Topic > Cybercrime: theories and management

IndexTheories of cybercrimeSocial and economic impact of cybercrimeManaging cybercrimePreventing cybercrime through information securityFuture opportunities for managing cybercrimeThe role of computer forensics in managing cybercrimeIn this unit I learned that cybercrime refers to activities in which computers, phones, cellular equipment, and other technological devices are used for illicit purposes. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Speer (2000), states that computers are the predominant form of information and communications technology used to commit computer crimes. Cybercrime is classified as Type 1 and is usually committed in a single event from the victim's perspective, alternatively Type II refers to numerous activities in the cybercrime process. Examples of type I cyber crime include keyloggers, viruses, rootkits, Trojan horses while, examples of type II include cyberstalking and harassment, child predation, extortion, corporate espionage, cyber terrorism. This evolution of technology and globalization in recent years has now connected countries around the world, improving communication and business, yet creating a gateway for cybercrime. In my discussion on the issue, how the use of information and communication technologies has contributed to the perpetration of this type of crime, I totally agreed that the evolution of technology and globalization in recent years has now linked countries around the world, improved communication and created new platforms for businesses, such as Facebook, Amazon and Netflix. Thanks to this type of global connection, criminals now have a platform to commit cybercrimes, which I believe can be done very easily and with great difficulty in getting caught. I was surprised to learn that some cyber crimes, through the use of information and communications technologies (ICT), include everyday activities such as computer hacking, illegal downloading of DVD movies, CDs for personal entertainment or for retail distribution. Many people around the world have participated in illegal music downloading; in the belief that this would not jeopardize the artist's sales. After gaining more information and a deeper understanding of cybercrime and the fact that piracy is illegal, I think it would be difficult for law enforcement to crack down on piracy, largely due to the frequency of such acts. Using Satellite Communications Criminal organizations depend on digital technology for communications and record keeping. Forgery of official documents ICTs such as printers, scanners, computers and the Internet are used to digitally reproduce official documents such as passports and credit cards. Credit card fraud is a form of identity theft that involves unauthorized individuals taking another's credit card information for the purpose of charging purchases to the account or withdrawing funds from the account. Additionally, Internet scams are the use of Internet services or software with Internet access to defraud victims or otherwise take advantage of them. Other ICT-related cyber crimes include online trading of illicit products, denial of service, terrorist communications and recruitment, online harassment, cyber sex crimes, and virus attacks. Theories ofcybercrime In this unit, I gained knowledge of cybercrime theories; its purpose of explanation, prediction and intervention. It is understood that there are six criminological perspectives on cybercrime. A discussion question was assigned, with a case study identifying possible theories of criminology, as a means of conducting in-depth research to enable further understanding of the theoretical underpinnings of criminology. I was confident in the conclusion drawn that the theory selected for the case study was a classical criminologist. This is made up of rational choice, general deterrence theory and routine theory. Rational theory believes that people weigh the potential costs and benefits of committing a crime. If the goals outweigh the punishment, such as earning money, the crime will be committed. The general theory of deterrence states that people can be deterred from committing crimes if severe, swift and certain punishments are provided. Routine Activities states that for a crime to be committed, three specific criteria must be involved; there must be a motivated offender, an appropriate target, as well as the absence of a capable guardian. I agreed that the case study was not based on trait theories that people commit crimes due to biological characteristics and psychological disorders. The impact of certain foods, chemicals and other substances has linked criminal behaviors such as mental disorders which, after making decisions and behaviors, lead to committing a crime. Rondell and Natasha stated in their discussions that the case study was oriented towards social learning theories which state that people commit crimes as an indirect consequence of the way they were raised, educated and acculturated in society, including schools, encouraging parents, religious groups and social organizations. Social process theory has three main branches where social learning theory emphasizes that people learn to commit social crimes, control theory analyzes suggest that society's failure to control criminal tendencies, and labeling theory argues that negative labels produce criminal careers. The other theory includes social structure theories that suggest that people placed in a socioeconomic structure influence their likelihood of becoming criminals. Poor individuals are more likely to commit crimes because they are more unlikely to achieve economic or social success in any way. Social structure theory has three schools of thought; social disorganization theory which suggests that people living in urban areas commit crimes because they live in areas where social control is weakened. Strain theory states that people who are unable to achieve personal or professional goals commit a crime to achieve their goals illegally. Cultural deviance theory is associated with both disorganization and strain theory. A person raised in a lower class believes that it is normal to commit crimes. Conflict theories suggest that crime in any society is caused by class conflict and that laws are created by those in power to protect their rights and interests. To the classes' surprise, the case study was related to the transition theory which was explained by Mr. Sealy in a BBC session where I understood and agreed that the transition theory claims that people behave differently when they move from space physical to cyber space and vice versa. Impactsocial and economic of cybercrimeIn this unit, I learned that the victims of a crime could be anyone or everyone, such as government agencies, businesses, online