Cyber Crimes: Impact, Classification, and Fight Against It
VerifiedAdded on 2023/06/16
|13
|3500
|396
AI Summary
This paper discusses the impact, classification, and fight against cyber crimes. It covers the causes and impacts of cyber crimes, major issues in cyber security, and the fight against cyber crimes. The paper emphasizes the need for awareness and knowledge in the public and effective implementation of policies for cyber security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: cyber crimes
Cyber crimes
Cyber crimes
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cyber-crimes 1
Contents
Cyber-crime................................................................................................................................2
Abstract......................................................................................................................................2
Introduction................................................................................................................................3
Classification of the cyber-crime...............................................................................................3
Factors of cyber-crime...............................................................................................................5
Social and economic Impact of cyber-crime..............................................................................6
Major issues of cyber-crime and cyber security........................................................................7
The fight against cyber-crime....................................................................................................8
Conclusion..................................................................................................................................9
Reference..................................................................................................................................11
Contents
Cyber-crime................................................................................................................................2
Abstract......................................................................................................................................2
Introduction................................................................................................................................3
Classification of the cyber-crime...............................................................................................3
Factors of cyber-crime...............................................................................................................5
Social and economic Impact of cyber-crime..............................................................................6
Major issues of cyber-crime and cyber security........................................................................7
The fight against cyber-crime....................................................................................................8
Conclusion..................................................................................................................................9
Reference..................................................................................................................................11
Cyber-crimes 2
Cyber-crime
Abstract
In the present advanced technological era, cyber-crime is emerging as a serious threat to
individual and nation. The crime explore by the internet services where accused of cyber-
crime attack victim mentally through online services in order to accomplish its criminal
motive. The consequences of the cyber-crime affects directly to the society due to its
detrimental perception made towards any particular individual or any country at large.
The present paper focuses on the general idea about the cyber-crime and its impact in order to
establish the awareness and knowledge in a public. The cyber-crime deals with several causes
and impacts which risen the internet. The issues of cyber-crime are discussed so that
activities can be ascertained of the cybercriminals. The recent developments of the cyber-
crime are also traced in the organisational assets.
Some of the highlighting cyber-crimes are hacking, spoofing, phishing, internet fraud, online
harassment and cyber terrorism. The nature of such cyber-crimes creates a serious extortion
or threatening on every individual or user of the visual world. There is constant pressure or
threat surrounded in the cyber world due to such existing crimes (Reyes et.al, 2011).
Thus, the paper suggests that there is an urgent need to curb the online malpractices for a
purpose to remove the roots of the cyber-crimes. Such visual crime activities can be removed
only by the effective implementation of policies or scheme in favour of cyber security. The
strong requisition of cyber security is a boon to eliminate the adverse methods of cyber-
crime. The government and legislation plays an affirmative role to protect the zone of cyber
world and remove completely the evil practice of cyber-crimes.
Cyber-crime
Abstract
In the present advanced technological era, cyber-crime is emerging as a serious threat to
individual and nation. The crime explore by the internet services where accused of cyber-
crime attack victim mentally through online services in order to accomplish its criminal
motive. The consequences of the cyber-crime affects directly to the society due to its
detrimental perception made towards any particular individual or any country at large.
The present paper focuses on the general idea about the cyber-crime and its impact in order to
establish the awareness and knowledge in a public. The cyber-crime deals with several causes
and impacts which risen the internet. The issues of cyber-crime are discussed so that
activities can be ascertained of the cybercriminals. The recent developments of the cyber-
crime are also traced in the organisational assets.
Some of the highlighting cyber-crimes are hacking, spoofing, phishing, internet fraud, online
harassment and cyber terrorism. The nature of such cyber-crimes creates a serious extortion
or threatening on every individual or user of the visual world. There is constant pressure or
threat surrounded in the cyber world due to such existing crimes (Reyes et.al, 2011).
