9 Sep 2022

67

Digital Crime in the Globalized Technological World

Format: APA

Academic level: High School

Paper type: Essay (Any Type)

Words: 820

Pages: 3

Downloads: 0

The current society is highly dependent on digital tools such as computer systems and related technology for various daily uses ranging from payments systems, banking, learning, and communication. The spread of information and communication technology and their pervasive application across demographics, socioeconomic, and geographical boundaries has been a trend in the contemporary society. While some of the benefits of computer systems have been increased efficiency of doing things and interconnectedness, opportunities for digital crime and digital criminals have also increased. Specifically, trends show that cybercrime risen drastically over the past such that they are as common as conventional organized crime (Zhigang, 2011). The digital environment has not only created new and ‘innovative’ ways of committing crime, but also evading the same especially due to anonymity involved (McCusker, 2007). 

According to McCusker (2007), c ybercrime encompasses all activities that use computer systems and other networks to virtually access and commit crime especially over the internet. Some of the major categories of computer crimes include internal computer crimes, telecommunications crimes, computer manipulation, and computer hardware and software theft. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Internal computer crime. 

This category of crime is usually as a result of malicious intention to corrupt or damage information, which is usually conducted through malicious software, computer virus, worms, or Trojan horses. For example, a former employee and systems administrator of UBS Company allegedly used a logic bomb to damage the company’s computer network out of anger and revenge, an action that cost the company greatly. 

Computer software and hardware theft 

This computer crime mostly involves illegal access of computer software and hardware for personal use. For example, there are widespread cases of software piracy where software is downloaded and distributed illegally by people who are not owners. 

Telecommunication crime. 

In this form of computer crime, criminals hack computers or remotely access private or corporate computer networks and commit various crimes such as theft of sensitive information and money. Criminals can also tamper with the normal operation of those networks such as through shutting down systems, websites, stealing identities, and harassing victims. For example, in March 2016, seven Iranian cyber criminals attacked numerous banks and targeted other financial institutions in the US. 

Computer manipulation 

This crime involves the manipulation or modification of computer files and records to cover up for a crime committed. Most of these is editing, deleting of files. For example, various people such as employees (such as accountants) working in an institution have been charged of embezzlement of company funds, in which they transfer money to their personal accounts and manipulate computer records to avoid being discovered. 

The most common forms of digital crime include identity theft, hacking, cyber bullying and harassment, and use theft. Identity theft is the most common to individuals have personal information and accounts on web based sites. Criminals are able to remotely access details regarding a person’s bank account, credit card numbers, and other personal details, which are then used to defraud money or ruin reputation (Zhigang, 2011) . Criminals use identity theft to buy goods using other people’s money, obtaining employment, among others. Cyberbullying and harassment is also very common and it is on the rise especially on children and teenagers. With internet, criminals are able to stalk other users with threatening messages (on social media sites) or emails. Such crime sometimes degenerate to real life stalking. Hacking is also common. Hacking usually involve remote intrusion to computers and networks, email accounts, social media pages, business websites with malicious intent such as theft of information or sabotage (McCusker, 2007). Online fraud and theft are also common especially for banks accounts where criminals are able to transfer money from banks to their accounts. Theft of material with copyrights is also common on things such as computer software, documents, and media files. 

Presently, telecommunications cybercrime presents the greatest threat in the current society. As noted earlier, the present society is dependent on information and communication systems to carry out most of the activities (Zhigang, 2011). Accordingly, most sectors of the economy including education, military, government institutions, financial sector, and health care use telecommunication services to perform their activities. Cyber criminals nowadays target all sectors to further their agendas (Kumar & Mittal, 2012) . Banks and major financial institutions have been targets of cyber-attacks, and this increases the level of risk of financial loss through fraud. Terrorists can also spread hate messages and incitement messages anonymously after hacking popular websites of various institutions. In addition, the risk of government and military secrets being stolen by cybercriminals is a big threat to world peace and security. Generally, the cybercrime of telecommunication is the most dangerous because it affects fundamental sectors of a country, which means everyone is threatened (Kumar & Mittal, 2012). 

The US government and other law enforcement agencies have put significant effort to combatting cybercrime. First, there is a police department for network security and another task force in which various agencies team up with corporates, academic experts, and companies deal with all issues related to cybercrime. Combatting cybercrime has been collective and has encouraged cooperation with internet service providers, universities, and complaint centers. The government has also engaged in cybercrime training as well as increasing community awareness on cyber safety. In terms of response, the various agencies have increasingly used the social media for investigation. An additional recommendation to ways of combatting this crime is that law enforcement agencies can engage in diplomacy through cooperation with other countries. Essentially, the major threat lies with international criminals and capturing and prosecuting them can only be possible through diplomacy (McCusker, 2007) . 

References 

Kumar, P. & Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime: International Journal of Techno ethics , 3 (1), 43-52. http://dx.doi.org/10.4018/jte.2012010104 

McCusker, R. (2007). Transnational organized cybercrime: distinguishing threat from reality. Crime, Law and Social Change , 46 (4-5), 257-273. http://dx.doi.org/10.1007/s10611-007-9059-3 

Zhigang, Y. (2011). Cyber Variants of Traditional Crimes and Criminal Law Responses. Social Sciences in China , 32 (1), 66-79. http://dx.doi.org/10.1080/02529203.2011.548919 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 17). Digital Crime in the Globalized Technological World.
https://studybounty.com/digital-crime-in-the-globalized-technological-world-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration