logo

Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes

11 Pages3420 Words335 Views
   

Added on  2023-05-30

About This Document

This essay discusses the rising issue of cybercrime and the different types of cyber-dependent and cyber-enabled crimes. It also examines the response of police authorities to these crimes and ways to improve their responses. The essay emphasizes the need for co-creation and big data logical abilities for effective strategies and policies.

Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes

   Added on 2023-05-30

ShareRelated Documents
Running head: ESSAY 0
CRIMINOLOGY
Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes_1
ESSAY 1
In the present time, the cybercrime is greatly rising in the world of technology. The criminals
of the World Wide Web use internet users’ private data for the personal achievement. These
criminals jump deep in the dark web to purchase and trade the unlawful service and goods.
These criminals still get access to classify the data related to the government. The expression
cybercrime means any kind of criminal action made through, and making use the Information
and Communications Technology (ICT) device (Cross, 2015). The cybercrime is described as
the crime where the computer is the purpose of the crime like phishing, hacking, doing spam.
It is used as the device to conduct the crime such as hate crime and child pornography. The
cybercriminals can use the technologies related to the computer to access private data,
business commercial secret or use the net for unfair or hateful objectives. The criminals may
also use the computer to establish the communication or documents or data storage. The
criminal who executes these unlawful actions is often considered to as hacker. The
cybercrime can also be considered to as crime related to computer (McElreath, et. al, 2018).
The purpose of the criminal actions may be to make sexual crimes like seeing and sharing the
offensive images, controlling or allocating the computer systems, or to accept cash, goods,
sources or data without permission. The net is used by the gang to deal the extensive variety
of goods online like drugs, firearms, and offensive images of children. In the following parts,
the manner of respond of police authorities to both cyber-enabled and cyber-dependent
cybercrimes and way to improve responses is discussed and critically examined.
The cybercrime is the umbrella expression used to define two closely related, but different
range of criminal action (DiMase, et. al, 2015). Cyber-crimes fall into two categories. These
are cyber-dependent crimes and cyber-enabled crimes.
The online crimes have enhanced in brutality and the occurrence over the last two decades.
Though, even if various scientific regulations have generally engaged criminological the
Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes_2
ESSAY 2
approaches, strategies or the theories to describe the experience, incident, ordinary
criminology has dedicated comparatively slight concentration to the examination of the
cyber-criminals and the sufferers of the cyber criminals. The drawing on this assumption that
more criminological attention must be provided to the significant category of the crime. This
report states the interdisciplinary reviews of the present state of the study on cyber-dependent
crime. The cyber-dependent crimes are crimes, which may be conducted only by the
Information and Communications Technology devices, whereas tools are device for
conducting crimes, and target of the crimes such as establishing and propagating malware for
the economic benefits, hacking to steal, damages, misrepresent, and end the information and
networks or activities. This is the extensively identified issue, effort to measure cyber-
dependent crime have resulted in noticeably different numbers, focusing the trouble of trying
to develop the scales, outlay and the influence of the attack.
The cyber-crime is conducted for various different causes by the people, group, and
independent states. For examples, greatly skilled people or highly skilled groups who can
circulate software to attack the network and system, either to do misconduct or influence
others to do so, controlled criminal gangs, and cyber-terrorist who aim to cause extreme
interruption and impacts. It also includes gangs or people with high skills, gangs and persons
with low skills but the capacity to use cyber devices established by others, states sponsored
groups throwing cyber-attack with purpose of collecting data or conceding government of
United Kingdom, protection, financial asset, and business asset, and the workers with
advantaged access to the network and computer (Brown, 2015).
The cyber-enabled crime is the traditional crime that may be enhanced in scale and reach by
the computer users, computer network, or other forms of ICT like cyber-enabled frauds. This
is crime that does not depend on computer and network but have been transformed in scale by
use of net and communication technologies. They came in following categories like
Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes_3
ESSAY 3
cybercrime connected to finance such as Intellectual property crime (piracy, copy content,
and falsification), online market for prohibited item, invasive communication
(communications sent by the social media and cyber trolling), crimes which particularly aim
people involving cyber-enabled violence against girl and female (like disclose the private
sexual pictures without agreement (cyber annoyance, harassment, coercion). It also includes
child sexual crimes, inappropriate pictures of children, and risky pornography, offensive
publication and illegal pictures.
The enhancing dependence on the technologies related to the computers is being oppressed
by the offenders or wrongdoers or the criminals who use technologies to carry the usual or
the habitual crimes like the fraud, drug acquisition and the child abuse. The most noted and
highlighted points of these crimes are deception and robbery, pursued by the online nuisance
and the online sexual offending that is the primary fear with the offenders potentially being
embattled by the perpetrators universally. The results from newest confidence survey of
Durham Constabulary state that the cybercrime had score uppermost out of all the offences
the common public are ‘in the threat’ of (Ige, 2018).
It is recognised by the office for National Statistics that there were one thousand seven
hundred fraud crimes referred to the National Fraud Intelligence Bureau by the activity frauds
for the Durham Constabulary field in the end of the year 2016 that is the nine per cent
reduction from the similar time ending year 2015. These are new and practical figures and
used only as the direction. In region the Durham and Darlington this associates to the rate of
three offences per one thousand population that is the similar as the local average and
improved than the national average of the four offences per one thousand people. The level of
fraud is very complicated to evaluate or review because this is the illusory offence. The
oppression is repeatedly again arbitrary, covering the groups or companies as well as the
persons. Certain sufferers of fraud can be ignorant that they have been the injured party of the
Cybercrime: Understanding Cyber-Dependent and Cyber-Enabled Crimes_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Essay about Cybercrime 2022
|6
|2154
|25

Cyber Terrorism: Is Sri Lanka Ready?
|53
|15191
|297

Cyber Cime and Cyber Law in India
|6
|2814
|82

Ethical Hacking as a Defence Mechanism
|10
|1909
|378

Cyber Crime in Pakistan: Issues, Challenges, and Countermeasures
|10
|1948
|284

Cyber-crime and Cyber Espionage- Report
|13
|3229
|212