users, women and children, mainly attributable to the use of computers or technological devices such as telephones or tablets. I also understood that the cost of cybercrime is not definitive, largely because most victims go unreported out of embarrassment and fear of losing business when customers are aware of the weakness of the company's security system resulting in breaches and legal challenges. There are many different costs associated with cybercrime which can be delineated into two main profiles; i.e. direct and indirect costs or tangible and intangible costs. The tangible cost of protecting institutions and individuals from cybercrime includes security measures such as installing physical and virtual protection such as antiviral software, insurance costs, and costs associated with achieving compliance with required IT standards. Indirect costs, on the other hand, concern the costs linked to computer crimes that continue to accrue in separate periods of time after the crime has occurred and damages for repair such as embarrassment, damage to the company-customer relationship. Of which there may never be a full recovery, reputation in addition to the loss of time. Cybercrime has become a silent global digital epidemic. Most Internet users around the world are exposed to and could become victims of cybercrime. Speer (2000) defines cybercrime as activities in which computers, telephones, cellular equipment, and other technological devices are used for illicit purposes. Most often cybercrime is committed to obtain personal information or financial gain. As a result, corporate organizations, government agencies, online users, and individuals become victims of cybercrime, through exposure to viruses, cyber stalking and harassment, stock market fraud, and corporate espionage. According to Cyber ​​Security, “Underpinning the Digital Economy,” a report by the Institute of Directors and Barclays Bank,” companies remain silent about being victims of a cyber attack, even if their operations have been severely affected by such a accident. The report indicates that only 28% of cyber attacks were reported despite the presence of a dedicated cybercrime department. The research found that the majority of victims fear that the attack could tarnish their reputation resulting in further losses as it is believed that customers would have little or no trust in their business, particularly with regards to information security. I believe a company should report if it has been hacked as its first priority should be its customers, not its reputation. Awareness is essential for customers as it makes them informed and provides information to conduct business with caution. The bank member can resort to traditional banking method until the problem is resolved. Businesses and online users will inquire about the direct costs with the need for additional security with an ongoing series of updates to ensure computers/databases are protected. Policy makers must also enact laws to prosecute attackers and at the same time require law enforcement to improve the response rate to cybercrimes by improving prosecutions in order to increase trust and inadvertently report cybercrimes.Crime Management ITIncreasing growth in technology has become essential for people and businesses around the world. Theworld, resulting in an increase in cybercrime. In order for individuals to be punished for cybercrime, laws and regulations related to the illegal use of computers or other electronic information tools, it is necessary to adopt provisions for the protection of everyone in computerized societies. Without these above-mentioned laws, members of society would not be able to distinguish between a legal act and an illegal one. Therefore, countries around the world such as Jamaica, Trinidad and Tobago, England, and the United States have taken steps to implement laws against cybercrimes. This unit's discussion question focused on transnational crimes and the challenges associated with prosecuting people who commit these crimes. I answered and understood that transnational crimes are crimes that involve more than one country in their genesis, perpetration and direct or indirect effect. Transnational crimes include human trafficking, illicit drug or weapons trafficking, human trafficking and cybercrime. There are many challenges that law enforcement agencies face in prosecuting people who commit transnational crimes. One of the first obstacles investigators face on a daily basis is identifying a suspect in transnational crimes such as cybercrimes for prosecution. There was further discussion about the measures imposed by Pakistan to combat cybercrime and the death penalty, which I did not agree with. In my opinion, this was not justified, especially in the case of the Caribbean region. The first measure should be a change in the legislation with additional sanctions depending on the seriousness of the crime. Although the death penalty has the advantage of deterring people from committing such crime, in my opinion the punishment could be this too harsh.Preventing Cybercrime through Information SecurityIn this unit I have understood and understood that various protective and preventive measures that victims of cybercrime can use. I have learned that to protect individuals and businesses it is advisable to use passwords to prevent hackers from having unauthorized access to your financial, health data, files, servers and credit cards; a proposal with which I agree. It is suggested that people choose a strong password made up of a combination of at least eight uppercase and lowercase letters, symbols or numbers. I agree that online users get into the habit of not using their age, name and date of birth in their passwords as this could be the first thing a hacker would use to try to crack your password. It is also recommended not to use the same password on different or multiple sites and it is also proposed to periodically update the password. I support the view that the lack of security measures could have a negative impact on the effectiveness of an organization's security system. I agree that measures should be employed in an attempt to protect organizations IT security with the inclusion of staff training and awareness. This initiative will educate staff on new IT software, inform the use of such software and highlight the importance of the new security system against cyber attacks. I agree that it is important to have a security assessment that examines the control of hardware, software, data and human factors in an effort to determine how effectively the system is functioning and what changes need to be made to be undertaken. Furthermore, a basic security assessment needs to be carried out regularly in order to identify weaknesses in the IT security system and.