ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cyber-crime: Understanding the Impact of Digital Technologies

Verified

Added on  2023/03/20

|10
|3557
|58
AI Summary
This report analyzes the impact of digital technologies on cyber-crime and explores the cultural, political, and social influences central to digital criminology. It discusses the challenges faced by law enforcement and policymakers in addressing cyber-crime in the digital age.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber-crime
Cyber-crime
Student Name:
University Name:
Unit Name:
Date:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER-CRIME
Introduction
The online world has brought global connections to the local environment and has changed the
ways of interaction between the different users. Obstacles are mitigated, making it easier for
people to access information and establish connections for a variety of products and services
available while using ICT (Information Communication Technology). Cybercrime adds a new
dimension to the illegal and violent risks those, the law enforcement official and policymakers
are trying to address. Such crimes are particularly worrying because they are usually
asymmetrical because a person or a small team of having programming expertise can inflict as
much harm as once it caused the entire army (Anita R. Gohdes, 2018). More importantly, the
offenders do not have to be wherever around the victim. When a crime occurs, the perpetrator
might be thousands of the miles away from the mainland, so it is very difficult to track.
Opportunities offered through digital and communication technologies, especially social media,
spur a variety of interdisciplinary perspectives and explore how these advances affect our way of
life. The “digital society” does not position technology as an independent space that exists more
widely in society. However, it treats these technologies as embedded parts of large social entities
and recognizes the convergence of digital technologies, media, and networks including criminal
behavior, victimization, and justice (Wagner, 2012). The aim of this report is to analyze the
criminal justice issue outside of the ‘traditional cyber-crime’ impacted the digital technologies
emergence. This report will cover the cultural, political, and social influences central to digital
technology in the Australian community context.
Criminal justice issue outside of 'traditional cyber-crime' has been impacted by the
emergence of digital technologies
To a large extent, our argument in this paper is that, to date, criminological contact with
computers and cybercrime has been largely isolated; lack of sociology, computer science,
politics, journalism, media and Critical and interdisciplinary contacts in disciplines such as
cultural studies(Biber, 2018). This is particularly detrimental to the promotion of a new generation
of scholarships on technology, crime, derailment, and justice in the digital age. The approach to
digital criminology research presented here is intended to include and greatly expand the
traditional focus of computer and cybercrime scholarships (Travers, Putt & Howard-Wagner,
2013). While there are many social and technical theoretical frameworks and disciplinary
2
Document Page
CYBER-CRIME
influences that can spur criminological research, many of them are based on the basic
understanding that the impact of technology. On contemporary crime, justice cannot be
understood merely as a tool or a separate scope of the experience. Instead, here we have
deployed the concept of "digital society" to emphasize our technological embeddedness in life
experiences of crime, victimization, and justice; the emergence of new criminal and judicial
technology social practices; and social, cultural and critical the theory continues to understand
and respond to crime in the digital age. It has been advocated that digital criminology can
provide a productive platform to extend the boundaries of contemporary criminological theory
and research, not necessarily a sub-discipline itself. The aim is to promote a broader and
sustained dialogue within the discipline that spans technology, society, crime, bias, and justice;
and stimulates new concepts and experiences (Pantea & Martens, 2013).
Comprehension of the social, political, and cultural influences central to digital criminology
One-way criminology can explain the support of technology and the effects of disability are to
conceptualize crime, bias, and justice into the practice of increasingly technological society in
the digital society. The practicality of numbers as "cultural markers" "contains artifacts and
meaning and communication systems that most clearly distinguish the relationship between our
contemporary lifestyle and others"(Biber, 2018). At the time, the key to the digital society was to
recognize structures, socio-cultural practices, and changes in life experiences that could not
distinguish between online and offline worlds. By focusing on digitalization, Deuze (2006)
argues that researchers can explore the impact of online and offline shaping of cultural products,
arrangements, and activities. This digital and social impact is also known as the digitization of
society, where "technology is society and cannot be understood or represented by society without
technical tools". By focusing on digital society, then other prefixes, such as cyber or virtual,
suggest that criminologists go beyond the framework of "computers", "networks" or "virtual"
crimes and justice are fundamentally different, or rather, opposed to "non-technology's form of
crime" as well as justice. Simultaneously, the more general concept in the digital society
encourages the study of criminal imagination to be related to relations, culture, emotions,
reprinted, re-institutionalized and potentially resisting crime and justice politics and social
structural level exploration, familiarity and unfamiliar ways. In fact, we use the digital "social",
compared to other similar and popular suffixes, such as "age" or "time" motives, which are
3
Document Page
CYBER-CRIME
deliberately invoking the society that supports crime. Equality, socio-cultural and socio-political
factors analysis, and broader justice, as our lives become more and more digital can be said to be
lasting (Liu, 2017). There is a need to propose a conceptual design for the digital society as
criminological Theory and research have opened up several new, rapidly emerging focal points,
albeit far from being a comprehensive column, identified seven kinds of ways of crime, deviance
and justice research in the digital society, drawing on the whole sociological, cultural and media
studies, journalism example of interdisciplinary research, security research and monitoring, as
well as law and criminology (Huey, Nhan & Broll, 2012).
The rapid growth of the computer connectivity, as well as the role of the Internet in the
emergence of innovative e-commerce, are forcing governments moreover global agencies to
address regulatory and security needs of the "data superhighway." These amazing tools erode
traditional communication barriers, compress our time and place concepts, or change the way we
do business in most parts of the world (Farrell, 2015). The convergence of the communications
and computing and exponential development of digital technologies have brought enormous
advantages, but these innovative benefits have created greater threats at home and across the
borders. Innovative opportunities also created in the "cyberspace" enhance the ability of
individual criminals and the criminal network that is emerged to take advantage of the
vulnerabilities of the "new" financial system. The main role of the digital technology in creating
national wealth implies that innovative risks related to this change need to continue to be
addressed in all areas: international, regional and national. While the process of the
"globalization" continuous to accelerate comprehensive response to digital security issues (Hay,
Meldrum & Mann, 2010). The development of “cyberspace” for transnational governance is
crucial to solving cybercrime. It can outline the achievements of the global community to date.
Controlling crime involves digital technologies and the computer network also requires
innovative networks: The networks between the police and the other agencies within the
government, the networks between private and police agencies, and police network those cross-
national borders (Hartjen, 2008). In the past decade, considerably procedure has been also made
within or among countries in developing the ability of the police to react to cybercrime;
moreover, computer users are now increasingly aware of the want for basic online security.
However, the speed of the technological modify will carry on to increase and the adaptive
capacity of cybercriminals will be kept on to challenge law enforcement. Therefore, the cliché of
4

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER-CRIME
"acting on a global scale" is particularly important in controlling cybercrime. The noteworthy
acceleration of cross-border law enforcement cooperation's in responding to cybercrime as well
as other international risks has fundamentally changed expectations for what is likely to be
attained at the global level (Huey, Nhan & Broll, 2012).
Although this development might be promising, the achievements that have been made can be
only seen as the beginning(Jones, 2003). Until recently, it was probably to converse about the
global consensus on the combating cybercrime, particularly the transnational form it often takes.
But, whether through civil, criminal or administrative measures, there is now a positive "moral
atmosphere", which recognizes the so-called "common destiny community" of sociologists. At
the global level, two innovative treaty instruments have laid a solid foundation for important
cross-border laws enforcement collaboration needed to struggle cybercrime (Travers, Putt &
Howard-Wagner, 2013). The first of these instruments, the European Commission (CoEs)
Cybercrime Convention, was specifically established, although design as a regional mechanism
with global importance. Cybercrime is often traditional crime (for example fraud, identification
of theft, child pornography), as well as although it is implemented quickly, there are still a large
number of the possible victims, and unofficial access, harm, and intrusion with computer systems
(Walters, 2013).
The transnational nature of the computer-associated crimes has made many long-standing
domestic and cross-border regulatory methods ineffective even in the developed nations, and the
“digital divide” provides a “safe haven” for a cybercriminal. In order to deal with the threat of
cybercrime, it’s urgent to reform the focus of work and develop transnational policing
capabilities (Lavorgna, 2014). Traditionally, risks to the national borders have led law
enforcement and military personnel to concentrate on border crossing points and entry points.
