Cybercrimes - Research Paper Example

Comments (0) Cite this document
A Cyber crime is the illegal activities such as credit card fraud, software piracy, among others that are carried out over the internet to offend people’s senses or even evade privacy. Broadhust and Grabosky (2005) in their book defined cyber crime as a “specific category of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Read TextPreview

Extract of sample "Cybercrimes"

Cyber Crime Barbara Howard-Shump ITS 1000 computer and Internet Literacy May 12, Wendy Lamont South online Cyber Crime A Cyber crimeis the illegal activities such as credit card fraud, software piracy, among others that are carried out over the internet to offend people’s senses or even evade privacy. Broadhust and Grabosky (2005) in their book defined cyber crime as a “specific category of computer crime, which refers to the use of computers as a tool for crime commission” (p. 197). Cyber crimes have created attention in the various national capitals. According to Great Britain: home Office (2010), “the challenge posed by crimes initiated or committed through the online environment is not so much their identification as the nature of the environment in which they are committed (p. 9). Balkin and Information Society Project (2007) in their book wrote that “cyber crime has the basic characteristics of traditional crime, but it is not territorially based” (p. 218). Unlike crime, cyber crime can easily transcend to national boundaries. The laws governing cyber crimes in several countries are unenforceable due to the lack of a means of protection that businesses and governments are able to rely on, in place they have relied on technical measures to protect themselves from those criminals who would deny access of specific information, steal or even destroy information that is valuable.
Types of Cyber crimes
Cyber crimes come in three categories: cyber crimes against a person, property or a government. Cyber crimes committed against a person include crimes like harassing an individual via email, posting, distributing or disseminating materials such as pornography, and having indecent exposure. This type of crime possesses a serious threat to the younger generation and may cause scars that are irreparable to the young if it is not prevented. While crimes such as vandalism of computers and transmission of programs that are harmful like viruses, fall under cyber crimes against property. Cyber crimes against properties often take place in organizations. For instance, an engineering company may decide to steal another company’s database by using a spy. The other is the cyber crimes against governments come about when an individual or even a group for people threatens international government by terrorist its citizens. An example of his type of crime is when an individual cracks a website containing important government information. Cracking is also a cyber crime that has become common; it gives a person a dreadful feeling knowing that someone broke into your computer without the owner’s knowledge.
Fighting Cyber crime
People and the government must understand cyber crime first in order to fight it successfully (Cross, 2008, p.29). There are a few countries that have tried to enforce laws regarding cyber crimes. Most governments and businesses that conduct a variety of transactions on the internet have tried to a self-protection to prevent cyber crime. Self-protection has not been sufficient in preventing cyber space. There should be an international rule of law that has to be enforced because some countries where there is inadequate legal protection against cyber crimes run a substantial risk of having their messages blocked by the network. Cyber crimes can be enhanced by the examination of statues of the national government to ensure they are sufficient and able to combat any cyber crime that may be committed. Kshetri (2010) states that “new cyber crime laws have increased the government’s formal authority in industrialized countries, whiles many developing countries have no laws dealing with cyber crimes” (p. 103)). This means that governments from some developing countries want to fight against cyber crime and lack a framework for regulation, but can draw examples from these industrialized countries on how they have tried to combat cyber crimes and try to implement it.
Balkin J. M. and Information Society Project. 2007. Cyber crime: Digital Cops in a Networked Environment. New York: New York University Press.
Broadhurst, R. & Grabosky P. (2005). Cyber-crime: The Challenge in Asia. Hong Kong: Hong Kong University Press.
Cross Michael. (2008). Scene of Cyber crime. Burlngton, MA: Syngress Publishing Inc.
Greta Britain: Home. (2010). Cyber Crime Strategy. Richmond, UK: Crown Copyright.
Kshetri Nir. (2010). The Global Cyber crime Industry: Economic, Institutional and Strategic Perspectives. North Carolina: Springer. Read More
Cite this document
  • APA
  • MLA
(“Cybercrimes Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Cybercrimes Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(Cybercrimes Research Paper Example | Topics and Well Written Essays - 500 Words)
Cybercrimes Research Paper Example | Topics and Well Written Essays - 500 Words.
“Cybercrimes Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Constitutional Challenges Associated With Investigating Cybercrimes

...? Constitutional Challenges Associated With Investigating Cybercrimes of Constitutional Challenges Associated With Investigating Cybercrimes The rapid internet growth has enormously expanded the means of communications. Cyberspace has enabled people to engage in the creation of a completely diverse, chaotic, and new democracy which is free from physical and geographic constraints, as well as sharing ideas over large distances. Technological developments especially in respect to cyberspace have been inarguably beneficial to human beings and have positively impacted on how they conduct business and how they live (Ditzion, et al., 2003). However, these developments have presented the world with new types of...
10 Pages(2500 words)Term Paper

