logo

Understanding Cyber Crime: Motivations and Effects

   

Added on  2023-01-12

14 Pages4146 Words62 Views
Cyber crime
Understanding Cyber Crime: Motivations and Effects_1
Understanding Cyber Crime: Motivations and Effects_2
INTRODUCTION
Cybercrime is an illegal act in which the "computer" is used as a tool or target or both. These
days "cyber crime" is the latest and fastest growing area of crime. Like other countries, the
incidence of cyber crime in UK is increasing day by day. This article describes cyber crime and
its spread, cyber law and the major measures taken by the government to prevent it. These
criminals are mainly involved in various criminal activities by taking advantage of internet
speed, convenience and anonymity and exploiting people around the world by making them their
victims. The crimes committed by them include phishing, credit card and debit card related
fraud, bank robbery, illegal downloading, child pornography and distribution of viruses. This
project report consists of understanding of cybercrime theory explanation about the reason
behind commitment of such crimes by individuals. The comparison of current theory with other
theoretical aspect will support report analysis in identifying common between theories of all
author.
Understanding Cyber Crime: Motivations and Effects_3
Why individuals may commit cybercrime
The growth of cybercrime continues and is now quite coordinated. Cybercrime continues. As
with all the emerging markets, suppliers in the cyber crime industry have expanded their offer to
cover a variety of activities. They have become a big business (Manky, D., 2013).
Cybercrime has grown into a complicated, tightly structured system of officials, developers,
soldiers and hired money mules, and the Cybercrime as a service (CaaS) dictionary has been
launched in another troubling paragraph. Derek Manky from Forti Guard Labs explores how the
world of cybercrime has become a major business. It is important to briefly recall its history in
any discussion of cybercrime and its development. Of reality there's nothing new about
cybercrime. Since the early days of mobile computerization, citizens have been researching and
searching for ways to exploit such devices for their own gain, but mostly for free calls. With
increasing integration of computerization into more life areas, cybercrime has developed parallel,
driven by those who are prepared to break the system over the hours. Certain authors and
commentators are currently experiencing full organized cybercrime. Law enforcement and
internet protection spokespeople have also contrasted the system of cyber offenders with
organisations such as La Cosa Nostra. But, in reality, those that use them sometimes lack
traditional criminal labels used by cyber-crime themselves. This report attempts at researching
rigorously how profit-driven cybercrime would fit into the traditional concepts of organized
crime and mafia (Lusthaus, J., 2013).
With the speed at which technology has progressed, at the same speed, human dependence on
internet has also increased. By sitting in one place, the access of human beings through the
Internet has become easier to every corner of the world. In today's time, everything that a person
can think about, can be accessed through the Internet, such as social networking, online
shopping, storing data, gaming, online study, online jobs, etc (Wall, 2007). Such crimes include
cyber extortion, identity theft, credit card fraud, hacking of personal data from computers,
phishing, illegal downloading, cyber stalking, virus propagation, and so on. It is to be noted that
software theft is also a form of cyber crime, in which it is not necessary that the cyber criminal
commit the crime through online portal. Cybercrime can be classified in two ways: Offenses in
which computers are attacked. Examples of such crimes are hacking, virus attacks, DOS attacks,
Understanding Cyber Crime: Motivations and Effects_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Essay about Cybercrime 2022
|6
|2154
|25

Cyber Terrorism: Is Sri Lanka Ready?
|53
|15191
|297

Review of Fraud in the Banking Industry in Australia
|12
|3708
|15

Cybercrime and Security TABLE OF CONTENTS
|8
|2653
|441

Cybercrime: Types, Prevention, and Impact
|12
|732
|28

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87