Jump to content

Computer crime: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 25: Line 25:
* 18% of all youngsters confessed of entering and using the information stored on other personal computers or websites;
* 18% of all youngsters confessed of entering and using the information stored on other personal computers or websites;
* 13% of all the participants mentioned they performed changes in computer systems or computer files.
* 13% of all the participants mentioned they performed changes in computer systems or computer files.
The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earn money. Most teenagers performed illegal computer actions of curiosity, to experience excitement. Many cyber police is getting more complaints about [[Orkut]] these days as many fake profiles being created and thus leads to crime.
The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement. Many cyber police are getting more complaints about [[Orkut]] these days as many fake profiles are being created and thus facilitating crimes.


==Cyber criminology==
==Cyber criminology==

Revision as of 14:01, 1 June 2008

Cybercrime contains all criminal offences which are committed with the aid of communication devices in a network. This can be for example the Internet, the telephone line or the mobile network.

Overview

An international legal definition of cybercrime that is used by most of the countries in Europe and North America as well as South Africa and Japan was agreed to in the Convention on Cybercrime, which became effective on 1 July 2004.

Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.

Examples of cybercrime which the computer or network is a tool of the criminal activity include spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls), malicious code, and denial-of-service attacks.
Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.
Finally, examples of traditional crimes facilitated through the use of computers or networks include Nigerian 419 or other gullibility or social engineering frauds (e.g., hacking "phishing", identity theft, child pornography, online gambling, securities fraud, etc.). Cyberstalking is an example of a traditional crime -- harassment -- that has taken a new form when facilitated through computer networks.

Additionally, certain other information crimes, including trade secret theft and industrial or economic espionage, are sometimes considered cybercrimes when computers or networks are involved.

Cybercrime in the context of national security may involve hacktivism (online activity intended to influence policy), traditional espionage, or information warfare and related activities.

One of the recent researches showed that a new cybercrime is being registered every 10 seconds in Britain. During 2006 the computer crooks were able to strike 3.24 million times. Some crimes performed on-line even surpassed their equivalents in real world. In addition, experts believe that about 90% of cybercrimes stay unreported.

According to a study performed by Shirley McGuire, a specialist in psychology of the University of San Francisco, the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area of San Diego. Her results were presented at the American Psychological Association conference:

  • 38% of teenagers were involved in software piracy;
  • 18% of all youngsters confessed of entering and using the information stored on other personal computers or websites;
  • 13% of all the participants mentioned they performed changes in computer systems or computer files.

The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement. Many cyber police are getting more complaints about Orkut these days as many fake profiles are being created and thus facilitating crimes.

Cyber criminology

The neologism of cyber criminology is increasingly used to describe an area of study for criminologists which is separate from cyber forensics.

References

  1. Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
  2. Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm
  3. Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351
  4. Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18.
  5. McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html
  6. Mann, David and Sutton, Mike, (1999). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, vol. 38, no. 2, Spring 1998.
  7. Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge.
  8. Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge: Polity
  9. Yar, M. (2005) The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity Theory European Journal of Criminology, Volume 2 (4): 407–427:

Further reading

  • Brenner, S.W. (2007) Law in an Era of Smart Technology, New York: OUP
  • McQuade, S. (2006) Understanding and Managing Cybercrime, Boston: Allyn & Bacon
  • Pattavina, A. (ed.) (2005) Information Technology and the Criminal Justice System, Thousand Oaks, CA: Sage
  • Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge, UK: Polity
  • Williams, M. (2006) Virtually Criminal: Crime, Deviance and Regulation Online, London, UK: Routledge

Template:Wikinewshas

Government resources

Commercial resources