Cyber Crimes consist of illegal activity conducted on a computer. Traditional crimes may be committed while using a computer, but cyber crime consists of more specific types of crimes, such as phishing schemes and viruses. Cyber Crime consist some special characteristics, which are as followed. 2.3.1. Low risk High Rewarding Ventures The most striking feature of cyber crimes is that they are relatively easy to commit, difficult to detect and even harder to prove. The cyber criminals with basic computer knowledge and skill can easily destroy valuable database causing huge loss or damage to the affected victims of the crime. Cyber Crimes are relatively easy, low-risk, high-reward venture. There is plenty of money to be made. The chances of…
discussing cyber victimization, the social guardians in cyberspace are the various private means like the network admins, the computer networks, both private and public, and the users themselves who monitor each other's…
media, especially by watching television can cause the person to believe the message is real and valid. These viewers are often exposed to different levels of violence and criminal acts and, therefore, believe the world is more dangerous than it actually is, this Gerbner, (1998) refers to as “mean world Syndrome” which produces a level of fear of crime. According to Gerber and Gross (1979), “this premise of realism is a Trojan horse which carries within it a highly selective, synthetic and…
Computer crime are referred to criminal activity where computer are involved. The computer may be the target of the crime or have been used to commit the crime. Net crime refers to the use of internet to commit the crime. Cyber crime are usually a combination of the two individuals and can be defined as “Offences that are committed against individual or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim…
International Cyber Crime It is not in disputed that technology has transformed the world into a global village. According to Okeshola and Adeta (2011), technological advancements have made it possible for nations to develop and boost their networks of communication, allowing faster and reliable networking and exchange of information. Today, there are about two billion people using the internet and more than five billion cell phone connections across the globe (KPMG, 2011). Most people in the…
change the way we used to use Internet for both personal and professional purpose. Without doubt or space to deny the effective impact of these social platforms on user’s daily life, professional life, and even on user’s business. However it is not just we who love the social platforms. Cyber criminals are fond of them too. All the good thing has some drawbacks and loopholes, and it is better to get to know about those loopholes before becoming a…
former US Secretary of Defense (SECDEF) Leon E. Panetta, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11.” He further elaborated on the danger our cyber based society faces in an October 2012 meeting with business leaders, highlighting high profile cyber attacks that affected Saudi Arabia and Qatar’s energy sector. In this attack conducted by unknown actors “30 thousand computers integral to Saudi Arabia and…
is socially constructed with labelling of given acts deriving from response of others (Becker, 1963). This has implications for study of crime and the recording crime statistics as this means data used to understand crime in society is drawn from social products, and these social products are based upon perception. These perceptions are usually constructed through the media, who create images to drive forward particular views, and it is in this that certain norms or categorizing of crime derives…
As a result, a cyber-crime may invite the application of not the cyber-crime specific legislation, which is the IT Act, but also general criminal legislation, which is the Indian Penal Code, 1860. Other laws will also be applicable depending on the nature of the crime, for example, the Prevention of Money Laundering Act, 2002 will be applicable to a case of online money laundering. Cyber-crime has a widespread adverse impact, especially in view of the indispensability of the Internet in everyday…
Cyber-crime is vigorously growing in our country. The increase in broadband access has resulted in an increase in internet users. Thus, India has become a 'safe haven' for cyber criminals. Broadband access or connectivity of internet created the virtual world known as “cyberspace”. Cyber space is very wide representation, including cyber-crime, computer, net banking, web engineering, storage media, networking tools. In a current era cyber experts or hackers are very smart and use the latest…