More Subjects
Name of Student
Name of Professor
Name of Class
Day Month Year
Argument Essay
The argumentative essay is based on the topic "cybercrime." Cybercrime can be defined as the crime carried out through electronic media. It is a form of abuse and mental torture inflicted by utilizing the manifestations of online technology, or we can say it is the misuse of information technology to harm someone online. Computer and internet are becoming an essential part of our lives, and making our lives easier through easy and quick connectivity. It has made business and personal life more convenient. Some people are using the advancement of technology in a positive way while others are misusing it. The cybercrime is a rising crime in the contemporary world which is an adverse manifestation of technology and ought to be dealt with stringent regulations.
To begin, every day thousands of people become the victim of cybercrime where most of them not even know about the perpetration of the crime. Several modes of criminal activities are inflicted. These include pornography, defamation, harassment, cyber terrorism, industrial espionage, and regulatory offenses. The main argument of the paper is that cybercrime is not a new kind of crime. It is the same old crime, now committed through new methods with the help of advanced technology. Therefore it is required that lawmakers address the new aspects of crime and laws against them with the public.
In past crime like harassment, bullying and terrorism were the problems in society; it has become more severe as criminals today are making use of information technology for their crime. Everyone who uses the computer and the internet is at risk. People who commit cybercrime may have some motivation behind, or it is also possible as they are committing it unknowingly. Therefore it is necessary not only for the victims to have knowledge about the cybercrime and cybercrime law but also the person who commits these crimes unknowingly. In this essay, the potential manifestations of cybercrime will be underpinned to highlight its adverse impacts and necessary preventive measures.
Moreover, cybercrime is a big concern of almost every country. Millions of computers are connected to the internet. This internet is developing an electronic connection between the computers. The word cybercrime is linked to the computer and the internet. Actions that break or violate the law by using computer and internet is a cybercrime. If your computer has an internet connection, then you are also at risk. Sometimes it is not compulsory for the criminals to have some personal issues with you, until they commit cybercrime influenced by a radical mission where you, unfortunately, become their target.
Furthermore, there are various kinds of cybercrime. The first type of cybercrime is crackers. These are the people who commit cybercrime just for fun. Their intention is not to hurt someone but to tease. These people do not even know that they are becoming a part of cybercrime. Hacking is the cybercrime which people attempt to explore the personal or confidential information from other computers. The third kind of cybercrime is the prankster. They trick others, but they do not have the intention to give harm to others for a long time ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"mETifksP","properties":{"formattedCitation":"(Sarre et al.)","plainCitation":"(Sarre et al.)","noteIndex":0},"citationItems":[{"id":106,"uris":["http://zotero.org/users/local/mlRB1JqV/items/XIKPM2PS"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/XIKPM2PS"],"itemData":{"id":106,"type":"article-journal","title":"Responding to cybercrime: current trends","container-title":"Police Practice and Research","page":"515-518","volume":"19","issue":"6","source":"Crossref","DOI":"10.1080/15614263.2018.1507888","ISSN":"1561-4263, 1477-271X","shortTitle":"Responding to cybercrime","language":"en","author":[{"family":"Sarre","given":"Rick"},{"family":"Lau","given":"Laurie Yiu-Chung"},{"family":"Chang","given":"Lennon Y.C."}],"issued":{"date-parts":[["2018",11,2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sarre et al.). Career criminals is the most dangerous kind of cybercrime. They commit the crime with full awareness about what they are doing. They become part of this bad action to earn money through wrong deeds. They perform an offensive act as organize mafia gangs, or promote pornography. Cyber attackers are the criminals who hack government or other sensitive websites to crash it or add trafficking. Cyber bulls are the criminals who are present around us. These are the common people who bully others online for fun or to hide their own complexes. All these criminals are the bad side of society since the past, and the difference is that the advancement of technology is being used to organize these crimes nowadays.