Thus, the paper suggests that there is an urgent need to curb the online malpractices for a
purpose to remove the roots of the cyber-crimes. Such visual crime activities can be removed
only by the effective implementation of policies or scheme in favour of cyber security. The
strong requisition of cyber security is a boon to eliminate the adverse methods of cyber-
crime. The government and legislation plays an affirmative role to protect the zone of cyber
world and remove completely the evil practice of cyber-crimes.
Cyber-crimes 3
Introduction
The concept of “cyber-crime “describe as an online criminal activity introduced by any
cybercriminal through the network or devices of any computer. For instance-the activities of
cyber-crime include any unauthorized entry or access of stranger without the consent of
original user where any illegal or unlawful interference takes place (Wall, 2007).
A term “cyber-crime” is defined as online criminal activities took place either targeting a
computer networks or devices of any individual. The computer networks or devices of an
individual are target by any malware or malicious code or spam, denial of service (Dos)
attack and any introduction of viruses in the computer (Anderson et.al. 2013).
The cyber-crime introduced in the early years of 1990s when the cyber world was developing
and adopting new techniques. Such advanced development in the information technology
emerged the introduction of the “cyber-crime”. The past reports by the IT experts stated that
the year 1992 recorded the history of cyber-crime. Currently, the report of cyber-crimes, 2016
specifies the high rate of commission of cyber-crimes approximately in 21.5 to 28.9 per cent
in the developed countries like United States and other European countries (Kshetri, 2009).
The cyber-crime is a serious threatening issue where not only credentials of individual affects
but the trap continues to the big units or bodies of the nation only for purposes to accomplish
the evil or criminal motive and illegal profits out of it. Such increasing level in the cyber-
crime increases on numerous causes or factors which is able to provide deep impacts on
societal or economical elements (Burden & Palmer, 2009).
Classification of the cyber-crime
There are number of ways by which the security and privacy can be compromised (Pinguelo
& Muller, 2011). The classification of the cyber-crime is as follows:
Introduction
The concept of “cyber-crime “describe as an online criminal activity introduced by any
cybercriminal through the network or devices of any computer. For instance-the activities of
cyber-crime include any unauthorized entry or access of stranger without the consent of
original user where any illegal or unlawful interference takes place (Wall, 2007).
A term “cyber-crime” is defined as online criminal activities took place either targeting a
computer networks or devices of any individual. The computer networks or devices of an
individual are target by any malware or malicious code or spam, denial of service (Dos)
attack and any introduction of viruses in the computer (Anderson et.al. 2013).
The cyber-crime introduced in the early years of 1990s when the cyber world was developing
and adopting new techniques. Such advanced development in the information technology
emerged the introduction of the “cyber-crime”. The past reports by the IT experts stated that
the year 1992 recorded the history of cyber-crime. Currently, the report of cyber-crimes, 2016
specifies the high rate of commission of cyber-crimes approximately in 21.5 to 28.9 per cent
in the developed countries like United States and other European countries (Kshetri, 2009).
The cyber-crime is a serious threatening issue where not only credentials of individual affects
but the trap continues to the big units or bodies of the nation only for purposes to accomplish
the evil or criminal motive and illegal profits out of it. Such increasing level in the cyber-
crime increases on numerous causes or factors which is able to provide deep impacts on
societal or economical elements (Burden & Palmer, 2009).
Classification of the cyber-crime
There are number of ways by which the security and privacy can be compromised (Pinguelo
& Muller, 2011). The classification of the cyber-crime is as follows:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cyber-crimes 4
Hacking: a criminal act committed by unauthorised intruder to access the restricted
zone of the original user.
Distribution of virus- virus is computer software attaches the infected files in the
computer system by entry of “hybrid worms” in it.
Introduction of slag codes- a malicious code inserted intentionally into computer
software to delete the credential information or data of the user.
Dos attack- an intentional attempt to deny service of the original user by the attackers
in order to consume their secured data.
Phishing- an offence to extract the online credential data of the users through their
debit or credit card details. Such online theft technique is used for the purposes to
unlawfully acquire monetary benefits of the original user.
