StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Concept of Digital Crime - Research Paper Example

Cite this document
Summary
The paper "The Concept of Digital Crime" suggests that digital crime is an unlawful act of using a computer. This activity has increased all around the world drastically. Law enforcement agencies must learn from the past to predict future digital crimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
The Concept of Digital Crime
Read Text Preview

Extract of sample "The Concept of Digital Crime"

Digital Crime and Terrorism] By Forecasting Future Trends In Digital Crime And Digital Terrorism Digital crime is actually unlawful act that is done by using a computer. For past few years this activity has increased all around the world drastically. For this reason law enforcement agencies are required to learn from the past to predict the upcoming digital crimes. There is a need of new technology and training to stay up to date with this problem. This is because as the technology is evolving, people are using these advance technologies to do unlawful activities and this problem will only increase with the passage of time. To know about the future digital crime and terrorism large number of analysis and data collection is being done all over the world to minimize the digital terror (Taylor, Tory J. Caeti, & Eric J. Fritsch, 2006). People are finding new ways to stay protected from such crimes which are unethical. The eight forecasts that can help stop these crimes are as follows: As the number of cyber-crimes increases, the number of reports will also increase drastically. For this reason officers need to be trained with respect to the new emerging technologies. Also, the attorneys and judges should have more knowledge about these crimes. Recent studies show that that officer in computer crime department are overworked and are stressed. Therefore they need better training to cope up with the technology. Many reports have been received about people complaining that they are getting hurtful comments from unknown individuals. For this reason new laws are being developed to prevent and challenge these crimes and attorneys and judges are being acknowledged (Raisinghani, 2004). The second forecast is the major threat to people which is the internet fraud. Large number of people will be affected by this terror in many ways such as identity theft. Identity theft can be done from a stranger or even a member of family. It is usually done for financial gain. Now days when everyone has internet at their homes people use internet to buy many products. This brings up the identity theft problem. For this reason it is necessary to notify individuals about the emerging problem (Taylor, Tory J. Caeti, & Eric J. Fritsch, 2006). The third forecast is to create new laws and also to come up with new methodologies to fight these crimes, that is, people should have more education about them, how to prevent such crime and also how the investigation should be done. As very soon these crimes will occur in larger of numbers. For example: cyber stalking. It is the act of harassing people electronically through text messages, email etc. it is more common these days than physical harassment. Cyber stalkers tend to threat victims without showing them their true identities. This is done through social networking sites (Barrett, 1997). As the time is passing many computer hacker groups are improving their skills through various guides, tutorials and software. Due to the increase in number of software that helps these hackers it has become very difficult to control this act. For example a hacker built tools on the internet which were soon adopted by other hacking groups. To prevent these markets should not allow selling such tools and products but it is beyond control. Also, underdeveloped countries do not have laws for such crimes which make it more complicated to confront these hackers (Neto & Brasileiro, 2007). Large crime groups will use digital terrorism as their criminal instrument. Here are number of ways of carrying out these crimes such as counterfeit currency and documents, illegal immigration, black market etc. due to increase in technologies such as color scanners, graphics software etc. counterfeit currency production has become an easier task all around the world. These are also very difficult to detect and prevent. For example a US dollar bill was impossible to counterfeit but now it has become possible. Also in this way counterfeit passports can be made. Gambling is also one of the organized crime of these days which is also increasing with the technology. Gambler need to provide their credit card number to access these websites. Hence instead of going outside people can login to these websites (Grabosky & Smith, 1998). People have found means of getting illegal immigrants in the country. Also counterfeit products such as DVDs books, software are being stolen and sold to individuals without rights. Individuals, identities are being used for illegal purposes to make money. Telecommunication frauds are also becoming very popular these days as it has very low risks and high profits. This can be either theft of credit card