StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

New and Old Emergent Criminal Threats - Essay Example

Cite this document
Summary
Cybercrime is a modern criminal threat, and this has gained prominence with the growth of the internet. Basically, cybercrime involves all illegal activities carried out…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
New and Old Emergent Criminal Threats
Read Text Preview

Extract of sample "New and Old Emergent Criminal Threats"

Old and Emergent Criminal Threats Assignment The growth of information and communication technologies has exposed the world to new criminal threats. Cybercrime is a modern criminal threat, and this has gained prominence with the growth of the internet. Basically, cybercrime involves all illegal activities carried out through computers and the internet. These are the tools used by criminals to undertake their criminal activities. Cybercrime in itself is broad and involves a variety of offenses.

Offences may include those against the confidentiality of systems and data and the integrity of such data and systems, distribution of pornographic materials and the use of internet to promote hate speech among other crimes. For example, many cases are reported throughout the world where criminals have used the internet to illegally obtain bank and credit details of customers and used such information to withdraw cash from their accounts. There are also many cases of the internet being used by individuals to attack and harass others, commonly referred to as cyber bullying.

There are many theories that have been used to define and understand criminality and criminal behavior. One of such theories is the social process theory. According to this theory, people become criminals as a result of their interactions with other individuals, organizations and the various processes that exist in their society. Therefore, one learns to be a criminal based on what he/she sees and interacts with in the society. The events and processes that exist in the environment go a long way in influencing one’s behavior.

This theory has two other approaches. The first is the social control theory which basically argues that a person’s behavior is influenced by his interactions with institutions and other people. Secondly, there is the social reaction theory which emphases that if an individual is seen or labeled as a criminal early on in life, he is likely to become a criminal later on in life. In order to evaluate if the cybercrime applies to the social process theory, the causal research design can be applied.

In this type of research design, researchers attempt to show evidence of a cause and effect relationship. In this case, the researcher tests how a particular variable results in a particular behavior. In this case, researchers could attempt to show how some of the existing institutions and process determine cyber criminal behavior. For example, a researcher could attempt to relate how one’s interactions with fellow college students in a university make the individual a cyber criminal. Another example could be internet.

The use of the internet is one of the processes that have dominated the modern world. A researcher could therefore attempt to show how one’s continued use of the internet shapes him towards becoming a cyber criminal. In this research design, the researcher will hold the variable that is assumed to contribute to cyber criminality constant and examine the changes in other variables. As a real example, a researcher could carry out a study based on a group of students from different universities.

One group could be exposed to the internet and computer technologies for a certain period of time. The other group would not be exposed to such technologies. At the end of the study period, the researcher could attempt to measure cyber criminal behavior in both groups and understand how the interaction with such technologies contributes to criminal behavior.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“New and Old Emergent Criminal Threats Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
New and Old Emergent Criminal Threats Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/law/1647791-new-and-old-emergent-criminal-threats
(New and Old Emergent Criminal Threats Essay Example | Topics and Well Written Essays - 500 Words)
New and Old Emergent Criminal Threats Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/law/1647791-new-and-old-emergent-criminal-threats.
“New and Old Emergent Criminal Threats Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1647791-new-and-old-emergent-criminal-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF New and Old Emergent Criminal Threats

Organizational Business Mission and Related Security Goals

Despite the mounting threats in cyberspace, it emerges that the cyberspace domain holds key solutions to these threats.... The threats are further compounded by fact that threats are anonymous and emerge from a multitude of sources worldwide (Ward, 2000).... The behavior of the users, failure in compliance with security policy and ignorance of cyber threats are common human factors that compromise the overall security of cyberspace....
5 Pages (1250 words) Coursework

The State Should Be Protected from Internal and External Threats

Williams (2012:5) defines security as “alleviation of threats to cherished values.... Issues of security are thus aimed at addressing the internal and external threats to the state.... This is the question we need to ponder over bearing in mind the gross human atrocities conducted by the state in the name of ‘state security'....
5 Pages (1250 words) Essay

Emerging Technologies

However, using a new technology knows as chaotic chips, researchers at the University of Florida hope to attempt a unique approach under which computer chips will be able to perform any function on the fly by dynamically changing their internal configurations.... The paper "Emerging Technologies" tells us about the era of globalization....
8 Pages (2000 words) Essay

Online Security Threats Removal

So, it is clear that several threats linger in the world of the internet but online identity theft is one of the most prevalent issues.... But, it doesn't really matter if you use the internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in cybercrime over the last few years.... nbsp;The consequences for the victim can be devastating because once the thieves have your personal information they can open up credit cards and run up debts, take out loans or use your identity as a cover for criminal activity....
6 Pages (1500 words) Essay

American Eagle Outfitters

These are currently sold in 19 exclusive stores as well as on its website called Apart from this AE has now targeted 25 to 40 year old customers with yet another brand called MARTIN+OSA using denim and sportswear as a base covering apparel, accessories and footwear.... AE has introduced a new label called “aerie by American Eagle” targeting young female customers with a collection of dormwear and intimates that includes bras, undies, camis, hoodies, robes, boxers, sweats and leggings....
6 Pages (1500 words) Essay

Various Types of Crime Control Strategies Utilized Today by Law Enforcement

The international criminal activities have been reported to be escalating both in the severity and extent, especially with the increase in globalization.... The ranges of criminal activities that are engaged in by… The criminal activities witnessed in the United States of America include but not limited to; terrorism, drug trafficking, contraband and alien smuggling, money laundering, Extreme violence is also an emerging concern as crime advancement (Astorga, Luis and David, pp 56) The international crime has also been reported to be so prevalent....
5 Pages (1250 words) Essay

Maintaining or Strengthening Amphibious Forces in the UK

The "Maintaining or Strengthening Amphibious Forces in the UK" paper supports the need for the strong amphibious force of the UK that works for the UK's interests and that of NATO.... Britain's interests are best defended when it is flexible enough to threaten a nation that seeks to threaten itself....
10 Pages (2500 words) Term Paper

Security Studies in a Changing World

The application of securitization theory allows analysts to engage directly in new and old security discourses by providing them with means to critically analyze security processes (Wæver, 2004 p18).... According to Huysmans, (2000 p762), securitization is the inter-subjective establishment of existential threats that demand immediate and urgent attention.... Studies on securitization are focused on gaining an increased and a precise understanding of securitization issues/threats and actors involved....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us