Electronic bombing and spamming- sending of enormous or in bulks of mails to the
original user to target his network resources of the computer.
Web jacking- it is often called as “online hi jacking”. In this technique cybercriminal
change the original content of the website into fake web page.
Stalking- a new form of criminal offence is highlighting nowadays. Stalking refers as
an online harassment to the victim by following every moment of such victim.
Data diddling- a new technique which is used to alter the original data of the user
without his consent through the introduction of virus.
Software piracy- a method to store the restricted by an unauthorised concealment of it.
Such piracy is famous in the copying of any movies, songs or entertainment stuffs.
Online fraud- a fraud takes place with a help of internet facilities. Such fraud includes
fraudulent online transactions.
Online harassment- the cybercriminals harasses the victims online through publishing
defamatory statements.
Hacking: a criminal act committed by unauthorised intruder to access the restricted
zone of the original user.
Distribution of virus- virus is computer software attaches the infected files in the
computer system by entry of “hybrid worms” in it.
Introduction of slag codes- a malicious code inserted intentionally into computer
software to delete the credential information or data of the user.
Dos attack- an intentional attempt to deny service of the original user by the attackers
in order to consume their secured data.
Phishing- an offence to extract the online credential data of the users through their
debit or credit card details. Such online theft technique is used for the purposes to
unlawfully acquire monetary benefits of the original user.
Electronic bombing and spamming- sending of enormous or in bulks of mails to the
original user to target his network resources of the computer.
Web jacking- it is often called as “online hi jacking”. In this technique cybercriminal
change the original content of the website into fake web page.
Stalking- a new form of criminal offence is highlighting nowadays. Stalking refers as
an online harassment to the victim by following every moment of such victim.
Data diddling- a new technique which is used to alter the original data of the user
without his consent through the introduction of virus.
Software piracy- a method to store the restricted by an unauthorised concealment of it.
Such piracy is famous in the copying of any movies, songs or entertainment stuffs.
Online fraud- a fraud takes place with a help of internet facilities. Such fraud includes
fraudulent online transactions.
Online harassment- the cybercriminals harasses the victims online through publishing
defamatory statements.
Cyber-crimes 5
Cyber defamation- when a cybercriminal publishes any defamatory statements for the
victims in order to defame his reputation.
Cyber terrorism- a most threatening criminal act in which terrorist of rivalry countries
threatens or destroys the nation’s official or censored data.
Factors of cyber-crime
Some of the dominating factors or causes evidence the high recording in the activities of
cyber-crime (Panda, 2012). These are as following:
Recognition-the cyber-crime are committed mainly by the young group of the society
who wants to hold centre position in their group. Young group are categorised as an
“idealist” who have a strong desire to capture the market with their fascinating image
or reputation. It is a psychological disorder where person get over self-obsessed by his
own personality.
Profits- the cyber-crime are also committed due to the earning profits by unlawful
means or methods where criminal commits such criminal activity with intent to earn
monetary profits out of it. Such profit earning takes place by the criminal activities
like online prostitution market, leaking of any victim’s obscene pictures, online
extortion etc.
Reprisal theory- the statistics of crime report states that the approximate 78 per cent of
criminal activities are committed with an intention of taking “revenge”. Such reprisal
theory attacks the sensitive or delicate credentials of victim. The common existence of
such reprisal theory exists in the group of youngsters.
Organizational causes- the criminal activities are highly traced in the big
organizations or firms where activities take place with intent to manipulate the rivals
Cyber defamation- when a cybercriminal publishes any defamatory statements for the
victims in order to defame his reputation.
Cyber terrorism- a most threatening criminal act in which terrorist of rivalry countries
threatens or destroys the nation’s official or censored data.
Factors of cyber-crime
Some of the dominating factors or causes evidence the high recording in the activities of
cyber-crime (Panda, 2012). These are as following:
Recognition-the cyber-crime are committed mainly by the young group of the society
who wants to hold centre position in their group. Young group are categorised as an
“idealist” who have a strong desire to capture the market with their fascinating image
or reputation. It is a psychological disorder where person get over self-obsessed by his
own personality.
