Incidence, Causes and Solutions to Cybercrime

Only available on StudyMode
  • Topic: Crime, Malware, Cyberspace
  • Pages : 18 (4323 words )
  • Download(s) : 955
  • Published : March 15, 2013
Open Document
Text Preview

Before evaluating the concept of cyber crime it is obvious that the concept of crime be discussed and the points of similarity between both these forms may be discussed. According to the Webster dictionary, crime is an act or the commission of an act that is forbidden or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law. From Wikipedia, the free encyclopaedia, describes crime as the breaking of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Crime is also termed  organised when it cuts across transnational, national, or local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. Some criminal organizations, such as terrorist organizations, are politically motivated. They may also be considered organised if they display level of discipline.

On the other hand, cybercrime refers to any crime that involves a computer and a network. It is also known as computer crime. The computer may have been used in the commission of a crime, or it may be the target.  According to the Oxford dictionary, cyber crime refers to criminal exploitation of the Computer with the aid of a modem/device.  The encyclopaedia seem to be more broad in its definition to cyber crime and thus defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

This definition cuts across the true meaning of "cybercrime" as it were, simple because cybercrimes threatens a nation’s security, religion, political stability, social welfare, financial health, amongst others and could be carried out anywhere and anytime irrespective of ones socio-economic status. Issues surrounding this type of crime have become high-profile, particularly those surrounding organised crime, cracking, copyright infringement, child pornography, child bullying, white collar crime, hacking, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. As a matter of facts, if any criminal activity is to flourish effectively and efficiently, it has to be accompanied with the modern time invention which is advance use of technological equipments.

Categorically, all criminal activities have an affiliate with the internet one way or another most especially in the areas of sharing vital information among members and to the public at large. The internet is also used in promoting their activity so as to be feared by the public and hold its' government ransom. Some examples of the activities of criminals using the internet as a source of aid are highlighted as follows:

* The use of 'youtube' by the terrorist organisation (Al Qaeda, Taliban, Boko haram, Ansaru, etc..) to broadcast videos of victims in custody and to announce a new leaders.

*  The use of mobile phones (Calls/SMS/MMS) in communicating to other criminal members and this criminal activities cuts across drug traffickers, robbery, pipe-line vandalism, child trafficking, terrorism, money laundering,  etc.

*  The use of chat rooms and pornography sites in abusing children.

*  The copyright infringers download/upload movies, books, music, etc..  in mass production and sell to the public without unauthorised access to do so.

*  The use of computer viruses, malware (malicious code), phishing scams, etc... in committing identity theft, deleting or altering stored data, extortion, bank fraud, amongst others.

Internationally, both governmental and non-state actors engage in cybercrimes, including espionage,...
tracking img