Internet crimes form one of the main challenges in the advent of internet technology. In many instances, internet crimes have led to increased losses of both financial and reputations of individuals and organizations. Besides, there have been numerous claims within the media about computer crimes. In some instances, hackers have been considered heroes in their capacities. This scenario has precipitated advances that cyber crimes have reached. In particular, the perpetration of internet crimes has been mainly anchored on the immense achievements in internet advances and the technology at large. The perception of hacking and computer crimes has however been changing due to increased dependency on the internet from the development of robust global infrastructure (Bourke & Craun et al. 593). This analysis presents a critical review of three main categories of internet crimes in the contemporary society. It categorizes internet crimes into three main charters namely: against the Government, against society, and individuals.
The perpetration of offenses against the government has been a major challenge to many administrations worldwide since it has resulted into leakages of official data and property into the hands of criminals. First, there have been crimes of electronic vandalism as well as extortion. For instance, in among the developed western society, there has been increased interdependence on intricate data process and advanced telecommunication systems. Any interference on the systems may lead to dire consequences (Krueger & Michael 627). Whether this scenario culminates from curiosity or vindictiveness caused by electronic intruders, there has been an identified potential of inflicting elaborate harm to the systems.
Different individuals and protests groups have hacked official websites for various commercial and governmental organizations. This has compelled defense planners into investing in the information warfare rephrasing mechanisms of interrupting information technology infrastructure within the security systems. For instance, there were attempts to disrupt computer systems in Sri Lankas government as well as North Atlantic Treaty Organization during the 1999 Belgrade bombing (Jones & Finkelhor et al. 182). Similarly, extortionists within Eastern Europe also acquired details of clients credit cards of an on-line retailer in North America and further published some on the web after the retailers refusal to bow to their demand.
Besides, there has been increased cyber warfare and incidences of terrorism. In recent times, there have been increased apprehensions government details that have minimized the potential of governments to contain terrorism. Cyberextortion is one of the sub-categories of cyber-tourism where email servers, computer systems or websites are subjected to repetitive service rejection by wicked hackers demanding cash compensation in return to stop attacks (Casey 101). In a view to limit this challenge in future, many warring countries foresee their adoption of cyberspace operations by their military commanders to contain disintegrated forms of denial-of-service attacks.
Another major category of internet crime is the one crafted against the society. One sub-category of this case is the cyber-stalking and cyber-bullying. Cyber-bullying is a very dangerous use of internets and other related technologies aimed at harming others through the deliberate and hostile way. To contain this challenge, there has been beefed up campaigns to contain the problem. Cyber-bullying can range from simple to complex scenarios such as sexual remarks, threats and pejorative labels compounded on victims though subjecting them to ridicule to cause humiliation among other evil ideals (Liang & Hong 67).
Cyber-stalking involves the use of internet among other electronic means to stalk individuals or organizations. This process may entail waging false accusations, threats and identity theft. Besides, it may also result in damaging of data as well as solicitation of minor for sexual advances. Cyber-stalking also entails the gathering information intended to harass an individual or organization with unique goals of gaining financially or otherwise (Taylor & Liederbach et al. 233). Cyber-stalking, however, differs with spatial stalking although it may culminate into spatial stalking or happens together.
The third main category of internet crime is one championed against the individual. For instance, drug trafficking is a major challenge in the contemporary society. Mexico is one of the worst hit countries as far as drug trafficking is concerned. In recent developments, drug traffickers have been taking advantage of internets to market illicit substance via encrypted emails. Some have also been organizing deals in internet cafes through courier websites to track unauthorized packages and spread recipes in some restricted regions. The increase in internet drug marketing may also be a product of the absence of face-to-face communication framework (Wolak & Mitchell et al. 177). These virtual exchanges permit intimidated persons to buy illicit drugs comfortably. Some impacts linked with drug trades are inherently minimized while the filtering process that arises from physical interactions dwindles away.
Another sub-category of internet crimes against individuals is the harassments and offensive contents. Contents within websites among other electronic communications may be offensive or obscene due to various reasons. In certain cases, such communications could be illegal. One of the most influential areas of internet pornography is the child pornography (Jaishankar 44). Although the contents may be obscene in a less accurate manner, derogatory comments focused on specific individuals based on certain aspects of gender, religion, and sexual orientation are distasteful (Bourke & Andres 186). These crimes often occur in chat rooms via emails to interested groups or individuals or via the newsgroup. Any comments perceived to be disrespectful are considered harassments and therefore crimes.
Finally, internet crimes have been evolving for a long period since the advent of the internet. Internet crimes have become a major challenge in the development and manipulation of internet technology. From the analysis, it is clear that internet crimes have different dimensions that influence virtually all forms of human society either through the government, society in general as well as individuals or organizations. The extent of damage caused by internet crimes is moderated by the type of crimes as well as the level of accomplishment of perpetrators as far as internet technology is concerned.
Works CitedBourke, Michael L., and Andres E. Hernandez. "The Butner Studyredux: A report of theincidence of hands-on child victimization by child pornography offenders." Journal ofFamily Violence 24.3 (2009): 183-191.
Bourke, Michael L., and Sarah W. Craun. "Secondary Traumatic Stress Among Internet CrimesAgainst Children Task Force Personnel Impact, Risk Factors, and Coping Strategies."Sexual abuse: a journal of research and treatment 26.6 (2014): 586-609.
Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and theinternet. Academic press, 2011.Jaishankar, Karuppannan, ed. Cyber criminology: exploring internet crimes and criminalbehavior. CRC Press, 2011.Jones, Lisa M., Kimberly J. Mitchell, and David Finkelhor. "Trends in youth internetvictimization: Findings from three youth internet safety surveys 20002010." Journal ofadolescent Health 50.2 (2012): 179-186.
Krueger, Richard B., Meg S. Kaplan, and Michael B. First. "Sexual and other axis I diagnoses of60 males arrested for crimes against children involving the Internet." CNS spectrums14.11 (2009): 623-631.
Liang, Bin, and Hong Lu. "Internet development, censorship, and cyber crimes in China."Journal of Contemporary Criminal Justice 26.1 (2010): 103-120.
Taylor, Robert W., Eric J. Fritsch, and John Liederbach. Digital crime and digital terrorism.Prentice Hall Press, 2014.Wolak, Janis, David Finkelhor, and Kimberly J. Mitchell. "Trends in Arrests for ChildPornography Production: The Third National Juvenile Online Victimization Study(NJOV3)." (2012).
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Current Event on Gender and Criminal Justice System - Essay Example
- Wrongful Convictions and Factors That Play Into It - Paper Example
- Essay on Agents Rights and Liabilities
- Womens History Timelines - Essay Example
- Introduction of ASIC v Hellicar Caselaw - Paper Example
- Articles About Cases Affecting the Human Resource Segments Comparison
- Responsibility of Vendors to Timmys Accident - Paper Example