Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
21 pages
1 file
AI-generated Abstract
The paper explores the evolution of cyber crimes, focusing on the different phases from the 1960s to the 21st century, highlighting the growing sophistication of methods used for committing such crimes. It discusses the challenges faced by Tanzania in addressing these crimes, particularly in the context of legal frameworks and international conventions. The paper emphasizes the increasing reliance on information and communication technologies (ICTs), making systems vulnerable to cyber threats, and outlines various types of cyber crimes, including hacking, fraud, and cyber terrorism.
The impact of information technology on the structure and functioning of national economies and the entire world economy is reflected in the macro scale in the creation, development, and tumultuous growing significance of new industries, which directs the economic activities of mankind. It can today be seen in the process of globalization. At the micro level leads to structural changes within the company that affect the activities of business functions or business processes as a fundamental determinant of business systems, not just those that are traditionally related to information flows. With it is developing the concept of decentralization of business decisions with an even share of the information and communication of all employees. Classical economic thought emphasizes that the wealth of a nation depends on the method by which directs its resources, above all the material, the processes of production and trade. Better allocation of these resources brings a higher level of productivity and result in a higher standard of living of individuals and society as a whole. People have become aware of the fact that information is a prerequisite for the dissemination of knowledge, and that knowledge is the main prerequisite for any further development and prosperity of any developed society, or country. Visible interest of all remotely developed countries (and those who want to become so) is to invest in the education of their IT staff. Computer networks have become the main transmitter of information and connecting people to the world. Implementing sophisticated techniques and knowledge as its prerequisite, are caused by the money and information as the main forms of economic and social abuse. Thus, experience shows, every technological advancement of society with the benefit of bringing a dark side. This dark side of a rule first used by criminals who use new technical and technological achievements in their work. Therefore, it was necessary to analyze the basic economic indicators of civilization's development and ways of their application in modern society, with special emphasis on crimes that can be committed by using information technology. The aim of this paper is precisely this: to point out the possible abuses which can be committed with the help of modern computer technology, and the resulting damage can cause huge problems in the functioning of not only national but also the economies around the world. Keywords: globalization, economics, computer science, computer crime
2001
The increased use of computers and communications technologies over the preceding decade has created considerable apprehension in the international community that they are being put to illegal use of various kinds. Fears of wide-scale electronic vandalism, copyright infringement,
With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include:
IJCSMC, 2019
Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies "War Games" and "Hackers," has grown into a mature and sophisticated threat to the open nature of the Internet. "Cyber-criminals," like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation's computers. However, there are countless other cyber-crimes that are not made public due to private industry's reluctance to publicize its vulnerability and the government's concern for security. Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities. As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few. Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve. At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy and free speech, and the need to protect the integrity of the world's public and private networks. Further complicating cyber-crime enforcement is the area of legal jurisdiction. Like pollution control legislation, one country cannot by itself effectively enact laws that comprehensively address the problem of Internet crimes without cooperation from other nations. While the major international organizations, like the OECD and the G-8, are seriously discussing cooperative schemes, many countries do not share the urgency to combat cyber-crime for many reasons, including different values concerning piracy and espionage or the need to 132 address more pressing social problems. These countries, inadvertently or not, present the cyber-criminal with a safe haven to operate. Never before has it been so easy to commit a crime in one jurisdiction while hiding behind the jurisdiction of another. In section II of this article, we begin by providing an overview of cyber-crimes, the state of the law, and cyber-crime perpetrators and their motivations. Then, in section III we discuss in detail three major computer crimes and analyze how the different statutory subsections are applied depending upon the technical details of the crime itself. Just as a murder prosecution is dependent on how the crime was committed, different hacking techniques trigger different federal anti-computer crime subsections. We begin with a discussion of the various denial of service attacks and the applicable statutes. Next we discuss the technical details of several hacking techniques and apply the relevant statutory subsections to the specific techniques. Finally, we explore the various types of computer viruses and how viral "payloads" and the class of the targeted computer will determine which federal subsection can be applied to the crime. In section IV, we discuss proposed legislative changes to the Computer Fraud and Abuse Act and related privacy concerns.
2013
2 in its capacity and accessibility, and the decrease in its cost, has brought about revolutionary changes in commerce, communication, entertainment and the rise of a modern crime known as cyber crime. 7
Güncel Sanatta Anlam Dönüşümü , 2019
Project Repository Journal, 2023
The Year's Work in Critical and Cultural Theory, 2024
Shmuel Feiner and David Sorkin (eds.): New Perspectives on the Haskalah, 2004
Falência e recuperação empresarial, 2024
Pofessor César Augusto Venâncio da SILVA, 2016
Degres Journal Volume 9 Issue 9 2024 ISSN NO:0376-8163, 2024
International Labor and Working-class History, 2010
Amino Acids, 2011
Physical Review D, 2001
Bayero Journal of Pure and Applied Sciences, 2018
RumeliDE Dil ve Edebiyat Araştırmaları Dergisi, 2020
International Entrepreneurship and Management Journal, 2007
Human Relations, 2021
Experimental Astronomy, 2015
Jurnal Sains Materi Indonesia, 2018
Frontiers in Physiology
Revue Européenne de Psychologie Appliquée/European Review of Applied Psychology, 2012