Profits- the cyber-crime are also committed due to the earning profits by unlawful
means or methods where criminal commits such criminal activity with intent to earn
monetary profits out of it. Such profit earning takes place by the criminal activities
like online prostitution market, leaking of any victim’s obscene pictures, online
extortion etc.
Reprisal theory- the statistics of crime report states that the approximate 78 per cent of
criminal activities are committed with an intention of taking “revenge”. Such reprisal
theory attacks the sensitive or delicate credentials of victim. The common existence of
such reprisal theory exists in the group of youngsters.
Organizational causes- the criminal activities are highly traced in the big
organizations or firms where activities take place with intent to manipulate the rivals
Cyber-crimes 6
or their near competitors. Such organizations also commit such cyber-criminal
activities on an object to increase the assets or capitals.
Negligence- there is a lack of awareness among internet users that the storage of
credential information requires a strong passwords and implementation of security
methods. Such negligent conduct of the victim is a common cause of “cyber-crimes”.
Unlawful activism in cyber world- the cyber-crime is followed with a complete
intention to threaten the national security by the terrorists of the rivalry countries.
Thus, the cyber terrorism destroys the protected credential data of the nation.
Social and economic Impact of cyber-crime
It is a natural perception that “crime is an evil of the society” and such evil cannot be remove
in one day. The cyber-crime is also considered as an element of societal or economical evils.
The crime of the cyber world directly affecting the societal values where individual is not
safe and secured even in the visual world. The impacts of cyber-crime are directly affecting
the delicacy and sensitivity of one’s emotion.
The social impact remains worst till the positive reformation introduced in the cyber world.
Such reformation takes place with a aid of public at large. Thus, the participation of the
society can be reformative to curb the cyber-crimes. The social impacts are deadly injuring
every individual of the society. It is high time to justify the social impacts.
On the other side, the economic impact of cyber-crime is that nation’s economy is adversely
affecting due to illegal money online laundering and creates a downfall in the gross revenue
and capital of the nation. For instance- the national fiscal report of United States specified
that the almost 67 per cent of national capital and assets affected due to online economical
scams.
or their near competitors. Such organizations also commit such cyber-criminal
activities on an object to increase the assets or capitals.
Negligence- there is a lack of awareness among internet users that the storage of
credential information requires a strong passwords and implementation of security
methods. Such negligent conduct of the victim is a common cause of “cyber-crimes”.
Unlawful activism in cyber world- the cyber-crime is followed with a complete
intention to threaten the national security by the terrorists of the rivalry countries.
Thus, the cyber terrorism destroys the protected credential data of the nation.
Social and economic Impact of cyber-crime
It is a natural perception that “crime is an evil of the society” and such evil cannot be remove
in one day. The cyber-crime is also considered as an element of societal or economical evils.
The crime of the cyber world directly affecting the societal values where individual is not
safe and secured even in the visual world. The impacts of cyber-crime are directly affecting
the delicacy and sensitivity of one’s emotion.
The social impact remains worst till the positive reformation introduced in the cyber world.
Such reformation takes place with a aid of public at large. Thus, the participation of the
society can be reformative to curb the cyber-crimes. The social impacts are deadly injuring
every individual of the society. It is high time to justify the social impacts.
On the other side, the economic impact of cyber-crime is that nation’s economy is adversely
affecting due to illegal money online laundering and creates a downfall in the gross revenue
and capital of the nation. For instance- the national fiscal report of United States specified
that the almost 67 per cent of national capital and assets affected due to online economical
scams.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cyber-crimes 7
The economic impacts of the cyber-crime are so deteriorating in nature due to its weak
nations’ economy. The gross revenue of the nation plays a significant role in curbing the
cyber-crimes by introduction of the numerous affirmative policies. Such policies need a
sound sponsorship and funds of the nation for its practical application.
