Advantages And Disadvantages Of Cyber Crime

Superior Essays
Cyber-crime is vigorously growing in our country. The increase in broadband access has resulted in an increase in internet users. Thus, India has become a 'safe haven' for cyber criminals. Broadband access or connectivity of internet created the virtual world known as “cyberspace”. Cyber space is very wide representation, including cyber-crime, computer, net banking, web engineering, storage media, networking tools. In a current era cyber experts or hackers are very smart and use the latest technology for hacking they know all the cyber laws and find out the loopholes within that law and perform the illegal activities in cyberspace and it’s referred as cyber-crime. There is no one exhaustive definition of the term “Cyber law”, however, simply …show more content…
Nowadays kids are mostly connected to the wires and communication, which is unknown to the supervision of their parents and numerous surveys have estimated that 91% kids 12-15 years old and almost all teenagers 16-18 years old using …show more content…
The European Union in 2001 adopted convention on cyber-crime in order to combat crimes in cyber world. In the Convention, parties are required to take legislative and other measures, in their substantive criminal laws, necessary to establish criminal liability for offences like Illegal Access, Misuse of Devices, fraud and forgery related to computer, and Offences Related to Child Pornography, Infringements of Copyright and Related Rights and Attempt and Aiding or Abetting of offences. Parties to it can adopt necessary measures for establishment of certain powers and procedures for specific criminal investigation and proceedings to protect and safeguard human rights and

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In “The Undercover Parent,” a newspaper article written by Harlan Coben (in March 16, 2008), Coben insists that parents install spyware on their children’s computer, but to use it only to a specific level. He argues that parents should have this software to make sure that their kids are guarded and that they are not contacting with anyone that may cause them any harm. However, he also understands that parents should not use it to find out personal information or to read the gossip that happens at school. He supports his points by giving many real life examples and connecting them to what parents care about most: their children’s safety. I have come to agree with Coben’s position as I also believe that parents should have this software because…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Thousand Oaks: Sage Publications, pp.466 - 471. In the book, J. Miller discusses the idea of criminology in the twenty-first century, since the arrival of computers in the 1970’s and with the further introduction of the web in the early 1990’s there was increased use of these technologies by criminals as a means of committing cybercrimes awhile masking their identity’s.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Distracted Driving

    • 1041 Words
    • 5 Pages

    Although many laws have been proposed, a positive solution to this nationwide problem is to use parental controls on teenagers cell phones so they can limit the harmful and degrading media that is allowed on their child’s phone without parental controls. Although there are many dangers of technology, it is not only negative. It allows people to be connected to friends and loved ones at all times, the internet allows people to learn more about topics they are interested in increasing the education of society, and on a dull day entertainment sites are used. There are many positive features to technology but the danger happens when these features are used at the wrong time or irresponsibly. Like many other things in life, dangers could be avoided if educating others was a…

    • 1041 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The situation has changed by 2001; approximately 90% of teens interviewed owned a mobile phone. The usage of mobile phones is increasing everyday where the youngsters are getting too much involved. Because of this advantage, advertisers will get the more views and results from the ad viewers. The teens are getting influenced by whatever appears on their screen, because it seems too interesting and attractive. The social circles are getting more and interaction is increasing due to which connectivity is being more among youngsters.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    “In an American study of 130 children ages 11 to 13 years, participants’ IM (instant message) partners were usually friends from school. However, 12% of IM partners in this study had been met online.” (Fleming and Rickwood) This proves that most of those children do not talk to people they do not personally know on the internet. There is a handful of kids that are very careful and responsible for what they are doing on the internet and who they are talking to.…

    • 1574 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The chances of seeing a child under the age of 13 with a smartphone are becoming higher everyday, children as young as 8 even have smartphones! The dangers of the internet are very apparent and children are easily succumbing to these risks. Social media is around for communication amongst those who know how to do it correctly. Today, more than half of children under the age of 13 use social media apps. While parents are allowing their children to use social media without supervision, they should not be permitted to.…

    • 1548 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays