propagated the raising of complex ethical, societal and legal issues. Given its vital need to the contemporary world for gathering of information and knowledge, Information Communication Technology as an instrument is such a basic right to all humans. It is however worth noting that global socio-economic structures transformation together with the worldwide propagation of new information and communication technology has given rise to more forms of cyber crime. This not only poses a threat to integrity and confidentiality issues but also proves to be even a greater threat to the security of critical infrastructure (Asian School of Cyber Laws 2008). Distinct patterns of criminal innovations have been attributed to technological innovation across “digital divide” spectrum. With creation of new forms of criminality capable of exceeding nation-state due to the recent advances in information and communication technology, lots of care needs to be taken for the sake of the future criminality trends. These new forms are herein discussed with relevant examples given and possible proper control measures suggested to curb such criminality forms (Roberts 2008). Computer Crime can be described as crimes committed against the computer, material such as software’s and data contained therein, and its usage as a processing tool. This is inclusive of hacking, service denial attacks, cyber vandalism, and unauthorised use of service. On the other hand Cyber Crime describes those criminal activities perpetrated through the use of electronic communication media. Other new forms of crimes perpetrated though the use of information communication technology include crimes such as defamation, industrial espionage, cyber terrorism, harassment, pornography, and some regulatory offences (Bequai 2002). In most countries, existing criminal laws cover computer related crimes or those crimes that are electronically perpetrated. However, those offences against the computer are relatively new given that they are related and as a result of a borderless information society. In order to protect an orderly and vibrant digital environment, there is dire need of new laws to be put into place. It is arguably true that use of computers to commit offences constitutes new ways to committing traditional offences with electronic medium used as a tool. With the current advances in Information Communication Technology, there has been a tremendous increase in breadth and depth of electronically perpetrated crimes (Adomi 2010). So far no scientifically conducted detailed studies have been carried out exclusively on issues related to cyber crime and information security. Some figures however are available in the public domain giving an indication to this broad situation. According to the survey conducted by Computer Security Institute, it has been found out that computer crime and information security related threats has not been put into check thus resulting into financial crisis. It is further important to note that cyber crime is a broader phenomenon with offences against the confidentiality, integrity, and availability of computer data and system, computer related forgery and computer related fraud, and content related offences under its umbrella. In Australia, the prevalence and incidences of cyber crimes is largely known to individuals even though no proper documentation of statistics is currently available (Karofi & Mwanza 2008). Hacking has been for a long time the major cyber crime created in the recent past due to advances in information and communication technology. In Malaysia for example, on 26th June 2001, Social Security Organisation’s (Socso) website was hacked and an image of a covered skull posted on its site. It is also reported that between 1999 and 2003, sixty Malaysian government websites have been hacked. It has also been recorded that 394 incidences of cyber crime took place in the first six months of 2003 (Asian School of Cyber Laws 2008). With the current continued trends in social media, emails are increasingly being used for social interaction, online transactions and business communication. Email accounts have ended up being hacked into as most email account holders do not take the necessary precautions to protect the passwords of their email accounts. In such scenarios, password of the victims email account is stolen and then misused to send malicious code including worms, Trojan, viruses etc to those contacts of people in the victims mailing address book. Some hackers have ended up stealing victim’s password and extorting money from the victim in return of accounts ownership. The victim in this case is threatened that if he does not give out money, then the information contained in the emails will be misused. Sometimes when these passwords are stolen, the email is used to spread obscene emails (Adomi 2010). Credit cards are currently used commonly for e-commerce transactions. Even though strong measures (e.g. SSL and SWS etc) have been taken by most e-commerce websites credit card frauds are increasing. These credit cards and/ ATM cards can sometimes be stolen and counterfeits made. This constitutes to crime as they are acquired illegally. A good example of such a scenario is when a victim’s credit card information is stolen and misused in making online purchases. This is without the knowledge or permission of the victim. To perpetrate such criminal offences, pharming, phishing, fake taxation forms, traffic redirectors, keyloggers and password stealers are used (Roberts 2008). For phishing, fake email addresses and websites are used to “fish” personal information e.g. credit card numbers, passwords, and bank account information. Phishing has far much spread as per the records given that 25, 328 unique phishing websites were detected in December 2007. Advanced technology has made it possible for the use of online banking accounts mostly linked to the shares trading accounts. This has resulted into increased numbers of online shares trading frauds. With the victim’s account password stolen, the accounts are misused in making fraudulent bank transfers (Roberts 2008). Over the past decade, piracy has spiralled out of control. This is in correlation to the advances in information and communication technology. It is estimated that millions of dollars are being lost by companies due to illegal copying of software each year. This has greatly impacted the software industry in a negative manner (Karofi & Mwanza 2008). Results released by Business Software Alliance after a global piracy study in 2001 indicated that software piracy continued to pose a great challenge for the software industry. In order to maintain progress in technology, software companies need both local and international consumer support. This is more so for the growth and development of indigenous information and communication technology innovation and invention. This calls for strict measures to be put into place regarding intellectual property rights. It is rather ridiculous that most people do not consider software piracy to be theft. To them, using pirated software is nothing to mind about (Moriarty 2005). Most normal computer users do not regard software to be property. Some have gone to the extent of uploading this software in websites that share them for free. Most of this software has been manipulated and some decoded and its security made vulnerable. It is amazing to find millions of “cracked” software uploaded and distributed over the internet free of charge. The original authors of this software end up not benefiting as it’s supposed to be. Piracy has widely spread into the music and movie industry. With the readily available CD writers and burning software, pirating a CD is no more big deal. This has grown to an extent that it is no longer considered theft. For a very long time, thousands of unscrupulous businessmen have been selling and continue to sell pirated music. This is considered a crime because illegal financial gain is involved (Lopez & Wolthusen 2012). Great benefits are associated with internet, but also pose great risks to children. Cyber pornography has been reported to be the largest business on the internet today. This can be attested to by the millions of pornographic websites available on the internet. Bearing in mind that pornography is not as such illegal in some countries, child pornography is strictly illegal in nearly all nations. Cyber pornography not only includes the websites on the internet but also pornographic magazines produced using computers (Adomi 2010). This is regarded a crime since it involves illegal financial gains to those behind such scandals. Revealed by international criminal investigations, several global networks are exchanging child pornography. According to the Parliamentary Joint Committee on the Australian Crime Commission on Cybercrime noted three areas key areas of worry with regards to online sexual exploitation of children. These include: pornographic child sex imagery, children accessing unsuitable material, and sexual grooming and solicitation of children by paedophiles (Nagpal 2008). Cyber harassment sometimes referred to as cyber Bullying is a phenomenon that has recently arisen due to advancements in information and communication technology. This is as a result of the fact that it is now possible for individuals strangers to interact over the internet especially in social networks. Cyber bullying behaviours encompasses posting of online messages that are meant to harass. This may include: offering of threats, insults, teasing etc (Moriarty 2005). Advances in Information and Communication Technology seem to have greatly favoured terrorism activities. Various terrorism groups are able to communicate with their members around the globe despite the geographical locations. This has been made possibly through the use of emails and chat rooms. With the current trends in Information and Communication Technology, terrorists are capable of virtual use as well as physical storage media for securing information regarding their illicit activities (Nagpal 2008). Many ways have been devised by these illicit groups that have made tracking of their activities almost impossible. For example, an email account can be created with all the members given access to it. A member would compose an email and instead of sending it he/she would save it as draft. Another member in a different location would log into the account read the message in the draft and compose a reply which he/she also saves as a draft. This way, it is way far much impossible to track and trace these emails (Moriarty 2005). In conclusion, there is no doubt that information and technology has created newer forms of criminality or rather new opportunities for criminal activities. With the introduction of even more newer technologies, new forms of criminality will continue to emerge in the name of “Cyber Crime”. New victims of cyber crime continue to be created every day from unsuspecting members of the public even as information and communication technology advances with time. This therefore calls for a joint responsibility between all the stakeholders to come up with strict measure to combat this menace. The relevant mandated government agencies and local authorities should stay abreast in issues concerning cyber crime to ensure public security. The public also needs to be well educated in such issues. With the majority of benefits presented by advancements in information and communication technology, tradeoffs are worth consideration even if it means newer forms of criminality. List of References Adomi, E.E., 2010. Frameworks for Ict Policy: Government, Social and Legal Issues. Pennsylvania: IGI Global. Asian School of Cyber Laws, 2008. Real World Cyber Crime Cases. [Online]. Available at: < http://www.asianlaws.org/library/cyber-laws/real-world-cyber-crime-cases.pdf> [Accessed 02 April 2012]. Bequai, A., 2002. How to Prevent Computer Crime: A Guide to Forensic and technology. San Diego: Academic Press. Karofi, U.A., and Mwanza, J., 2008. Globalisation and Crime, Bangladesh e-Journal of Sociology, 3 (1). [Online]. Available at: < http://www.bangladeshsociology.org/BEJS%203.1%20%20Karofi.pdf> [Accessed 02 April 2012]. Lopez, R.S., and Wolthusen, S., 2012. Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defence. New Jersey: Springer. Moriarty, L.J., 2005. Criminal Justice Technology in the 21st Century. 2nd edn. Springfield: Charles C Thomas Publisher. Nagpal, R., 2008. Cyber Crime & Digital Evidence- Indian Perspective. Roberts, L., 2008. Cyber- Victimisation in Australia: Extent, Impact on Individuals and Responses. [Online]. Available at: [Accessed 02 April 2012]. Read More

CHECK THESE SAMPLES OF Advances in Information and Communication Technology and Newer Forms of Criminality

The Doctrine of Cyber Law, its Effectiveness and Reliability

It includes laws related to electronic copyright, web image trademarks, software piracy, domain name disputes, electronic stocking, online business information, etc.... The second form of crime in this category includes 'Data Espionage' which means accessing sensitive information without the permission of the host.... The two approaches which are used to obtain information can be accessing a computer, and extracting information, and using manipulation to make users disclose their access codes, which is also known as 'phishing' (Gercke 23-25)....
6 Pages (1500 words) Research Paper

Perception of Cyber Bullying

Information technology has reduced the world to a global village through fostering of advanced forms of communication.... Important, though, have been the concerns on how to address these forms of insecurity.... It is for this reason that information technology and security issues become critical.... However, with the advancements in information technology have arisen insecurity issues.... In particular, insecurity issues in information technology have been closely associated with internet usability....
8 Pages (2000 words) Research Paper

Technological Modifications and Convergence of Usages in the Development Trends of Computers

The paper "Technological Modifications and Convergence of Usages in the Development Trends of Computers" presents instantaneous learning develops through provided technology.... People depend on technology development to shape their interactions in different contexts.... Technological designs for current markets changes the way of work, communication, and interactions.... People are increasingly resorting to e-learning and quick information searching as the best-suited mode of education....
8 Pages (2000 words) Assignment

Cyberbullying as a Vice with Legal Implications

To this effect, cyberbullying may be described as the use of instruments or provisions of information and communication technologies such as cell phones, e-mails, chartrooms, instant messaging, and online social forums such as Facebook, WassUp, Skype, or Twitter to exact, conveyor support harassment, issuance of threats or intimidation of an individual.... thers define cyberbullying as the use of technology to threaten, harass, target, or embarrass another person....
15 Pages (3750 words) Research Paper

The Idea of Newness

Newness plays an increasingly significant role in the field of science and technology.... The paper 'The Idea of Newness' presents newness as a concept denoting events, products, ideas, technologies, works of art, and processes of collaboration or coordination that have an irritating impact when they occur....
9 Pages (2250 words) Case Study

Application of Information and Communication Technology in Banking

The aim of the present paper is to address the function of information & communication technology in the banking sector.... information and communications technology (ICT) invigorates markets by enhancing the flow of information, not in creating certainty, but making information more symmetric.... Digital technology has greatly reduced the costs of compiling, processing, and distributing information.... Moreover, technology has continually lowered the transaction costs of direct financing, facilitating the emergence of new electronic markets, payments and settlement networks, and new market-based risk and wealth management systems....
11 Pages (2750 words) Term Paper

Aspectual Evaluation of Information Systems

The author of this paper "Aspectual Evaluation of information Systems" discusses the main aspects that the multimedia system reflects in the interests of efficiency, through continuity and change, through technological determinism, and the factors of time, the place, and the amount.... People are increasingly resorting to e-learning and quick information searching as the best-suited mode of education.... People are increasingly resorting to e-learning and quick information searching as the best-suited mode of education....
8 Pages (2000 words) Essay

Japans Subculture and How Youth Creates Its Own Alternative Markets

With the advancement in technology, the fast accessibility of the internet together with the populous growing media consumption, many different subcultures are born especially for the young growing generations (Niu, Chiang, and Tsai 713).... This paper "Japan's Subculture and How Youth Creates Its Own Alternative Markets" discusses Otaku as a term used in reference to fan lovers particularly those anime, manga, games, etc....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us