Essay On Cybercrime Law

1548 Words4 Pages

The Evolution of Cybercrime Law
Manal AlSaif, Michael Marks
MPTM663- Cyber Threats and Vulnerabilities
MPTM660- IT Security Compliance/Forensics
Spring 2014
1.0 Infrastructure and Services
One of the rapidly evolving areas of technical infrastructure development is the Internet (Yang, 2007). The public is leaning more towards digitizing, and the information and communication technologies are presently ubiquitous. Nowadays we see more often devises being integrated into the computer technology, this can be relied upon the high demand for Internet and computer connectivity (BBC NEWS, 2005). Further, a tremendous number of modern services adhere to the usage of information and communication technologies, such as: transportation infrastructure, military services and logistics, and electricity supply (Bohn, Coroama, Langheinrich, Mattern, & Rohs, 2004).
Moreover, The growing availability of wireless communication technologies, combined with the abundance of computer systems under the price of USD200, is bound to positively influence the number of Internet and technology users in developing countries. However, there is a need for change in the development of new technologies, in order to target developing countries, as opposed to focusing on western countries demands. The expected impact is greater than implementing basic information infrastructure. Creation, availability, use of network-based services, are all examples of the development, information and communication technologies can initiate (Shaping Europe’s Future Through ICT, 2006). Remote and rural areas can benefit remarkably from the existence of electronic government applications, as they present an accessible and dynamic channel to providing services. Yet, w...

... middle of paper ...

...efinitions of cybercrime (United Nations, 2000). Strictly speaking, cybercrime (computer crime) is any occurrences related to illicit behavior led by means of electronic processes, which aims at the security of computer systems and the data processed by them. Moreover, on the broad spectrum computer-related crimes are concerned about offenses commenced using a computer system or network. An example of that is the unlawful possession and offering or circulating information through a computer system or network (Kumar, 2009).
2.1 Typology of cybercrime
Establishing a typology or classification system for cybercrime is quite challenging, on account of the wide range of offenses covered under cybercrime (Gordon & Ford, 2006). Furthermore, according to the Convention on Cybercrime approach (Sofaer A. D., 2001), offenses can be classified under four different categories:

More about Essay On Cybercrime Law

Open Document