ODR for Tree Disputes: A Feasibility Review for a NSW Platform

Verified

Added on  2023/06/04

|8
|1933
|460
Essay
AI Summary
This essay explores the feasibility of implementing an Online Dispute Resolution (ODR) platform in New South Wales (NSW) to resolve neighborhood conflicts related to tree disputes. It reviews existing ODR research and applications to identify potential lessons and challenges for the proposed platform. The essay considers factors such as the commonality of cybercrimes, the legal processes following such incidents, extradition requests, and the possibility of establishing an international cybercrime tribunal. It summarizes the common cybercrimes committed by young people in New South Wales, the investigation process, and the procedure for extradition requests, while also discussing the steps involved in creating an international cybercrime tribunal. This resource is available for students on Desklib, a platform offering study tools and solved assignments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: CYBER SECURITY 1
CYBER SECURITY
Name
Institution
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY 2
How common are cybercrimes of this nature with the alleged offender in NSW and the target
elsewhere.
There have been a collection of cybercrime activities that have been common as shown
by the evidence of the research that was carried out by the Australian Institute of Criminology
(AIC) here in NSW. The research portrayed that in every 5 citizens here, has his/her personal
information accessed without permission. In addition to this, 10 percent of the people have
experienced this over the past year (Wall, 2015). In other regions like for instance, the United
Kingdom and the United States the loss suffered as a result of cybercrime activities and to be
more specific on hacking ranged between a few dollars to around $310,000. It was learned that
many of the people that suffer these losses get to realize them the time they review the
statements for their bank accounts (Wall, 2017). Therefore, we see that these acts of cyber-
crimes are more common not only in NSW but also in other countries.
Other countries across the world are suffering the same problem of cybercrimes. For
instance, Finance businesses have recorded high losses that have been incurred as a result of
system hacking. When a financial institution is hacked, the expected result is high loss of money.
The acts of cybercrimes have become common all across the word and are at an increase because
people are gaining more computer knowledge day by day (YUE, Wang & Hui, 2018). In addition
to this, the unemployment rate across many countries in the world has propagated the occurrence
of this acts because people need money and there are no job opportunities therefore they end up
engaging in this acts (Comer, 2017).
Document Page
CYBER SECURITY 3
What normally happens in such cases when cybercrimes occur?
In case somebody commits a crime over the internet, the agencies that enforce the law
work in coordination with the government agencies, private corporations and internal partners
(Smith, 2018). This is because the manner in which these crimes are committed is very
complicated and thus they need to work together to get the hackers. The method used by the
hackers in their tactics is very complicated because the software that they use are very secure in
the way they hide their location and also in how they route the routes of communication aiming
at evading their direction from being detected and finally commite crimes in countries where
prosecution can’t be done.
To locate them, they apply the use of a combination of traditional investigative and
tactics of digital forensics. Most of the attacks that are implemented by computer gangs are like
the phishing scams, ransom ware, malware, and botnets. What motivates these people to engage
in cybercrime activities is because they want money (Johnson, Mora & Schmidt, 2016). When
incidences of crime are detected, the Internet Crime Complaint Center (IC3) does data collection
from the complainant and then forwards these data to the appropriate agency that does law
enforcement for such cases. To add on this, the NW3C might work with FBI to form the IC3;
they offer services to the individual law enforcement agencies with the inclusion of computer
forensics, preparation of materials and evidence and research analysis for using in a court of law.
Leave alone the lending of investigative support to the cases of enforcing the law; training is also
done to thousands of officers every year on computer forensics, financial and cybercrime
investigations and also intelligence analysis. After a series of investigations, when the person
that committed the crime is finally found, he/she is taken to the court of law and charged with the
Document Page
CYBER SECURITY 4
act of committing cybercrime in accordance to the law of the country where he committed the
crime (Davidson, Lloyd & Payter, 2015).
How often extradition requests are made and what happens to them?
The occurrence of extradition depends on the number and the rate of cybercrimes that the
people in a country have done. Sometime you might find that in one year, there are no
extraditions but on the following year, extraditions are high for instance now when the US is
asking their extradition from New South Wales that have been involved in cybercrime activities.
When there is jurisdiction occurrence, first the person is charged with or as to have
convicted a criminal offense. This is because; extradition can’t be sought if the person is only a
suspect. When the person charged with cybercrime is extradited to the other country, the
Department of Justice in that country requests and makes sure that the affidavits that states the