In addition, the various cybercrimes have caught the attention of the government and police. Evidence shows that the government is more concerned about the crime related to terrorism and espionage. The government is already working to control terrorism in the country, where borderless internet is creating more complications to resolve the issue. The government is concerned as they can be targeted from any part of the world ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"o95oAfuw","properties":{"formattedCitation":"(\\uc0\\u8220{}An Extended Model of Cybercrime Investigations. | Request PDF\\uc0\\u8221{})","plainCitation":"(“An Extended Model of Cybercrime Investigations. | Request PDF”)","noteIndex":0},"citationItems":[{"id":114,"uris":["http://zotero.org/users/local/mlRB1JqV/items/HDVRZUXI"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/HDVRZUXI"],"itemData":{"id":114,"type":"webpage","title":"An Extended Model of Cybercrime Investigations. | Request PDF","container-title":"ResearchGate","abstract":"Request PDF on ResearchGate | An Extended Model of Cybercrime Investigations. | A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and supporting the development of new techniques and tools for investigators. In this paper a model of investigations is presented which combines the existing...","URL":"https://www.researchgate.net/publication/220542517_An_Extended_Model_of_Cybercrime_Investigations","language":"en","accessed":{"date-parts":[["2019",3,15]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“An Extended Model of Cybercrime Investigations. | Request PDF”). To control terrorism and espionage, various agencies along with police are working day and night. But through internet criminals can engage in the crime without acquiring special skills related to information technology. Therefore cybercrime has created the challenges for the government and law enforcement institutions to implement their laws and regulation.
Besides, evidence reflects that it is important to know the mentality or point of view of the offenders. Research in which researchers have conducted interviews with the offenders shows that cybercrime is a new topic of the old book. The act of offenders does not reflect their overall personality. The interviews show that many offenders who did cybercrime were unaware that they committed unlawful thing. Also, there were some offenders who used cybercrime to give harm to someone because they consider themselves weak. They were unable to give someone harm personally or physically, so they used the computer and internet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"V62P5YSR","properties":{"formattedCitation":"(Hutchings and Holt)","plainCitation":"(Hutchings and Holt)","noteIndex":0},"citationItems":[{"id":116,"uris":["http://zotero.org/users/local/mlRB1JqV/items/UDPS63DA"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/UDPS63DA"],"itemData":{"id":116,"type":"article-journal","title":"Interviewing cybercrime offenders","source":"www.repository.cam.ac.uk","abstract":"Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse have not kept pace with this broader trend. The aim of this research is to identify potential best practices for researchers considering qualitative interviews as a method for researching computer misuse offenses, more commonly involving hacking techniques. The authors interviewed six experienced researchers who conducted qualitative examinations of active or incarcerated cybercriminals to understand their common experiences with recruitment, ways in which they interviewed research participants, ethical issues, and publishing their research. This analysis explores the difficulties associated with this area of research that are not typically discussed in the methods section of a research paper. The findings demonstrate the problems that emerge in research and the precautions researchers may need to take to protect themselves, their participants, and the research data.","URL":"https://www.repository.cam.ac.uk/handle/1810/276909","DOI":"10.17863/CAM.24191","language":"en","author":[{"family":"Hutchings","given":"Alice"},{"family":"Holt","given":"Thomas J."}],"issued":{"date-parts":[["2018",6,12]]},"accessed":{"date-parts":[["2019",3,15]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Hutchings and Holt). Then there were some offenders who were fully aware of their actions and its result. Evidence shows that it is necessary to provide sufficient knowledge to the people about cybercrime. Therefore, it becomes easy for the law enforcement institutions to identify the innocent from the criminals.
To deliberate the evidence, the instances of cybercrime inflicted on the victims depict the depth of the crime. The survey showed that about three percent of people faced online shopping fraud, about two people becomes the victim of online banking fraud, and three percent faces harassment and bullying. Other victims explained their problem, and they were being stalked and threatened by the criminals. Approximately six percent were the victims of hacking. The study does not identify the difference between the different victims due to the different questioning and methods variation. It is important to understand that just like different type or cybercriminals, victims are also categorized into two types. First, there are victims who know about the complications of the problem they faced. There were well aware of the cybercrime, and its law. Due to the proper information, it becomes easy for them to solve the issue ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Ew5tq0NP","properties":{"formattedCitation":"(Reep-van den Bergh and Junger)","plainCitation":"(Reep-van den Bergh and Junger)","noteIndex":0},"citationItems":[{"id":110,"uris":["http://zotero.org/users/local/mlRB1JqV/items/FQTMJSE7"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/FQTMJSE7"],"itemData":{"id":110,"type":"article-journal","title":"Victims of cybercrime in Europe: a review of victim surveys","container-title":"Crime Science","page":"5","volume":"7","issue":"1","source":"BioMed Central","abstract":"Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime.","DOI":"10.1186/s40163-018-0079-3","ISSN":"2193-7680","shortTitle":"Victims of cybercrime in Europe","journalAbbreviation":"Crime Science","author":[{"family":"Reep-van den Bergh","given":"Carin M. M."},{"family":"Junger","given":"Marianne"}],"issued":{"date-parts":[["2018",4,4]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Reep-van den Bergh and Junger). While other types of victims were those who did not know much about the cybercrime, they knew it was an unlawful act if they experienced it personally, but as the crime was linked to the information technology, their knowledge becomes limited. They were tense and confused because of the situation but struggled to handle it due to the lack of cybercrime law knowledge. The complications of cybercrime and its laws vary from country to country.