Major issues of cyber-crime and cyber security
There are several key issues of cyber-crime which address the threat to cyber security in
which some of the controversial issues are as following (Wang, 2007):
Breach in the standards of national official data- the official data of nation is one of
the significant data for national interest. There is urgent need to frame a strict and
systematic legislation to protect the nation’s restricted or confidential data.
Inefficiency in the proper implementation of legislation- there is an urgent need to
create uniform law in order to ensure practical effectiveness of legislation in favour of
cyber security.
Delay by the court- the pendency in the cyber matters and minor or unnoticed
remedies provided in context of cyber-crime. The courts must ensure the proper
effectiveness in the procedure.
Lacks of awareness for cyber threat- the cyber threat are still having lack of strong
awareness among the cyber users.
Urgent need to promote the public trust- the law institution must highlight the
significance of cyber security and cybercriminal activity must constrain with proper
investigation of the crime (Katos & Bednar, 2008).
The economic impacts of the cyber-crime are so deteriorating in nature due to its weak
nations’ economy. The gross revenue of the nation plays a significant role in curbing the
cyber-crimes by introduction of the numerous affirmative policies. Such policies need a
sound sponsorship and funds of the nation for its practical application.
Major issues of cyber-crime and cyber security
There are several key issues of cyber-crime which address the threat to cyber security in
which some of the controversial issues are as following (Wang, 2007):
Breach in the standards of national official data- the official data of nation is one of
the significant data for national interest. There is urgent need to frame a strict and
systematic legislation to protect the nation’s restricted or confidential data.
Inefficiency in the proper implementation of legislation- there is an urgent need to
create uniform law in order to ensure practical effectiveness of legislation in favour of
cyber security.
Delay by the court- the pendency in the cyber matters and minor or unnoticed
remedies provided in context of cyber-crime. The courts must ensure the proper
effectiveness in the procedure.
Lacks of awareness for cyber threat- the cyber threat are still having lack of strong
awareness among the cyber users.
Urgent need to promote the public trust- the law institution must highlight the
significance of cyber security and cybercriminal activity must constrain with proper
investigation of the crime (Katos & Bednar, 2008).
Cyber-crimes 8
The fight against cyber-crime
Above stated ingredients or elements are able to provide clear explanation to the threats of
cyber-crime. The vision of cyber-crime is still so hostile in nature that every visual user and
nation must fight together. The measures of the fight by the government and individual
should ensure the proper eradication of the cyber-crime (Levi, 2008).
The fight must start from the grass root level that is from every individuals home and highest
root level must be ascertained by the every nation’s government. One must understand the
consequences of the cyber-crime at its own perception (Turrini, 2010). For instance- users
must follow strong security techniques, should not access or reply to any spam or trash inbox,
should not be negligent in storing personal information without strong password etc. On the
other hand, the government should ensure the effective and sound policies or schemes over
cyber security (Koops, 2010).
The advanced crime like Cyber-crime must be handling with proper cautious attitude. The
fighting measures must apply the proper awareness and knowledge of the information
technology sector (Yar, 2013). The IT experts’ session and regular conferences must be
promoted in order to widespread the knowledge about the cyber-crime. The law bodies must
frame a sound and structured form for cyber-crime to tackle effectively entire procedure of
cyber-crime (Choo, 2011).
Hence, the fight against cyber-crimes remains inactive or inefficient unless strong
participation and awareness among every individual or visual users of the nation. It is
stressed that roots of cyber-crime are so detrimental or severe that lead to deadly result or
consequences. Such deadly consequences must be realised at a highest priority by both
government and every individual of the nation (Mathew, Al Hajj and Al Ruqeishi, 2010).
The fight against cyber-crime
Above stated ingredients or elements are able to provide clear explanation to the threats of
cyber-crime. The vision of cyber-crime is still so hostile in nature that every visual user and
nation must fight together. The measures of the fight by the government and individual
should ensure the proper eradication of the cyber-crime (Levi, 2008).