numbers, hacking of calls or phone theft. Studies shows that call hacking have been decreased whereas credit card fraud has increased immensely. Global networking is now used by terrorists. This is the actual cyber terrorism. Extremist groups are using computer technology to carry out crimes. There are different types of cyber-attacks such as information stealing websites, attack on banking websites etc. Many countries of the world have immense technical capabilities to disrupt the US information infrastructure. Viruses and other unwanted software can be sent to individual through computer. Terrorist groups use this kind of software to gain access to information (Casey, 2011). Computer industry has grown vastly over the past five years. The criminals have no bounds of time or money to carry out these schemes. Even though law enforcement agencies know main causes behind these attacks but still it is very difficult to prevent them. These problems will increase with the passage of time as the technology grows. Illegal transactions can be carried out through the use of cellphones. All efficiencies are making easier for criminals to evolve. The technologies that these criminals use to carry out their tasks are becoming better day by day. If an individual goes to a store for shopping his credit card number can be accessed without knowing. And if he tries to shop online he is open to the risk of illegal websites and all the information can be accessed even then. Terrorists have a way of concealing their identities which is one of the most dangerous threat to a country. People who are new to these technologies have to be more trained in these technologies. This requires large number of people to perform this task (Taylor & Fritsch, 2010). To reduce such crimes and terrorist activities it is absolutely essential that a record is to be made of such acts so that we can see the number of crimes that are occurring all around the world. The law enforcement agencies can predict and prevent such activities from happening by analysis of records. Different types of forecasts have been discussed in this report. The most important thing is to change the laws with the technology; otherwise this terrorism will continue to grow immensely. Telecommunication fraud is another type of digital crime which is very common nowadays. Basically it is a profitable area of computer –related crime which has very variations. Mainly there are four types of telecommunication crimes in which most of the criminals are involved. The first one is to snatch the credit card numbers which can be get by hacking the secure information for example accessing computer records, by recording the computerized voice mailboxes, telephone billing files, etc. The second one which is normally decreased nowadays is to hack the telecommunication switches, which are basically the desktop computers for the use of routing calls .The third one which is the main crime is wireless phone theft and fraud (Barrett, 1997). The last one which has increased significantly is that the crime groups got access to the private automatic branch exchanges of many multinational companies to use telecommunication services for their own benefit. In short any organization which may be private or public must be aware of the threat caused by technology-related abuses and their impact on both crime and security. Similarly there should be law against these crimes. For taking these security measures one must have the knowledge of security issues, processes and practices. References Barrett, N. (1997). Digital Crime: Policing the Cybernation. England: Kogan Page Ltd. Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press. Grabosky, P. N., & Smith, R. G. (1998). Crime in the Digital Age: Controlling Telecomunications and Cyberspace Illegalities. New York: Transaction Publishers. Neto, F. M., & Brasileiro, F. V. (2007). Advances in Computer-Supported Learning. New York: Idea Group Inc (IGI). Raisinghani, M. S. (2004). Business Intelligence in the Digital Economy: Opportunities, Limitations and Risks. New York: Idea Group Inc (IGI). Taylor, R. W., & Fritsch, E. J. (2010). Digital Crime and Terrorism. Canada: Prentice Hall. Taylor, R. W., Tory J. Caeti, D. K., & Eric J. Fritsch. (2006). Digital Crime and Digital Terrorism. London: Pearson/Prentice Hall. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forecasting future trends in digital crime and digital terrorism Research Paper”, n.d.)
Forecasting future trends in digital crime and digital terrorism Research Paper. Retrieved from https://studentshare.org/miscellaneous/1615737-forecasting-future-trends-in-digital-crime-and-digital-terrorism
(Forecasting Future Trends in Digital Crime and Digital Terrorism Research Paper)
Forecasting Future Trends in Digital Crime and Digital Terrorism Research Paper. https://studentshare.org/miscellaneous/1615737-forecasting-future-trends-in-digital-crime-and-digital-terrorism.
“Forecasting Future Trends in Digital Crime and Digital Terrorism Research Paper”, n.d. https://studentshare.org/miscellaneous/1615737-forecasting-future-trends-in-digital-crime-and-digital-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Concept of Digital Crime

Digital Forensics/Electronic Evidence

The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime.... The three types of crimes covered under digital forensic include; child pornography which is the most diverse type of digital crime.... Theft of personal information is another form of digital crime covered under digital forensic (Johnson, 2006).... Majority of internet and computer users have complained about the increased rate of digital crime where money and other crucial information stolen....
1 Pages (250 words) Essay

Digital Forensics Project

Digital forensics finds application in the internal audit of the corporation in investigating whether the crime has been committed (Sammons, 2012).... The paper "digital Forensics Project" highlights that protecting the integrity of the evidence collected is vital for law enforcement.... digital forensics finds applicability in many areas especially in the courts for refuting or supporting hypotheses during legal proceedings.... In the technical aspects of the investigation, digital forensics has several sub-branches that relate to the digital devices that have been in use....
8 Pages (2000 words) Essay

Digital Crime and Digital Terrorism

here are various types of digital crime and digital terrorism activities in existence to date as a result of the introduction of information technology; these include the theft of telecommunication services which was started by the 'phone phreakers'.... This report "digital crime and Digital Terrorism" demonstrates digital criminals and digital terrorists that have beneficiated greatly by the use of information technology due to safer means of communication.... digital crime and digital terrorism are growing at an increasing rate as the variety and the frequency of the offenses are increasing and also since more dangerous crimes are being committed using little physical resources....
6 Pages (1500 words) Report

The Evolution of Digital Crime

The paper 'The Evolution of digital crime' presents the internet which is not only dominating personal information search but also commercial activities, business transactions, and government services.... The outcome of this is that before several users are aware, they have been swindled by others who have made the act of digital crime, including cyber crime their unauthorized business.... In effect, the advent of the internet and its fast-growing followership over the years is a major starting point with the issue of digital crime....
6 Pages (1500 words) Case Study

Cyber Crime and Forensic Investigation

The paper "Cyber crime and Forensic Investigation" is a great example of a report on the law.... As the world becomes more and more technologically inclined there will be more and more instances of criminals who have resorted to technology-based methods for the crime instead of the usual run of the mill methods (IPPE crime paper).... The paper "Cyber crime and Forensic Investigation" is a great example of a report on the law....
9 Pages (2250 words) Case Study

Internet and Digital Crimes

urthermore, the studies are not a substitute for the information-gathering methodologies and applications in crime intelligence that sustain solid criminal investigations.... The police agencies ought to apply computers in mapping crime and also in improving the strategies and methods in crime-fighting.... The middle managers and local commanders should be accountable for their activities in fighting against crime by explaining to executives the steps they prospect to take to reduce crime and plans they have set correct a particular crime to improve life quality....
8 Pages (2000 words) Essay

Digital Crime, Cybercrime

mplications of digital crime on criminologyCriminology is essentially a study of crimes, criminals, and behavior, it also focuses on law enforcement procedures necessary to ensure justice when a crime is committed.... This essay "digital crime, Cybercrime" presents an analysis and discussion of Burden and Palmer's perception of cybercrime.... he emergence of digital networks has provided a major challenge to the study of criminology.... The ever-increasing dependence on the internet and other forms of digital networks has created more new vulnerabilities and hence new ways that criminals can exploit....
8 Pages (2000 words) Essay

Social Safety: Solving Crimes and the Rise of Digital Vigilantes

This report "Social Safety: Solving Crimes and the Rise of digital Vigilantes" discusses the current trends related to the social media platforms such as Facebook, Twitter, YouTube, and MySpace in curbing criminal activities in modern society.... The advancements in mobile technologies, as well as applications, continue to have massive influences in relation to criminal activities and increase in the number of digital vigilantes.... Social media is one of the technological developments in the digital era enabling individuals to interact with each other socially....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us