Virtual crimes have been on the ascent due to easier networking, personal computing, and social media. These crimes are fueled by psychological behavior such as cyberstalking, harassments, and sending threatening messages that have caused a surge in suicides, especially among adolescents. Likewise, young teens' sexual exploitation and intimidation do not reveal the perpetrators ( Babatunde & Olanrewaju, 2015 ). These virtual crimes spread hateful messages and videos to instigate and spread discrimination toward people who disagree with the opinions of others. Furthermore, a study uncovered that people received harassing emails from consistent perpetrators and are untraceable due to using VPNs. Loss of privacy has contributed to virtual crimes that come about through social media. Most people give out most of their personal information while signing up for accounts and employing the same password for all their accounts.
Individuals who commit these virtual crimes find it easy and convenient to engage. The penetrators get the fulfillment instantly even without having to leave the house. These cowardly acts occur since there is be no confrontation from the victim. For instance, an individual can send something offensive to a person or a group without being physically present to gain popularity on the social web ( Doynikova & Kotenko 2020). This is the most typical manifestation fo the crime on social media.
Delegate your assignment to our experts and they will do the rest.
This forecast is the most accurate because it affects ordinary individuals since more and more people join social media sites. When a social media app becomes a hit, more people sign up voluntarily, put their content out there, and end up becoming vulnerable to hate and scrutiny. Another reason could be most people use simple passwords for all their various accounts since it is easy to remember. Therefore, when companies get hacked, private information is leaked, then virtually anybody can access any accounts (Ceccato, 2019)
The criminal justice system's biggest challenge is finding the perpetrators of the crimes, especially if they use untraceable browsers (Tor) and bogus accounts. In that respect, there is no physical evidence such as saliva or blood sample (Taylor et al., 2011). Also, lacking the backdoor key for an end to end encryption messages. Another issue is that no laws are already in place to help prosecute perpetrators since the laws are made as time goes by and as new cases develop.
References
Babatunde, M. M., & Olanrewaju, M. K. (2015). Peer Pressure, Parental Socioeconomic Status, and Cybercrime Habit among University Undergraduates in Southwestern Nigeria. International Journal of Technology in Teaching and Learning , 11 (1), 50-59.
Ceccato, V. (2019). Crime and control in the digital era.
Doynikova, E., Novikova, E., & Kotenko, I. (2020). Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects. Information , 11 (3), 168.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson