StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Crime, Media and Technology - Coursework Example

Cite this document
Summary
"Crime, Media and Technology" paper argues that the use of new technology in society should be keenly dealt with as it has been found to have several crimes with it. The various crimes that are because of new technology have been found to have a negative effect on the globe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Crime, Media and Technology
Read Text Preview

Extract of sample "Crime, Media and Technology"

Crime, Media and Technology Introduction Crime refers to any actions that is performed by an individual, and is considered as being against laws of the society on the other hand; media refers to the diverse mediums of relating information to people in a society. Technology refers to new methods that have been introduced with the use of machines, and the web to enable access to different types of information, as well as communication. The introduction of new technology in the society has led to cropping up of new types of crime, which are mostly related to programs that are used by systems in the different organizations and industries. These crimes cause lots of harm and have even led to close down of some industries that operated with high rates of profit considered highly beneficial to the needs of people in society. There has been an increase of new crimes such as cybercrimes, which is further divided into a different types of crimes related to the introduction of new technology. Technological development in any nation is accompanied with uprising of new crimes in society that leads to challenges being encountered in the environment and at times affects the way people operate in the society (Anderson 2011, 9). Several countries have invested in the introduction of new technology to make work easy and faster in the different organizations. This, however, has been risky due to availability of hackers who can access organizations’ information without permission (Jerome 2011, 12).This crime has brought more harm to society when intruders can get access to information of an organization and use it to produce vague information. When information has been distorted, it will be difficult to use it for the effectiveness and efficiency of a company relative to the task it had been aimed (Zittrain 2008, 10). The use of unreliable data implies that information to be produced will not be reliable and may lead to the whole process being corrupt especially if it involves co-operation with other companies. This is mainly because delivering of information to another company can either influence the company positively or negative relative to how effective information is. In this case, the information relayed will not be effective, and if it is used for other processes, it will lead to fault in all the companies involved. Researchers have found that crimes that are related to the introduction of new technology affect the globe and its effects are strong externalities. However, crimes that can be considered traditional like theft and burglary are considered as being local as they only affect the society and have no main effect to people who are far from the area of happening. This, therefore, calls for a relative action to ensure that the different crimes related to new technology introduction are dealt with and are totally wiped out if possible (Martine 2011, 15). As the rate of use of technology increases worldwide, there are different ways that people can come up with, to get the necessary resources by them without having to access them in a lawful manner. This method of accessing information that is not lawfully done is a crime that has been introduced with the invention of new technology (Martine 2011, 16).The introduction of new technology is also aimed at increasing the rate at which people have their information and data secured so that there can be surety that operations of the organization are effective. However, this has not been effective, as there have an introduction of programs that can also be used to remove or hack the password, which is carried out by intruders who have no authority of accessing the information. There are some instances where people can decide to have passwords of the data and information of a certain company hacked, and they can easily access the information without necessarily having to enter passwords. Therefore, this has led to security threats in the society and most especially to the different organizations (Tyler, Richard and Ross 2009, 3). Tyler, Richard and Ross also illustrate how the transfer of funds unnecessarily from the banks to other personal accounts has also been a threat that has been faced with the introduction of new technology. However, this is done when hackers have enough information about the company that they are trying to transfer funds. When this happens, banks lose a lot of money in a way that they cannot understand since they have no idea of the individual having the information of their organization. This has been a problem to some banks and some more advanced software should be used to reduce the rate at which theft is experienced in large companies (2009, 5). The introduction of new technology has also led to some organizations being involved in trade businesses online without necessarily being involved. This is mainly because individuals having their information can decide to engage in a business with another company, which needs to purchase the organization. Consequently, with the use of information from internet, business can end up being traded away without their notice, and this leads to close down of an organization (Schwabe, Davis and Jackson 2005, 4).In a case where a business is traded without notice of the owners of organizations, the society faces a significant problem in increasing levels of unemployment. The introduction of new technology has also led to the introduction of pirates in the web; these use computer and internet to produce a copy of another person’s information, song or movie without their notice. This act is not considered lawful as it affects the business carried out by owners (Zittran 2008, 