Understanding Cyber Crime: Motivations and Effects
Added on 2023-01-12
14 Pages4146 Words62 Views
Cyber crime
INTRODUCTION
Cybercrime is an illegal act in which the "computer" is used as a tool or target or both. These
days "cyber crime" is the latest and fastest growing area of crime. Like other countries, the
incidence of cyber crime in UK is increasing day by day. This article describes cyber crime and
its spread, cyber law and the major measures taken by the government to prevent it. These
criminals are mainly involved in various criminal activities by taking advantage of internet
speed, convenience and anonymity and exploiting people around the world by making them their
victims. The crimes committed by them include phishing, credit card and debit card related
fraud, bank robbery, illegal downloading, child pornography and distribution of viruses. This
project report consists of understanding of cybercrime theory explanation about the reason
behind commitment of such crimes by individuals. The comparison of current theory with other
theoretical aspect will support report analysis in identifying common between theories of all
author.
Cybercrime is an illegal act in which the "computer" is used as a tool or target or both. These
days "cyber crime" is the latest and fastest growing area of crime. Like other countries, the
incidence of cyber crime in UK is increasing day by day. This article describes cyber crime and
its spread, cyber law and the major measures taken by the government to prevent it. These
criminals are mainly involved in various criminal activities by taking advantage of internet
speed, convenience and anonymity and exploiting people around the world by making them their
victims. The crimes committed by them include phishing, credit card and debit card related
fraud, bank robbery, illegal downloading, child pornography and distribution of viruses. This
project report consists of understanding of cybercrime theory explanation about the reason
behind commitment of such crimes by individuals. The comparison of current theory with other
theoretical aspect will support report analysis in identifying common between theories of all
author.
Why individuals may commit cybercrime
The growth of cybercrime continues and is now quite coordinated. Cybercrime continues. As
with all the emerging markets, suppliers in the cyber crime industry have expanded their offer to
cover a variety of activities. They have become a big business (Manky, D., 2013).
Cybercrime has grown into a complicated, tightly structured system of officials, developers,
soldiers and hired money mules, and the Cybercrime as a service (CaaS) dictionary has been
launched in another troubling paragraph. Derek Manky from Forti Guard Labs explores how the
world of cybercrime has become a major business. It is important to briefly recall its history in
any discussion of cybercrime and its development. Of reality there's nothing new about
cybercrime. Since the early days of mobile computerization, citizens have been researching and
searching for ways to exploit such devices for their own gain, but mostly for free calls. With
increasing integration of computerization into more life areas, cybercrime has developed parallel,
driven by those who are prepared to break the system over the hours. Certain authors and
commentators are currently experiencing full organized cybercrime. Law enforcement and
internet protection spokespeople have also contrasted the system of cyber offenders with
organisations such as La Cosa Nostra. But, in reality, those that use them sometimes lack
traditional criminal labels used by cyber-crime themselves. This report attempts at researching
rigorously how profit-driven cybercrime would fit into the traditional concepts of organized
crime and mafia (Lusthaus, J., 2013).
With the speed at which technology has progressed, at the same speed, human dependence on
internet has also increased. By sitting in one place, the access of human beings through the
Internet has become easier to every corner of the world. In today's time, everything that a person
can think about, can be accessed through the Internet, such as social networking, online
shopping, storing data, gaming, online study, online jobs, etc (Wall, 2007). Such crimes include
cyber extortion, identity theft, credit card fraud, hacking of personal data from computers,
phishing, illegal downloading, cyber stalking, virus propagation, and so on. It is to be noted that
software theft is also a form of cyber crime, in which it is not necessary that the cyber criminal
commit the crime through online portal. Cybercrime can be classified in two ways: Offenses in
which computers are attacked. Examples of such crimes are hacking, virus attacks, DOS attacks,
The growth of cybercrime continues and is now quite coordinated. Cybercrime continues. As
with all the emerging markets, suppliers in the cyber crime industry have expanded their offer to
cover a variety of activities. They have become a big business (Manky, D., 2013).
Cybercrime has grown into a complicated, tightly structured system of officials, developers,
soldiers and hired money mules, and the Cybercrime as a service (CaaS) dictionary has been
launched in another troubling paragraph. Derek Manky from Forti Guard Labs explores how the
world of cybercrime has become a major business. It is important to briefly recall its history in
any discussion of cybercrime and its development. Of reality there's nothing new about
cybercrime. Since the early days of mobile computerization, citizens have been researching and
searching for ways to exploit such devices for their own gain, but mostly for free calls. With
increasing integration of computerization into more life areas, cybercrime has developed parallel,
driven by those who are prepared to break the system over the hours. Certain authors and
commentators are currently experiencing full organized cybercrime. Law enforcement and
internet protection spokespeople have also contrasted the system of cyber offenders with
organisations such as La Cosa Nostra. But, in reality, those that use them sometimes lack
traditional criminal labels used by cyber-crime themselves. This report attempts at researching
rigorously how profit-driven cybercrime would fit into the traditional concepts of organized
crime and mafia (Lusthaus, J., 2013).
With the speed at which technology has progressed, at the same speed, human dependence on
internet has also increased. By sitting in one place, the access of human beings through the
Internet has become easier to every corner of the world. In today's time, everything that a person
can think about, can be accessed through the Internet, such as social networking, online
shopping, storing data, gaming, online study, online jobs, etc (Wall, 2007). Such crimes include
cyber extortion, identity theft, credit card fraud, hacking of personal data from computers,
phishing, illegal downloading, cyber stalking, virus propagation, and so on. It is to be noted that
software theft is also a form of cyber crime, in which it is not necessary that the cyber criminal
commit the crime through online portal. Cybercrime can be classified in two ways: Offenses in
which computers are attacked. Examples of such crimes are hacking, virus attacks, DOS attacks,
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Essay about Cybercrime 2022lg...
|6
|2154
|25
Cyber Terrorism: Is Sri Lanka Ready?lg...
|53
|15191
|297
Review of Fraud in the Banking Industry in Australialg...
|12
|3708
|15
Cybercrime and Security TABLE OF CONTENTSlg...
|8
|2653
|441
Cybercrime: Types, Prevention, and Impactlg...
|12
|732
|28
Cyberspace Laws in Fiji: Strengths and Weaknesseslg...
|11
|3028
|87