The fight must start from the grass root level that is from every individuals home and highest
root level must be ascertained by the every nation’s government. One must understand the
consequences of the cyber-crime at its own perception (Turrini, 2010). For instance- users
must follow strong security techniques, should not access or reply to any spam or trash inbox,
should not be negligent in storing personal information without strong password etc. On the
other hand, the government should ensure the effective and sound policies or schemes over
cyber security (Koops, 2010).
The advanced crime like Cyber-crime must be handling with proper cautious attitude. The
fighting measures must apply the proper awareness and knowledge of the information
technology sector (Yar, 2013). The IT experts’ session and regular conferences must be
promoted in order to widespread the knowledge about the cyber-crime. The law bodies must
frame a sound and structured form for cyber-crime to tackle effectively entire procedure of
cyber-crime (Choo, 2011).
Hence, the fight against cyber-crimes remains inactive or inefficient unless strong
participation and awareness among every individual or visual users of the nation. It is
stressed that roots of cyber-crime are so detrimental or severe that lead to deadly result or
consequences. Such deadly consequences must be realised at a highest priority by both
government and every individual of the nation (Mathew, Al Hajj and Al Ruqeishi, 2010).
Cyber-crimes 9
Conclusion
The paper concludes that the present moment is threatening in the cyber world due to
development of cyber-crime. The security in the Cyber world is a significant characteristic to
safeguard a virtual statistics or records from objectionable intrusions. The cyber-attacks in
present period are a common issue because it is exposing a real criminal intimidation in the
authorized or sanctioned data of an official administration as well credential data of an
individual. The above research analysis states the significance of the cyber security and
responds that the cyber-crime is simply not safe in present time. Hence, its effective or
productive strategies can defend the forthcoming generation of the cyber world.
The increasing level in the threat of cyber offences requires to be censored down by its
origins. The best illustration is that the cyber-criminal investigation implements the
affirmative procedures through the strict norms of legislature assistance. The main object of
cyber investigation law mainly concern with an inquiry of all basic or minute movement of
any cybercriminal in order to establish complete protection of user’s credential online
information. It provides a practical execution of proper standardisation and monitoring of
various online protocols to curb the existence factors of threats in cyber world (Jewkes,
2013).
Moreover, In spite of many affirmative reforms or procedure in the context of cyber-crime,
the existing strategies and policies are unfortunately does not implement properly in present
time. Still, there is a lack of affirmative measures to secure the cyber world. The affirmative
measures should not contain any illusory picture of cyber security. It must implement such
strategy which safeguards every minute details of the user (Britz, 2009). It is important to
take an effective measure so that a users’ faith can be develop again. The unique and sound
implementation of securing cyber world must be widespread awareness. Such
Conclusion
The paper concludes that the present moment is threatening in the cyber world due to
development of cyber-crime. The security in the Cyber world is a significant characteristic to
safeguard a virtual statistics or records from objectionable intrusions. The cyber-attacks in
present period are a common issue because it is exposing a real criminal intimidation in the
authorized or sanctioned data of an official administration as well credential data of an
individual. The above research analysis states the significance of the cyber security and
responds that the cyber-crime is simply not safe in present time. Hence, its effective or
productive strategies can defend the forthcoming generation of the cyber world.
The increasing level in the threat of cyber offences requires to be censored down by its
origins. The best illustration is that the cyber-criminal investigation implements the
affirmative procedures through the strict norms of legislature assistance. The main object of
cyber investigation law mainly concern with an inquiry of all basic or minute movement of
any cybercriminal in order to establish complete protection of user’s credential online
information. It provides a practical execution of proper standardisation and monitoring of
various online protocols to curb the existence factors of threats in cyber world (Jewkes,
2013).
Moreover, In spite of many affirmative reforms or procedure in the context of cyber-crime,
the existing strategies and policies are unfortunately does not implement properly in present
time. Still, there is a lack of affirmative measures to secure the cyber world. The affirmative
measures should not contain any illusory picture of cyber security. It must implement such
strategy which safeguards every minute details of the user (Britz, 2009). It is important to
take an effective measure so that a users’ faith can be develop again. The unique and sound
implementation of securing cyber world must be widespread awareness. Such
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cyber-crimes 10
implementation should include user’s own fingerprinting or eye balls identifications. Hence,
it is a vital step to target on highly systematic and secured data over cyber world.