After understanding the position of criminals, victims, and the government along with law enforcement institution, it is important to find out its preventions. Crime was part of society before and laws are also present for all the criminal acts that are for bullying, harassment, terrorism, and espionage. The challenges that arise after the advancement of technology is how to control these crimes when committed online or with the help of information technology. Evidence shows that it is difficult to handle online crime with the help of local police and other institution. There should be a large complex network to detect and prevent the cybercrime. Once cybercrime is detected, and the criminal gets arrested then it becomes easier to enforce the criminal act on the criminals ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"nRDpDs1y","properties":{"formattedCitation":"(Sorensen et al.)","plainCitation":"(Sorensen et al.)","noteIndex":0},"citationItems":[{"id":112,"uris":["http://zotero.org/users/local/mlRB1JqV/items/AHIM3DK6"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/AHIM3DK6"],"itemData":{"id":112,"type":"article-journal","title":"An Approach to Detect and Prevent Cybercrime in Large Complex Networks","container-title":"(:unav)","source":"DataCite","URL":"https://ieeexplore.ieee.org/document/8560687/","DOI":"10.1109/cybersecpods.2018.8560687","author":[{"family":"Sorensen","given":"Andre"},{"family":"Remy","given":"Maxime Jerome"},{"family":"Kjettrup","given":"Nicolaj"},{"family":"Mahmoud","given":"Rasmi Vlad"},{"family":"Pedersen","given":"Jens Myrup"}],"issued":{"date-parts":[["2018",6]]},"accessed":{"date-parts":[["2019",3,15]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sorensen et al.). Other than that precautions like anti-virus for hackers and pranksters are required. Lastly, proper information should be granted to the common people about the cybercrime and its consequences to reduce the cybercrime rate in the country.
To conclude, cybercrime is the type of crime which is directly linked to the computer, internet, and information technology. Thousands of people become a victim of cybercrime every day. There are various types of cybercrime. Criminals commit cybercrime when someone motivates them from behind, or they have a radical mission. There are various types of crimes related to cybercrime. They include hackers, crackers, cyberbullying, cyber terrorism, and pranksters. It is argued that these types of criminals are part of society from the past. The only difference is they have found a new mode to commit the crime. The drug dealers, terrorist, people who bullied and harassed others were present already in the society. Laws are also promulgated for these criminals, but because of committing crime through computer and internet, it becomes difficult to control these crimes. People who use computers are on risk. Therefore it is necessary that the government should develop a wider network to control the cybercrime. Besides, proper guidance should be provided to the civilians. This is because many times innocent people commit a criminal act without realizing that they are doing some unethical act. Also, many victims do not understand the complication of their problem and face difficulty to fight cybercrime. Therefore it is necessary that people should know about the cybercrime, its laws, and preventions.
Works Cited
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY “An Extended Model of Cybercrime Investigations. | Request PDF.” ResearchGate, https://www.researchgate.net/publication/220542517_An_Extended_Model_of_Cybercrime_Investigations. Accessed 15 Mar. 2019.
Hutchings, Alice, and Thomas J. Holt. Interviewing Cybercrime Offenders. June 2018. www.repository.cam.ac.uk, doi:10.17863/CAM.24191.
Reep-van den Bergh, Carin M. M., and Marianne Junger. “Victims of Cybercrime in Europe: A Review of Victim Surveys.” Crime Science, vol. 7, no. 1, Apr. 2018, p. 5. BioMed Central, doi:10.1186/s40163-018-0079-3.
Sarre, Rick, et al. “Responding to Cybercrime: Current Trends.” Police Practice and Research, vol. 19, no. 6, Nov. 2018, pp. 515–18. Crossref, doi:10.1080/15614263.2018.1507888.
Sorensen, Andre, et al. “An Approach to Detect and Prevent Cybercrime in Large Complex Networks.” (:Unav), June 2018. DataCite, doi:10.1109/cybersecpods.2018.8560687.
More Subjects
Join our mailing list
© All Rights Reserved 2024