Sunday, February 2, 2020

Cyber Crimes Research Paper Example | Topics and Well Written Essays - 2500 words

Cyber Crimes - Research Paper Example Other than these crimes, there is also a breach of privacy in which a person’s confidential information becomes compromised, which in legal parameters is unlawful. A majority of those found to engage in cyber crimes is normally between the age of fifteen and twenty-fivein which they find themselves serving time at correctional facilities when found guilty of the offense. Cyber crimes have both international and local engagements in which a government may choose to do so through spying on other governments or by non-state actors who may use these avenues to conduct financial theft (Girard 399). In essence, cyber crimes may also be an inter border in which the efforts to apprehend those involved in this economic crippling activity may spread across international boundaries hence becoming cyber warfare. With this, this essay will delve into cyber crimes and the laws that are in existence surrounding cyber crimes. The emphasis will also be on various cyber crimes that have gained international recognition across nations that have a direct correlation to business organizations. Description of Cyber crimes Ideally, cyber crimes have attracted immense costs to institutions and individuals alike in recent times making it to be of the most expensive crimes to exist for the current generation. On the contrary, cyber crimes is a term that serves as an umbrella to a wider range of activities that may include those that target computers and those that target computer networks and devices (Brenner 39). Principally, cyber crimes that target computer devices or their networks include viruses, malicious software (Malware) while those that may originate from computer devices or networks include fraud, information warfare, and identity theft among a list of other documented crimes (Turrini & Ghosh 51). On the contrary, the Department of Justice in the USA recognizes computer crime to exist in a category of three in which a computer may be the prime target for cybercrime or as a tool for conducting the offense. Thirdly, a computer or its network may be applicable in executing the crime as a tool for storing stolen information making it an accessory to these crimes. According to research, those that conduct cyber crimes who happen to be teenagers do not have to have manyskills in order to do this because the tools used in hacking into computer systems are readily available on the internet. Most of these crimes begin as pranks in which these youngsters may view the shutting down of websites as a joke without having the knowledge that these activities are illegal. Other than being hackers, people and children that fall within the 15-24 age brackets also find themselves engaging with crooks online who give out information to them about the ways of shutting down the online operations of certain companies. Therefore, those that commit cyber crimes may either download the software that are essential in committing these crimes or may acquire links to sites th at may offer them pointers on how to commit the crimes effectively. On the other hand, some sections of the media have also praised cyber crimes portraying computer criminals as people that can liberate society from oppression similar to the legendary story of Robin Hood. According to the Interpol, cyber crimes have been on an increasing trend in recent years as compared to other intellectual crimes across the globe. With the increase in internet speed options, anonymity

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.