The future needs complete assurance to combat the increasing level of cyber-crime. It is high
time to tackle the threatening effect of cyber-crimes. It is also evident that undesirable growth
and expansion is creating a worst impact on sovereignty and integrity of the nation. Even the
societal and economic growth of the cyber-crimes is more detrimental or severe in nature.
In the context of present paper, the clear fact is that cybercriminals are active only because
the unorganised system of law and justice. The law and justice are the two strong pillars to
combat the expansion of cyber-crimes (Broadhurst, 2008). Hence, there is urgent need to
adopt preventive measures or policies and must apply the principle of strict liability in the
case of cyber-crime matters.
Out styled, rigid and weak frame of the international legislation is a one of the major cause of
expansion in cyber-crimes. There is a high need for adoption of strong international
legislation in order to remove the grass roots of cyber terrorism. The cyber terrorism and
cyber warfare plays a major threatening or coercive role in creating internal and external
disturbances in the nation due to political intrusions (Shin, 2011).
The safe future of the cyber world lies within the individuals through the proper
implementation of cyber-crimes effective and productive techniques. However, the issue is
that who shall be holding ultimate responsibility. The response to the issue can be that every
individual must hold self-responsibility so that future can be safeguarded. Therefore, the
present and future of the cyber security must be take care by the government. The current
worst state of cyber-crime must be eliminated by proper evaluation of its effects (Taylor,
Fritsch & Liederbach, 2014).
implementation should include user’s own fingerprinting or eye balls identifications. Hence,
it is a vital step to target on highly systematic and secured data over cyber world.
The future needs complete assurance to combat the increasing level of cyber-crime. It is high
time to tackle the threatening effect of cyber-crimes. It is also evident that undesirable growth
and expansion is creating a worst impact on sovereignty and integrity of the nation. Even the
societal and economic growth of the cyber-crimes is more detrimental or severe in nature.
In the context of present paper, the clear fact is that cybercriminals are active only because
the unorganised system of law and justice. The law and justice are the two strong pillars to
combat the expansion of cyber-crimes (Broadhurst, 2008). Hence, there is urgent need to
adopt preventive measures or policies and must apply the principle of strict liability in the
case of cyber-crime matters.
Out styled, rigid and weak frame of the international legislation is a one of the major cause of
expansion in cyber-crimes. There is a high need for adoption of strong international
legislation in order to remove the grass roots of cyber terrorism. The cyber terrorism and
cyber warfare plays a major threatening or coercive role in creating internal and external
disturbances in the nation due to political intrusions (Shin, 2011).
The safe future of the cyber world lies within the individuals through the proper
implementation of cyber-crimes effective and productive techniques. However, the issue is
that who shall be holding ultimate responsibility. The response to the issue can be that every
individual must hold self-responsibility so that future can be safeguarded. Therefore, the
present and future of the cyber security must be take care by the government. The current
worst state of cyber-crime must be eliminated by proper evaluation of its effects (Taylor,
Fritsch & Liederbach, 2014).
Cyber-crimes 11
Reference
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... &
Savage, S. (2013). Measuring the cost of cybercrime. In The economics of information
security and privacy (pp. 265-300). Springer Berlin Heidelberg.
Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson
Education India.
Broadhurst, R. (2008). Developments in the global law enforcement of cyber-
crime. Policing: An International Journal of Police Strategies & Management, 29(3),
408-433.
Burden, K., & Palmer, C. (2009). Internet crime: Cyber Crime—A new breed of
criminal. Computer Law & Security Review, 19(3), 222-227.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), 719-731.
Jewkes, Y. (Ed.). (2013). Crime online. Routledge.