Similarly, deploying additional police officers nearby can also present many criminal threats
(Farrell, 2015).
The webpage "jacking", which was considered fantasy only a few years ago, is an effective way
to steal customer identities (Hay, Meldrum & Mann, 2010). In December 2003, the online
banking pages of the cloned Hong Kong, as well as Shanghai Banking firms, revealed an
unknown number of customer identities, illustrating this type of cyber theft. In the current
extreme risk situation, cybercriminals operating in failed or failed countries have contributed to
5
Document Page
CYBER-CRIME
the criminalization of world financial system by providing secure havens and plundering
resources (Huey, Nhan & Broll, 2012).
With the popularity of the Internet, cybercrime has developed rapidly, and e-commerce has
accelerated the development of the illicit market on the Internet, such as the Silk Road online
pharmaceutical market (Martin 2014). The rapid evolution of cybercrime proves the motto of
"crime follows opportunities." Because the connection range goes beyond the Internet of Things
(IoT), the electronic device network and its hosting so is cybercrime (Smith and Hutchings 2014)
for everyday Internet users. The Australian Cybersecurity Center's 2015 Threat Report highlights
the emergence of cybercrime as a service, introducing new business models for cybercriminals
and increasing their spread and complexity. FBI Cybercrime Prosecutor Gavin Corn observed an
increase in network connections between criminal groups (Miniwatts 2015). With new
vulnerabilities in social networking services, the combination of the Internet of Things and more
companies using social media will increase the scope and scale of cybercrime threat vectors.
This panel explores the ways in which criminology is increasing if belatedly, extending its
analysis into the digital realm. Using a new book series as a platform, the round table discusses a
range of these emergent fields of study and sets a challenge for scholars to involve themselves in
digital criminology(Saeb Kasm & Anne Alexander, 2018).
Themes explored include; Thinking Digital, Acting Global – understanding the analytical,
conceptual and territorial borders we need to overcome to comprehend crime and technology;
Rape Culture in Digital Society – discussing how in the age of seduction communities, incels,
image-based abuse, and networked misogyny, we are to understand and challenge rape culture in
digital society?; Simulated Policing – exploring the impact of digital technology in policing and
our understanding of police; The Digital Prisoner – How audio visual links are now prison
technologies as they are melded into the infrastructure of prisons, and firmly embedded into
penal policy, offender management and legal procedure.
This roundtable will take the form of brief introductions to each topic, followed by an inclusive
discussion between speakers and participants to stimulate further discussion on what has become
a key research topic for contemporary criminology(Taylor, 2006). Murray Lee is Professor of
Criminology at the University of Sydney. Murray's research focuses on the representation and
perception of crime and how they intersect with the criminal process. This includes increasing
6
Document Page
CYBER-CRIME
crime and crime control and new forms of media and communication that create new risks and
concerns about crime, as well as new forms of supervision, control, and management. His current
interests include fear of crime, cameras worn by police, police and the media, and youth and
crime prevention. Murray's latest work is "Lautlich International Fear Crime Handbook" (2018).
Anastasia Powell is Associate Professor of Criminology at RMIT University. Her research
explores the intersection of gender violence, technology, justice, and digital culture. In these
areas she has published a number of articles, including four books (including only co-authors):
Sex, Power and Consent (2010), Domestic Violence: Australian Public Policy (2012), Sexual
Violence in the Digital Age (2017), as well as Digital Criminology (2018); and a set of two
editors. Recent research by Anastasia examines technology-induced sexual violence, image-
based sexual abuse (commonly known as "revenge of pornography"), an online search for justice
or "digitization" and wider crime and justice research in the digital society. Technology
development has a direct impact on the functioning of the basic criminal justice system. A large
range of technologies is used to hold the justice system, counting phones, computers, cars,
database management software, and weapons. The adoption and deployment of technology also
directly affects judicial system policies and procedures. For example, the development of modern
communication and transport technologies in the early 20th century has increased the ability of
the police to respond and change the needs of citizens' services(Tsimperidis, Rostami & Katos,
2017). Computer and mobile technologies increase data processing, information sharing, and
communication skills crossways organizations and across organizations. More and more, reliance
on the Internet and computer-mediated interactions have led law enforcement agencies to
develop online crime investigation tools. Although most researchers focal point on the execution
and efficiency of technology in law enforcement, technology plays a key role in the impartiality
system (Costopoulos, 2016).
