Technology Is The Main Cause Of International Cyber Crime

Great Essays
International Cyber Crime

It is not in disputed that technology has transformed the world into a global village. According to Okeshola and Adeta (2011), technological advancements have made it possible for nations to develop and boost their networks of communication, allowing faster and reliable networking and exchange of information. Today, there are about two billion people using the internet and more than five billion cell phone connections across the globe (KPMG, 2011). Most people in the world today rely on constant access and precision of these channels of communication. However, the increasing reliability and popularity of digital platforms has its demerits. As societies and organization increasingly depend on computers and social networking,
…show more content…
According to Broadhurst et al (2014), with increasing reports on cyber crimes, anybody would expect to see higher conviction rates. This has however not be the case with numerous investigations and prosecutions being unable to take off (Gercke, 2012). The main causes of this outcome according to Zavrsnik (2010) could be linked to trans-jurisdictional or international barriers and the inability of major stakeholders in the justice system to understand important elements of technology-assisted crime. Another cause is subterfuge. In the same way that the use of forensic inquiry is influenced by science, the ability of investigators and judicial processes to understand illegal employment of technology also has direct impact on the rates of conviction (Dubord, …show more content…
29, no. 3, pp. 408-433
Dashora, K., (2011), “Cyber Crime in the Society: Problems and Preventions”, Journal of Alternative Perspectives in the Social Sciences, vol. 3, no 1, pp. 240-259
Dubord, P., (2008), “Investigating Cybercrime”, In J. J. Barbara (Ed.), “Handbook of Digital and Multimedia Forensic Evidence” (pp. 77-89), Totowa, NJ: Humana Press Inc
Gercke, M., (2012), “Hard and soft law options in response to cybercrime - How to weave a more effective net of global responses”, Computer Law Review International, vol. 3, pp. 78-87
Hassan, A., Lass, F. and Makinde, J., (2012), “Cybercrime in Nigeria: Causes, Effects and the Way Out”, ARPN Journal of Science and Technology, vol. 2, no. 7
KPMG International (2011), “Cyber crime – a growing challenge for governments”, online source Available at: https://www.kpmg.com/Global/en/IssuesAndInsights/Articles Publications/Documents/cyber-crime.pdf [accessed 11 October,

Related Documents

  • Improved Essays

    The famous case of twenty two year old David Camez was one of many that violated cybercrime not only in the United States, but globally as well. Camez was found guilty of committing racketeering crimes along with committing fraud across the globe through an international website called Carder.su. Though the website was not only David Camez’ investment but also fifty other members, who were not found guilt or sent on trial. The members of the website were basically giving money to hack into other networks and steal personal information of customers all over the world. The hacking included stealing people’s identities and credit card information.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The criminal justice community is always evolving, there are changes in technology that have caused shockwaves through the system that reach an international level. In the review of the current system, the impact of globalization on the United States criminal justice system will be assessed, as well as comparing and contrasting the international criminal justice systems. Which include Civil Law, Common Law, Islamic Law, and Socialist Law traditions. Additionally, the impact that cybercrime and technology have on the worldwide justice system, and the differences between the policing systems that exist throughout the world will be examined. Finally, the major crimes and criminal issues that have a global impact on the justice systems around the world will be appraised.…

    • 1770 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Battling Child Exploitation with digital forensics is a well written article discussing the outrageous growth of child sex trafficking due to the growth of technology and the easy access to speedy communication around the world. The increase in this category of crimes is in a 1,000-percent increase since 2004. Along with that statistic, “The National Consumers League states 56 percent of children between the ages of eight and twelve have a cellphone, with the average age of receiving a first hone being 10-11.” Consequently, not even the growth of our technology fed world is the problem, but the age at which we are allowing technology consumption is as well a figure to be noted. Predators today use the internet, phones, apps, etc. to commit…

    • 839 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    White Collar Crime Paper

    • 1009 Words
    • 5 Pages

    For instance, in 2015, researchers estimated that 43 percent of the world population are using the Internet. A year later, the number increased from 43 percent to 47 percent (Taylor, 2016). The fact that more people are using the Internet, the more technocrimes, and other form of white-collar crimes would be committed. As it is stated on the text (Trusted Criminals), “Computers and other forms of modern technology play an increasingly central role in many white-collar crimes, and this role will surely expand in the future” (Friedrichs, 2010). With that say, certain form of white-collar crimes will continue to be increasing as world population getting to involve more on the…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The foundation of computer crimes lies with The Computer Fraud and Abuse Act (CFAA) of 1986, 18 U.S.C. 1030. According to Easttom and Taylor (2011), the CFAA was a federal act which provided protection of computer systems that were part of a federal entity or financial-institution. Over time and through a series of congressional hearings, lawmakers have amended and tailored language in a manner to protect the government's interest in computer crimes while striking a balance with the ability of the states to mount their own initiative in a state's prosecution (Department of Justice, n.d.). Congress has continued to amend the CFAA just as cyber crimes continue to take advantage of the evolution of the computer and cyber communications.…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the shifting landscape from criminal elements operating in the traditional physical world to the cyber domain, jurisdictional issues are sure to become a problem for police departments if they are not already. According to one group of researchers, criminals are committing crimes, such as identity theft, from home that previously required teams of people and intense coordination, thus, technology-enabled crime has arrived and will continue to develop (Treverton, Wollman, & Wilke, 2011). As the Internet has changed the way we interact, socialize, shop, and receive our news and politics, so has the criminal elements using it. With that, it is sure to become increasingly challenging for policing the cyber domain from a jurisdictional…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Internet is a place where people are engaging in social interaction (Bargh & McKenna 2000). The Internet provides its users with access to the world of social media. In recent years, the Internet has become a form of social networking. However, given the frequent use of the Internet and its different…

    • 2193 Words
    • 9 Pages
    Improved Essays

Related Topics