Katos, V., & Bednar, P. M. (2008). A cyber-crime investigation framework. Computer
Standards & Interfaces, 30(4), 223-228.
Koops, B. J. (2010). The internet and its opportunities for cybercrime.
Kshetri, N. (2009). Positive externality, increasing returns, and the rise in
cybercrimes. Communications of the ACM, 52(12), 141-144.
Levi, M. (2008). White-collar, organised and cyber crimes in the media: some contrasts
and similarities. Crime, Law and Social Change, 49(5), 365-377.
Reference
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... &
Savage, S. (2013). Measuring the cost of cybercrime. In The economics of information
security and privacy (pp. 265-300). Springer Berlin Heidelberg.
Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson
Education India.
Broadhurst, R. (2008). Developments in the global law enforcement of cyber-
crime. Policing: An International Journal of Police Strategies & Management, 29(3),
408-433.
Burden, K., & Palmer, C. (2009). Internet crime: Cyber Crime—A new breed of
criminal. Computer Law & Security Review, 19(3), 222-227.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), 719-731.
Jewkes, Y. (Ed.). (2013). Crime online. Routledge.
Katos, V., & Bednar, P. M. (2008). A cyber-crime investigation framework. Computer
Standards & Interfaces, 30(4), 223-228.
Koops, B. J. (2010). The internet and its opportunities for cybercrime.
Kshetri, N. (2009). Positive externality, increasing returns, and the rise in
cybercrimes. Communications of the ACM, 52(12), 141-144.
Levi, M. (2008). White-collar, organised and cyber crimes in the media: some contrasts
and similarities. Crime, Law and Social Change, 49(5), 365-377.
Cyber-crimes 12
Mathew, A. R., Al Hajj, A., & Al Ruqeishi, K. (2010, June). Cyber crimes: Threats and
protection. In Networking and Information Technology (ICNIT), 2010 International
Conference on (pp. 16-18). IEEE.
Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of
Engineering Research and Applications, 2(2), 202-9.
Pinguelo, F. M., & Muller, B. W. (2011). Virtual crimes–real damages: A primer on
cybercrimes in the united states and efforts to combat cybercriminals.
Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). Cyber crime investigations:
bridging the gaps between security professionals, law enforcement, and prosecutors.
Syngress.
Shin, Y. D. (2011). New Model for cyber crime investigation procedure. Journal of Next
Generation Information Technology. Volume, 2(2).
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
Turrini, E. (Eds.). (2010). Cybercrimes: a multidisciplinary analysis. Springer Science &
Business Media.
Wall, D. S. (2007). Cybercrimes and the Internet. Crime and the Internet, 1-17.
Wang, S. J. (2007). Measures of retaining digital evidence to prosecute computer-based
cyber-crimes. Computer Standards & Interfaces, 29(2), 216-223.
Yar, M. (2013). Cybercrime and society. Sage.
Mathew, A. R., Al Hajj, A., & Al Ruqeishi, K. (2010, June). Cyber crimes: Threats and
protection. In Networking and Information Technology (ICNIT), 2010 International
Conference on (pp. 16-18). IEEE.
Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of
Engineering Research and Applications, 2(2), 202-9.
Pinguelo, F. M., & Muller, B. W. (2011). Virtual crimes–real damages: A primer on
cybercrimes in the united states and efforts to combat cybercriminals.
Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). Cyber crime investigations:
bridging the gaps between security professionals, law enforcement, and prosecutors.
Syngress.
Shin, Y. D. (2011). New Model for cyber crime investigation procedure. Journal of Next
Generation Information Technology. Volume, 2(2).
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
Turrini, E. (Eds.). (2010). Cybercrimes: a multidisciplinary analysis. Springer Science &
Business Media.
Wall, D. S. (2007). Cybercrimes and the Internet. Crime and the Internet, 1-17.
Wang, S. J. (2007). Measures of retaining digital evidence to prosecute computer-based
cyber-crimes. Computer Standards & Interfaces, 29(2), 216-223.
Yar, M. (2013). Cybercrime and society. Sage.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.