Conclusion
The analysis concludes that the emergence of digital technology is impacted by the
criminal justice issue. The emergence of technology and transforming the real world into the
digital world has led to cyber threats that could impact the users severely. The above report
discussed the digital society and the digital criminology those are the major concern for this
digital world. The cybercrimes are impacting the global digital world. Considering this term, the
above report also discussed the social, political, and cultural influences based on digital
7

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER-CRIME
terminology. The final, conclusion can be drawn in this sector that the cyber-threats could
possibly impact the Australian digital community severely and criminal justice needs to be
advanced and upgraded for managing these threats, providing the community best approaches for
the application of digital technology. The advancement and progressiveness are required in the
criminal justice approach for managing the digital application and minimizing the threats for the
users who are using the technology to the extent level.
8
Document Page
CYBER-CRIME
References
Anita R. Gohdes. (2018). Reflections on Digital Technologies, Repression, and Resistance:
Epilogue. State Crime Journal, 7(1), 141. doi: 10.13169/statecrime.7.1.0141
Biber, K. (2018). Dignity in the digital age: Broadcasting the Oscar Pistorius trial. Crime, Media,
Culture: An International Journal, 174165901878019. doi: 10.1177/1741659018780191
Biber, K. (2018). Dignity in the digital age: Broadcasting the Oscar Pistorius trial. Crime, Media,
Culture: An International Journal, 174165901878019. doi: 10.1177/1741659018780191
Costopoulos, A. (2016). Digital Archeology Is Here (and Has Been for a While). Frontiers In
Digital Humanities, 3.
Hartjen, C. (2008). Youth, crime, and justice. New Brunswick, N.J.: Rutgers University Press.
Farrell, G. (2015). Attempted Crime and the Crime Drop. International Criminal Justice Review,
26(1), 21-30.
Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the
general public in policing cyber-crime. Criminology & Criminal Justice, 13(1), 81-97.
Hay, C., Meldrum, R., & Mann, K. (2010). Traditional Bullying, Cyber Bullying, and Deviance:
A General Strain Theory Approach. Journal Of Contemporary Criminal Justice, 26(2),
130-147.
Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the
general public in policing cyber-crime. Criminology & Criminal Justice, 13(1), 81-97.
Jones, R. (2003). Crime in the Digital Age. International Journal Of Law And Information
Technology, 11(1), 98-100. doi: 10.1093/ijlit/11.1.98
Lavorgna, A. (2014). Wildlife trafficking in the Internet age. Crime Science, 3(1). doi:
10.1186/s40163-014-0005-2
Liu, Z. (2017). A Cyber Crime Investigation Model Based on Case Characteristics. International
Journal Of Digital Crime And Forensics, 9(4), 40-47.
Pantea, S., & Martens, B. (2013). Has the Digital Divide Been Reversed? Evidence from Five
EU Countries. SSRN Electronic Journal. doi: 10.2139/ssrn.2265274
Saeb Kasm, & Anne Alexander. (2018). State Crime and Digital Resistance: Introduction. State
Crime Journal, 7(1), 4. doi: 10.13169/statecrime.7.1.0004
9
Document Page
CYBER-CRIME
Travers, M., Putt, J., & Howard-Wagner, D. (2013). Special Issue on Ethnography, Crime and
Criminal Justice. Current Issues In Criminal Justice, 25(1), 463-469.
Taylor, R. (2006). Digital crime and digital terrorism. Upper Saddle River, N.J.:
Pearson/Prentice Hall.
Tsimperidis, I., Rostami, S., & Katos, V. (2017). Age Detection Through Keystroke Dynamics
from User Authentication Failures. International Journal Of Digital Crime And
Forensics, 9(1), 1-16. doi: 10.4018/ijdcf.2017010101
Walters, G. (2013). Introduction to the special issue: Psychology of crime. Journal Of Criminal
Justice, 41(2), 61-63.
Wagner, C. (2012). From Boom to Bust: How Different Has Microfinance Been from Traditional
Banking?. Development Policy Review, 30(2), 187-210.
10
1 out of 10
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]