facts about the case, the copies of the other country’s laws in our case the United States that have
been broken, the copies of the indictment / arrest warrant if it is applicable, and the summary of
the relevant evidence has been prepared in the proper way. After the completion of the
extradition package, it is then transferred to the state department of the United States Embassy in
the foreign country and also taken to the local government (Dunkerley, 2018). If the approval of
the extradition is made, the handing over of the person to the U.S. Marshals is done, where the
fugitive is taken to the United States to face justice. With the time that has been given for formal
request extradition, many treaties allow for provisional arrest of fugitives in cases that are urgent.
Sketch out briefly how an international cybercrime tribunal or forum might be established to deal
with these matters.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY 5
The establishment of an international cybercrime tribunal for dealing with cybercrime
activities can be developed by coming together of all the nations of the world and then design on
the way the desire the tribunal to work. Some of the activities that can be adopted in the
development process aiming to fight against cybercrime activities like distribute denial of service
and hacking are like purchasing of sophisticated software that are similar to those belonging to
the offenders (East, 2017). Dealing with cybercrimes and distributed denial of service requires
one to have evidence of the person that is being charged. Therefore, purchasing of software for
the collection of evidence is of great important. There is a need for the implementation and the
maintenance of a covert and an overt presence of police on the internet. There should also be
constant warnings on the internet about the potential predatory behavior, with the utilization of
the appropriate Virtual Global Taskforce (Mann, Warren & Kennedy, 2018). The use of
‘deterrence initiative’ for instance, the direction of all ‘takedown’ to a site that do warning
requiring the development and the installation of the required software.
Educating of people remains one of the important elements of preventing crimes over the
internet. This is because many people lose a lot of money over the internet just because of lack of
knowledge on how to differentiate between a trustworthy client and a non-trustworthy client over
the internet and this result to them falling into the hands of scammers. By using initiatives such
as the cyber safety and a program known as thinkuknow, the engagement to the community
groups becomes closer (Miquelon-Weismann, 2017). Thinkuknow involves presentations by
volunteers that are trained and a comprehensive website that provides a lot of information and
resources. Introduction of certain themes such as ‘Have fun’, ‘Stay in control’, and ‘Report’ also
can help people as they interact on the internet to enjoy themselves and to report any form of
cyber insecurity to the relevant authorities. What Thinkuknow does is that it has a button that
Document Page
CYBER SECURITY 6
when it is pressed, it forwards the contact details to the police and this can be followed up. A
program for cyber-safety awareness in schools and NSW can also be used to educate others on
the cybersecurity.
Summary
In conclusion, the cybercrimes identified here are the ones that are mostly committed by
the young people in New South Wales, this report also talks about the activities that follows
when a crime has been done. This involves the identification of the crime followed by the
tracking of the device that was used in performing of the crime which finally narrows down to
the person that committed the crime himself. This report also talks about how the extradition
requests are made and the procedure that is followed in order to get the person that performed the
crime and then see him face the law. The report finally talks about the things that may lead into
establishment of an international cybercrime tribunal.
Document Page
CYBER SECURITY 7
References
Wall, D. S. (2017). Crime, Security and Information Communication Technologies: The
Changing Cybersecurity Threat Landscape and Its Implications for Regulation and
Policing.
Wall, D. S. (2015). The Internet as a conduit for criminal activity.
YUE, W. T., Wang, Q., & Hui, K. L. (2018). See No Evil, Hear No Evil? Dissecting the Impact
of Online Hacker Forums. MIS Quarterly.
Comer, M. J. (2017). Corporate fraud. Routledge.
Smith, R. (2018). Crime in the digital age: Controlling telecommunications and cyberspace
illegalities. Routledge.
Johnson, D. A., Mora, A., & Schmidt, A. (2016). The strategic costs of torture: How enhanced
interrogation hurt America. Foreign Aff., 95, 121.
Davidson, R., Lloyd, B., & Payter, A. (2015). Recent Developments in Extradition Law–Some
Practical Implications. Criminal Law Review, 62, 504-521.
Dunkerley, A. W. (2018). Exploring the use of juju in Nigerian human trafficking networks:
considerations for criminal investigators. Police Practice and Research, 19(1), 83-100.
East, P. (2017). Life as the Attorney-General: Being in the Right Place at the Right
Time. Auckland UL Rev., 23, 37.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 8
Mann, M., Warren, I., & Kennedy, S. (2018). The legal geographies of transnational cyber-
prosecutions: extradition, human rights and forum shifting. Global Crime, 19(2), 107-
124.
Miquelon-Weismann, M. F. (2017). The convention on cybercrime: a harmonized
implementation of international penal law: what prospects for procedural due process?.
In Computer Crime (pp. 171-204). Routledge.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]