Fighting Cyber-Crime

...? Cybercrime Introduction With the increase in the widespread use of the internet, cybercrime rose massively from the year 2005 draining billions of dollars. In order to fight against it, technical, ethical and juridical challenges in efficiently reducing the crime started being identified. Fighting cybercrime has become an international engagement as this crime is not limited to a specific region. That is why the technical, organizational and legal understanding and cooperation among countries has become an important issue. However; this international cooperation has been facing many difficulties; the most important being the sharing and accessing of related information. This is because:...
5 Pages(1250 words)Term Paper

Greatest challenge facing law enforcement agencies in investigating, exploitation, cyberstalking, and obscenity

...of crimes, known as cybercrimes, emerging. These crimes include crimes related to exploitation, cyber-stalking, and obscenity, which have exposed the unpreparedness of law enforcement agencies in handling emerging crimes. In addition, law enforcement agencies face a challenge related to turf wars and jurisdiction when investigating cybercrimes. This expose investigates the challenges faced by law enforcement agencies while investigating exploitation, cyber-stalking, and obscenity. Moreover, the expose goes to the extent of proposing the solutions to the challenges faced by law enforcement agencies. First, cybercrimes have caught the attention of the world with President Obama declaring...
3 Pages(750 words)Essay


...?Computer Crime and Computer Forensics Computer Crime and Computer Forensics Cybercrimes have become a common phenomenon across the globe. In U.S., several organizations and individuals have become victims of crimes committed by cyber criminals located within and outside U.S. By making use of computer forensics, authorities such as the Unite States Federal Bureau of Investigations (FBI) have in some cases managed to trap and convict the cyber criminals. This essay is a review of three cybercrimes. Operation Ghost Click Operation Ghost Click was an international cybercrime investigated by the FBI. The crime involved an internet fraud ring used to infect millions of computers...
3 Pages(750 words)Essay

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat

...? Ethical Hacking Lecturer: The researcher provided a brief introduction of the ethical hacking issues and the way cybercrimes has increased due to rapid technological advancement. The author included the project goals that reveal the purposes of the research project and what it will accomplish. It included literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. The core hypothesis of the project was to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management. The researcher employed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part,...
4 Pages(1000 words)Research Proposal


...Cybercrime INTRODUCTION In the present day context, computer technologies and internet have become essential elements in the day-to-day life of individuals. There has been a significant increase in the number of individuals accessing ‘World Wide Web’ every hour and in every minute. People access the internet and use computers both for legitimate purposes and for illegal motives. The advancement in the field of internet has developed a virtual environment where activities can be executed through networked computers. Currently, criminal activities have increased to a significant extent due to easy and restriction free availability of information from the internet as well as free communication services offered by online...
7 Pages(1750 words)Research Paper


...are looking for well trained professionals to assess, design, develop, and implement cyber security solutions and strategies”. Therefore, it is important to note that this initiative aims to elevate or upsurge the quantity of individuals fresh from college possessing the necessary knowledge, talents, and abilities to counter the problems associated with cybercrimes. This initiative also aims to engage other individual organizations in making this dream come true. This initiative also presents the basis through which individual organizations as well as professionals can participate in making the cyberspace safe and secure. Proposed Examples There are a lot of examples that can be used to describe the importance of this...
3 Pages(750 words)Assignment

Cybercrimes for IT Professionals

...Cybercrime for IT professionals Computers and internet connections are in the finest usage to send and receive personal transactions and business dealings around the world. Consequently, individuals are now at risk of crimes that are cyberspace related, such as hacking or cyber extortion. However, there are new discovered cyber related techniques created to help businesses secure their data systems. Furthermore, aside from businesses, different trial courts are also in the peak of maximizing the use of technology in order to have an efficient way to protect the rights of the people (McConnell International, 2000; Johansson, 2006a). Tribunals consider establishing a global cyber court with a single aim to contest and...
1 Pages(250 words)Essay

Human Factors and the Insider Threat

...Human Factors and the Insider Threat Human Factors and the Insider Threat‎ With the increased use of internet throughout the globe, there is an increase seen in the cybercrimes as well. In order to maintain the cyber security of people under their fundamental right to be secure, it is necessary to assess the human aspects and challenges of cyber security. Cyberspace increases our social interactions, social performances, improves business models, and all in all it makes our personal lives better and interactive through communicating anywhere in the world. But on the other hand, there is a range of security problems that may take place affecting the lives of the people engaged in cyberspace. The cyber security is a...
5 Pages(1250 words)Research Paper

Cyber Crime

..., at that time, did not have any cybercrime laws which would have held the perpetrators accountable, the perpetrators were later released (Mishra and Pajrapati, 2013). Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011). This paper shall carry out a literature review of cybercrimes, cyber security awareness, including cyber incident reporting. Related details shall refer to the usual cybercrimes which have gained...
26 Pages(6500 words)Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cybercrimes for FREE!

Contact Us