Incidence, Causes and Solutions to Cybercrime

Topics: Crime, Malware, Computer crime / Pages: 18 (4323 words) / Published: Mar 15th, 2013
INTRODUCTION:

Before evaluating the concept of cyber crime it is obvious that the concept of crime be discussed and the points of similarity between both these forms may be discussed. According to the Webster dictionary, crime is an act or the commission of an act that is forbidden or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law. From Wikipedia, the free encyclopaedia, describes crime as the breaking of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Crime is also termed organised when it cuts across transnational, national, or local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. Some criminal organizations, such as terrorist organizations, are politically motivated. They may also be considered organised if they display level of discipline.

On the other hand, cybercrime refers to any crime that involves a computer and a network. It is also known as computer crime. The computer may have been used in the commission of a crime, or it may be the target.
According to the Oxford dictionary, cyber crime refers to criminal exploitation of the Computer with the aid of a modem/device.
The encyclopaedia seem to be more broad in its definition to cyber crime and thus defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

This definition cuts across the true meaning of "cybercrime" as it were, simple because cybercrimes threatens a nation’s security, religion, political stability, social welfare, financial health, amongst



References: ^ Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. ^ Hart, D. Ford (2002). Concept of Law. ^ Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ^ David Mann And Mike Sutton (2011-11-06). ">>Netcrime". Bjc.oxfordjournals.org. Retrieved 2011-11-10. ^ * Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9 ^ Internet Security Systems ^ Salvador Rodriguez (June 06, 2012). "Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen". ^ Rick Rothacker (Oct 12, 2012). "Cyber attacks against Wells Fargo "significant," handled well: CFO". ^ DAVID K. LI (January 17, 2012). "Zappos cyber attack". New York Post. ^ a b c Weitzer, Ronald (2003). Current Controversies in Criminology. Upper

You May Also Find These Documents Helpful

  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • Cybercrime
  • cybercrime