cybercrime

Topics: Online predator, Fraud, Computer crimes Pages: 11 (2069 words) Published: July 5, 2014
CHAPTER I
INTRODUCTION
“A mouse can be just as dangerous as a bullet or a bomb.” -Lamar smith. 1.1Background
Cybercrime is also called computer crime. The use of computers as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy is cybercrime. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.1 New technologies creates new criminal opportunities because of the early and widespread adoption of computers and the Internet, these days computer crime has been a growing issue even here in Nepal.

1.2 Statement of Problem
The development on information technology and cyberspace made the world as a small global village. People can get access right through the world from their home with internet. The trends of global terrorism are also changed by using such IT. Cyber crime as a “new weapon” becomes a potential threat in international peace. In particular, this paper is focused on cyber crime, its effects, challenges and impact of cyber crime on global security.

1.3Objectives of the Study:
a. To know how far cybercrimes are occurring in Nepal
b. Cyber crime in Nepal and the law into force
c. To learn about cyber security

1.4Importance of the Study
The research work is basically useful for all researchers and learners who are willing to study about cyber crime. It is equally beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is being a great challenge in each and every development sector. So, it will be useful for the planners and policy makers too.

1.5Limitation of the Study
It is because of time constrains; the research is limited in studying on cyber crime, its effects and cyber security only. However, broaden concept of cyber crime has been drawn in the study. Field visit was very costly in terms of time and resources, so only secondary sources (data) have been used to complete the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warfare, and potential threat in international peace. At last various measures for combating it and recommendations.

1.6Methodology
In this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research work are based on secondary sources. They were obtained through books, and World Wide Web sites.

CHAPTER II
HISTORY OF CYBER CRIME

The first recorded cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was lacking in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date. But we can see many people being the victim of cybercrime. Especially in Nepal, many renowned companies are receiving emails from proxy mailing address demanding for money. Beside this, hacking websites of banks, newspaper and face book accounts, humiliating girls and uploading images in porn sites, sales of pirated CDS and DVDS are the most commonly practiced cybercrime in Nepal.

CHAPTER III
CATEGORIES OF CYBERCRIME
Basically we can categories cybercrime into two types:
(a) The computer as Target: using of computer to...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cybercrime Essay
  • Cybercrime Essay
  • Essay about Cybercrime
  • Cybercrime Essay
  • Cybercrime Essay
  • Cybercrime Essay
  • cybercrime Essay
  • Cybercrime Essay

Become a StudyMode Member

Sign Up - It's Free