Cybercrime is an evil having its source in the growing necessity on computers in the current lifestyle. In a day and age when everything from calculators to wristwatches to mobile phones to televisions and to nuclear power plants is being run on computers, cybercrime has assumed rather dire implications. The term "Cyber" is a
Cyber Crime is defined according to Techopedia as a crime in which the computer is the object or tool used to commit an offence such as child pornography and theft. Cybercriminals may use computer technology to access personal information and business trade secrets for exploitive or malicious purposes. Criminals may also use computers to spread viruses, interfere with communication and control document or data storage. Criminals who engage in such illegal activities are known as hackers. In addition, cybercrime may also be referred to as computer crime.
Computer crime or cyber crime is a crime that has been done by unresponsible individual or a group of people, use a computer as medium to crate or do a crime, such as, hacking, stole data and information, manipulate data and information, disseminate false information, and etc. This crime happen all over the world, and its become more increase within a few years coming. There is so many cases reported regarding to this crime and this happen because of a few
Cyber bullying, a term first introduced by Bill Belsey, is defined as "the use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, which is intended to harm others." (Belsey, 1999) Cyber bullying is a serious phenomenon in Hong Kong, a research done by the Hong Kong Federation of Youth Groups in 2010, revealed that approximately 30.2% of the interviewed Hong Kong secondary school students had been cyber bullied (Ngai & Chan, 2010). Despite the seriousness of cyber bullying, there are none cyber bullying related laws currently in Hong Kong. Although there might be obstructions of criminalising cyber bullying, the benefits of doing so are still greater than the costs.
The rapid proliferation of information technology has led to a significant rise in the number of people who use the internet in one way or another. With the growth in the number of persons who have an internet connection; certain individuals have begun to exploit this resource through the unethical practice of Identity theft. As more and more individuals are posting their personal information online, cybercriminals are stealing this information with the aim of assuming the victim's identity so as to either obtain financial advantage or benefits that are associated with the victim (Jewkes, 2013). The act of stealing other people's identity cannot be considered as ethical because it violates the victim's right to privacy. According to
Cyber Attacks In the early 1970s the internet was introduced to the world and few people were using it. But now millions of people are using internet all the time either in home, work, driving, or in malls. This discovery has introduced a new type of crimes which called cybercrimes or computer crimes. The people behind cybercrimes are called hackers and what they do is hacking into other computers to steal form them. They can hack into any device that connected into the internet and control it to harm us like your phone.
Despite the fact that computers have become an important part in the lives of individuals and institutions, computers have indirectly opened a way for the existence of new unethical behaviors and different methods to commit abnormal acts and crimes using computers. We need to acknowledge how to protect ourselves from different computer crimes by having a security awareness .In this chapter we will discuss four common computer crimes, they are: 1. cyber stalk 2. Internet fraud 3. identity theft 4. online piracy 8.1: Cyber stalk Cyber stalk is a constant monitoring and harassment to the victim by using electronic communication. For example, publishing false accusations that affect victim 's reputation, sending anonymous e-mails for the purpose
D. Cyber Crime Provisions in IT Act, 2000 and IT (Amendment) Act, 2008 In common parlance cyber crime is understood as any unlawful act where computer is either a tool or target or both. Since e- governance primarily involves the use of information and communication technology, therefore for effective monitoring, implementation and delivery of any e-governance service, it becomes imperative for the government personnel and operators involved to have knowledge about cyber crime provisions and legal implications of the violations thereof. Summary of cyber crime provisions in IT Act are given below: a. Penalty and compensation for damage to computer, computer system, etc. Section 43 identifies ten different wrongs of causing damage to the computer,
Such activities include Cyberbullying. There has been an intensive debate on this crime in the recent years. Whereas some people feel that Cyberbullying is not a serious offense, most people have argued that it is a serious offense. However, the impacts are getting worse every day with several cases being reported to the police on a daily basis. For instance, those who say that it is a serious offense have cited the several cases that the criminal investigation department is handling concerning the crime.
What is Cyber-crime? Cyber-crime, or computer crime, refers to any illegal action that involves a network or computer. In this sense, the network or computer may have been used to commit a crime or may be the target of a crime. In the latter scenario, a hacker or computer thief, for instance, may steal information that was stored on the targeted system. Many times people may be confused as to the classification of what constitutes cyber-crime.