16).Pirates have been found to interfere with other people’s work and have sometimes produced work that is distorted from the original copy. This gives a wrong impression to the user of the program that is being sold and business can only benefit the pirate, if the products being offered are beneficial to the society (Tyler, Richard and Ross 2009, 15). Moreover, introduction of new technology has introduced crimes related to the use of internet and its services. This has been the case since most people can get access to information in internet and use it against diverse organizations in the world, which not only affects the organizational performance but also societal people. Hackers who gain access to information unlawfully are increasing in the world as more introduction of new technology is made to the society. Neglecting the idea hackers should be dealt with increases fear among individuals who use internet to store personal and confidential data, as well as information. The software producing companies have also been increasing, and some of them can be able to produce vague software that can be used by hackers to access data, information or even hack passwords of machines in organizations. Therefore, this becomes a threat since it is a crime to produce program assisting a hacker to get access to information of any organization unlawfully. Implementation of different ways of dealing with the crimes related to the introduction of new technology in the society can lead to other criminal cases being encountered. Therefore, this calls for keenness when dealing with cybercrimes and internet related crimes in a society. For instance, security of information in different organizations should be highly maintained by program vendors to gain confidence of companies that are using internet to secure their information. This will significantly help vendors to develop advanced systems, and increase the rates at which individuals will be using internet services for different purposes. Furthermore, having a copy of other people’s work should not be encouraged in the society, as it reduces morale of the people whose original work has been pirated. The copy of work can be either similar to original or a bit different, which can also influence the originality of products and services being offered. Media has also been affected by the introduction of technology as it can have their information distorted before it is delivered to the intended people. This has been done mainly by the use of technology and technological resources such as computers and \ internet services being offered. In addition, corrupt information, therefore, becomes a threat to the media and organizations that are related to production of data and information that is relayed to a great multitude. This calls for a measure to be taken to ensure that information delivered to the people is keenly checked severally to ensure that it is not tempered. Recommendations The use of new technology in society should be keenly dealt with as it has been found to have several crimes with it. The various crimes that are because of new technology have been found to have a negative effect the globe and have effects that can be long term to the people in a society. Therefore, trying to find solutions to the main crimes and rate at which crimes are performed should be an idea in the current society, and this will help to influence people’s life in the world positively. Relative to the use of internet and its services, there should be ways that should be sought to ensure that data and information of different organizations is kept safe, and organizations are assured that they could not have their data distorted. This will then help to ensure that work being done by different organizations is convincing, and people in a society are not looked down upon in relation to what they expect of an organization. Moreover, the government should also enforce some laws and order that will help them reduce the number of hackers using internet in globally. This will help increase the security of data and information in different organizations found in diverse parts of the world. Lastly, organizations producing software used in online/internet, should be checked keenly, and the management be advised that they should not allow any illegal production of software by the companies. This will then help to reduce the rate at which hackers intrude to the organizations’ data, information and passwords. There should be laws and regulations that are enforced to govern the use of internet services by users, as they should not be found in some of the sites. References Anderson, R. et. al., 2011.Measuring the Cost of Cybercrime.Cybercrime, 4 (2), 9-23. Zittrain, J., 2008. The Future of the Internet: And How to Stop It. Allen Lane: London. Jerome, T. 2011. Overseas cyber-crimewave taking $600m a year from the taxman. The Independent,5 (2) 10-15. Martine, G. 2011. Preparing for sustainable urban growth in developing areas.Urban Growth: Global Trends and Challenges, 2 (1), 6-30. Schwabe, W., Davis, L., and Jackson, B. 2005.Challenges and Choices for Crime-Fighting Technology.Federal Support of States and Local Law Enforcement,3 (1), 4-6. Tyler M., Richard C., and Ross A. 2009.The economics of online crime.Journal of Economic Perspectives, 23(3), 3-20. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Crime, Media and Technology Coursework Example | Topics and Well Written Essays - 1500 words, n.d.)
Crime, Media and Technology Coursework Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/social-science/1784761-to-what-extent-do-new-technologies-contribute-to-new-categories-of-crime
(Crime, Media and Technology Coursework Example | Topics and Well Written Essays - 1500 Words)
Crime, Media and Technology Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/social-science/1784761-to-what-extent-do-new-technologies-contribute-to-new-categories-of-crime.
“Crime, Media and Technology Coursework Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/social-science/1784761-to-what-extent-do-new-technologies-contribute-to-new-categories-of-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Crime, Media and Technology

Analysis of crimestoppers

he program brings together law enforcement,private citizens,the media to find criminals.... he program brings together law enforcement,private citizens,the media to find criminals.... He realized that there was someone in the community that could help solve the murder of this college student and he knew that people would come forward if they could do it anonymously, they would be paid for a lead that led to solving the crime and the media televised the first “Crime of the Week....
6 Pages (1500 words) Research Paper

Fear of Crime, Psychology of Misdeed

The perceived levels of crime are usually supported by an individual with a reliance on information they have gathered from various media and what they have seen for themselves.... The paper "Fear of crime, Psychology of Misdeed" states that is a condition that an individual can be said to be suffering from, it can also have its own advantages as well.... Those who experience fear of crime are extra cautious when dealing with issues such as safety and security....
7 Pages (1750 words) Essay

Treat Violent Crime

technology has enabled us to do things that we never imagined before.... technology has enabled us to do things that we never imagined before.... In today's world, freedom of speech and the freedom to the media have made the general public more aware of all the activities that are taking place around the world.... hellip; When the media reports events and news, they give it their perspective and their perspective can change the way people think about a particular event or incident....
2 Pages (500 words) Essay

School Shootings and Active Shooter and the Media

This act may happen any place in… This shooting have flashed a political discussion over whether guns should be allowed in the school or if there should be transfer gun control. There are prominent school shootings in Europe, Asia, ocean region, United State among This act has obtained wide media attention and are frequent in the United State of America.... ov/active-shooter-preparedness) media as the source of data has worked hard to eradicate the crime....
4 Pages (1000 words) Research Paper

Trends in Management Technology

This paper stresses that technology has transformed the lives of people all over the world.... It is tough to imagine a life without technology.... hellip; As the paper declares the changing trends in management technology have brought the science and craft of management to a whole new level.... Video conferencing technology is not only helpful in reporting a crime but also in its prevention.... nbsp; From this discussion it is clear that James Hunt's report on police conferencing demonstrates how efficient the process of reporting a crime and apprehending criminals has become....
4 Pages (1000 words) Assignment

Computer Crimes: Thefts

… The paper "Computer Crimes" is an outstanding example of an essay on technology.... Combined with the use of the internet that brings people together allowing communication and exchange of information from different parts of the world just by the touch of the mouse, there is much in terms of both vices and virtues that this technology has brought amongst its users.... The victim accounts range from your own bank account to social media accounts....
2 Pages (500 words) Essay

Stalking-Related Crimes Should Be Paid More Attention

In this era that has been dominated by technology in the use of social media platforms, crimes such as stalking have been increased.... This kind of crime is normally carried out in various ways.... Due to the rise in this crime in different states in the country, the federal government has passed various rules to take care and give directions for this type of crime.... Victims of this type of crime normally believe that their attackers are obsessed and that they want to control their lives (Meloy & Gothard 258)....
5 Pages (1250 words) Essay

The Security of Personal Information

"The Security of Personal Information" paper argues that privacy must be protected, but there should also be a limit to how “secretive” a person could be.... There are times when it is in a person's best interest that information about him/her should be made known.... hellip; The problem today is that personal information is given for financial, recording, and other important purposes may be accessed public because of the World Wide Web....
3 Pages (750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us