Thursday, December 12, 2019
Understand Current Perspectives in Criminal Behavior
Questions: 1. A comparison of the similarities between these five different computer criminal behaviors and typologies? 2. A comparison of the differences found between these five different computer criminal behaviors and typologies? 3. An analysis of how organizations can benefit from understanding each of these different computer criminal behaviors and typologies? Answers: Introduction Computer crimes refers to the extensive use of the information technology for illegal purposes or for unauthorized access of the computer system where the intent is to damage, delete or alter the data present in the computers. Even identity thefts, misusing devices or electronic frauds are considered as computer crimes. Additionally, there are other crimes such as cyber crimes, credit card account theft, internet fraud and telemarketing frauds. There are five major cyber crimes which are to be taken care of or which can affect someones personal life and are as follows:- Cyber stalking Identity theft Computer virus Phishing Hacking Cyber stalking Cyber stalking can simply be termed as online stalking. Data destruction, monitoring, exploitation of minor all comes under cyber stalking. Instant messages, emails, phone calls and other communication devices are used by the cyber stalkers to harass the people and annoying attention to their life and family activities. Stalking can be simply understood as following somebody with the intent to harass them and which is unwanted, often abusive and usually illegal. This cyberstalker may be anybody a former friend, an ex or someone who just want to bother you. Cyber stalking can harm in may ways like: damage of career, confidence, credits and friendship etc.. Moreover, it is observed that the cyberstalking victims are also the victims of domestic violence. The enhancements in technologies are making life easier day by day, but on the contrary, it is giving unmatchable power and information to the cyberstalkers to harass people. Recently, a girl in Washington was sentenced to death for a cyber stalking incident in which she and her friend treated her classmates account with solicitation for sex and explicit photos. Identity thefts It refers to all the crimes in which somebody obtains personal data through wrong means and particularly for economic gain. All the passwords personal data such as credit card number or bank account number, social security number, telephone calling card number, and various identity data can be used by the culprits to personally profit on someone other expenses. Only the fingerprint which is unique and cannot be identical to other is safer. In some cases, the fingerprints are also used in recent years, but this is a rare case. These personal data should be kept very safely, such that they dont fall into the wrong hands, because then it become vulnerable to theft. Many cases of unauthorized person taking their funds out of victims bank account and in some rare cases it had happened that the complete identity of a personnel have been used such that the victim indulges in vast debts and committed crimes in the name of the victim. This causes a great problem for the victims for which the criminal was responsible. One example of medical fraud happened in the US. Gerald Barnes stole the identity of Gerald Barnbaum after losing his own pharmacist license after committing medical fraud. A diabetic patient died under his care after that he also worked as a physician for FBI agents. Now he is behind the bar and serving hard time. Computer Virus Generating a computer virus, malware or trojan is not a crime, but if this is to be spread to other computers for any illegal purposes, then it will be treated as a crime and the person will be liable for any infection or damage caused to others computer. In 2009, a girl from Manila in Philippines texted an email to his boyfriend which was a love letter. This email replicated itself to everyones outlook account and then destroyed all the local files. Due to this email many organizations had to shut down, losing all their organizational data. Later, the computer users were literally feared to let love in their lives. Phishing This is email fraud method in which the perpetrator sends emails which look legitimate in the first look and it asks for personal and financial information from people. Generally, the name taken in email appears to be trustworthy and well known such that everyone gets attracted to it. Yahoo, MSN, America online, PayPal and Ebay are the names taken by the frauds and itself gives lure hope of transferring a great amount of money into ones account. Recently, In India emails for different mail holders was sent from the name of RBI stating that the person has an undisputed amount of more than 4 crores INR with the RBI. And, this will be delivered to the account after giving the bank account details. Hacking The hacking of computers has been started only after the intervention of the internet era. Hacking means the usage of others system illegally or without permission. It is a major crime if the security system of any country or the governmental database is hacked. Sometimes an organization system is hacked for the purpose of fraud. 1. Similarities' between Computer crimes There are various similarities between computer crimes, but the major one is that all the computer crimes take place only because of our mistakes. One should be very careful towards these computer crimes and try to avoid all the circumstances leading to these situations. Every computer crime leads to the loss of the victims by great means and in some case loss of life may also take place. 2. Differences between Computer crimes A Large difference exists in the investigative process and these are revealed by the definition extinctions. Traditional crimes are generally concerned with the person or property offenses that law enforcement has continued to struggle. Whereas non traditional crimes involves a computer for the current work and to encompass that. Non- traditional crimes have not received much attention as compared to the traditional crimes. They do not cause the same instinctive and emotionally-charged reaction, whereas conventional crimes do the same. It is very difficult to observe and detect the cyber crime. The relative privacy is compounded by these problems by the Internet an the transcendence of geographical and physical limitations of cyberspace. 3. How the organizations can be benefited by understanding these issues These issues should be known to the organizations or the pupils whose life is surrounded by computers. Having complete knowledge of the computer crimes the organization will keep their confidential data safer and not easily accessible. Cyberspace security can be increased, more options for saving data is available. The frauds, hacking issues losses can be eradicated, which will help in the success of an organization. References Rosoff, S. M., Pontell, H. M., Tillman, R. (2002). Profit without honor: white-collar crime and the looting of America. Upper Saddle River, NJ:Prentice Hall. Royal Canadian Mounted Police. (2000). Computer crime, can it affect you? Retrieved September 07 2015, from https://www3.sk.sympatico.ca/rcmpccs/cpu-crim.html Russell-Einhorn, M. L. (2004). Federal-Local Law Enforcement Collaboration inInvestigating and Prosecuting Urban Crime, 1982-1999: Drugs, Weapons, andGangs (No. NCJ 201782): National Institute of Justice.Sanders, W. (1977). Detective work. New York: Free Press.Schwartau, W. (1999). Cyber-vigilantes hunt down hackers. September 7 2015, from https://www.cnn.com/TECH/computing/9901/12/cybervigilantes.idg Silke, A. (2001). Dealing with vigilantism: Issues and lessons for the police.Police Journal, 74(2), 120-133. Skogan, W. G., Antunes, G. E. (1979). Information, apprehension, and deterrence: Exploring the limits of police productivity. Journal of CriminalJustice, 7, 217-241.Tarde, G. (Ed.). ([1890] 1903). Gabriel Tarde's laws of imitation. New York:Henry Holt.United Nations. (1994). International Review of Criminal Policy - United Lu, Y., Polgar, M., Luo, X., Cao, Y. (2010, Winter). Social network analysis of a criminal hacker community. Wada, F., Longe, O., Danquah, P. (2012, April). Action speaks louder than words understanding cyber criminal behavior using criminological theories. Willison, R., Warkentin, M. (2013, March). Beyond the deterrence: An expanded view of employee computer abuse.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.