![]() |
Cyber Crime/Terrorism |
Cyber-crime is an act of dishonesty committed while in
an online platform with the intention to steal, fraud, damage reputation,
misrepresent facts, kidnap or carry out organized terror activities. It is a
complex crime which can be committed by an individual or a group of people.
Access to information is free and in part, it has been misused for lack of
proper control of the internet. Advanced methods involving the use of software
can aggravate the scope of crimes associated with the internet (Aiken et al 2015).
The effect of cyber-crime goes a long way in impacting
the society negatively. Where there is loss of moral values, rights, monies,
privacy. The can be lack of governance, security and identity. And therefore,
the world must up the game to match the ever changing and increasing tactics.
This can be achieved individually and corporately. Legislation and bodies like
Interpol are strengthened to a vet the social-economic effects of cyber-crimes (Choo, 2011).
Having
had the full picture of how cyber-crime it is important to categorically
address the issue as in the various aspects.
1. Sensitization of the possible crimes in the society:
According to Sepec
(2012) this can be achieved through
seminars and conferences and reinforcement agencies; thereby, giving the public
the much needed awareness on the trapes and the ways to avoid them. Protectivesystemsare
employed. As the pitfall one can find himself/herself in for committing a crime
against strong legislative acts.
2. Deliberate educational efforts:
On this, Aiken et al (2015) argues that it will involve specialized training by
higher levels of learning and special anti-cybercrime agencies in combating the
vice. Graduate and advanced degree training can be implemented including
forensic studies, behavioral and strategies needed to counter the crime.
Educational research and publication and form a basis under which the policy
makers and law enforcers can build on the best way of dealing with it (Dion, 2011).
3. Rewarding professionalism:
Rewarding high level professionalism at various place
of work and ensuring people are well, remunerated can be a step towards evading
tempting crime in relation to cyber. Bodies dealing with this kind of crime
must be clean and committed in rooting out any possibilities that may give
rise. They should be fair and justly to victims and offender.
4. Government agencies:
The governments’ agencies and enforcing bodies must
remain united and honest in the commitment and continually developing policies
to address the root causes, and on how to contain it. The agencies like
Interpol, Media Acts of various parliaments can be very exemplary in dealing
with the crime. Monitoring agencies to populate hate messages, articles, terror
and other illegal groups can be a threat to any society. Antifraud bodies can
be handy when it comes to controlling cyber -crimes. There should be concrete
laws for judicial systems to enforce in the prosecution of the law offenders (Dion, 2011).
In conclusion, the cyber-crime, unlike other crimes is
so complex any hard to detect ordinarily, and therefore need a holistic
approach in tackling it. It will be to the benefit of each one of us. Having
protective software and application can be in one way or the other reducing the
magnitude. Professional experts in dealing with the incidences can be a step
towards the right direction governments’ supports notwithstanding. Offenders
having them face the full force of the law can be sending a signal into potential
culprits.
References
Sepec,
M. (2012). Slovenian criminal code and modern criminal law approach to
computer related fraud. Tirunelveli: Department of Criminology and Criminal
Justice.
Aiken,
M., & Chan, S. (2015). Cyber Criminology: Algorithmic vs. Heuristically
Approaches for Analysis within the Human Trafficking Domain. Int J Adv Tech,
06(02). http://dx.doi.org/10.4172/0976-4860.1000146
Dion,
M. (2011). Corruption, fraud and cyber crime as dehumanizing phenomena. International
Journal Of Social Economics, 38(5), 466-476. http://dx.doi.org/10.1108/03068291111123156
Choo,
K. (2011). The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), 719-731. http://dx.doi.org/10.1016/j.cose.2011.08.004

Comments