Introduction
Along with the fast developments and various applications of the internet comes the improvement of people’s living standard. Undoubtedly the emerging new technology is playing such a significant role in fields like promoting interpersonal interactions, driving global collaborations and increasing the world’s productivity, that our society may not stay as functional as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communications and the lack of either moral or legal control, has also brought about an unprecedented form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the distinct nature of criminals and different motivations, some of them may not have huge negative social impact while others can result in massive loss for both individuals and society. On all accounts, it is indeed of great importance to study internet abuse so as to construct a safer community with higher stability for the existence and prosperity of human-beings.
To examine online deviances and crimes objectively, both theoretical supports and a large amount of data are required. As for hacking part, the grounded theory is applied so as to systematically and comparatively analyze the similarities and differences between “good” hackers and “bad” hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical example for depiction and explanation. In the specific region where the younger generation constructs a morally and legally deviant subculture, the prospect of the state is worth concerning. Organized in a progress...
... middle of paper ...
...me. New York, NY: Basic Books.
Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 56–59. Retrieved from http://www.time.com/ time/magazine/article/0,9171,1109334-1,00.html Taylor, P. A. (1999). Hackers: Crime and the digital sublime. New York, NY: Routledge.
Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. Washington DC: United States Institute of Peace.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 25, 317–332.
Whine, M. (1999). Cyberspace—A new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231–246.
Zetter, K. (2008). Israeli hacker “The Analyzer” suspected of hacking again. Wired. Retrieved from http://www.wired.com/threatlevel/2008/09/the-analyzer-su
Speckhard, A. (2013). The Boston Marathon Bombers: the Lethal Cocktail that Turned Troubled Youth to Terrorism. Perspectives On Terrorism, 7(3). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/268/540
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
The future of America is definitely affected by terrorism and terrorism has benefited from the new technologies that aid and speed up communication around the world. Terrorists can use tactics that they know and manipulate advanced technologies such as the internet. These technological advantages have certainly improved the capabilities of terrorist groups to plan and accomplish their operations. It also offers these terrorists the ability to affect communities faster and much more intensely than earlier terrorists. In order to reduce America's vulnerability to terrorism, in regards to their threats, strategies and tactics, when dealing with the internet, a complete understanding of the nature of America’s enemies is necessary.
Petallides, C. J. (2012). "Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat." Student Pulse, Vol 4, No 3 Accessed online http://www.studentpulse.com/a?id=627> on 12/03/14
Sageman, Marc. "The Journal of International Security Affairs The Normality of Global Jihadi Terrorism 2005th ser. Spring.9 (2005). .
Chaliand, G. & Arnaud, B. (2008). The history of terrorism: from antiquity to al Qaeda.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Currie, Stephen. "Osama bin Laden and al-Qaeda." Terrorists and Terrorist Groups. San Diego: Lucent Books, 2002. 69-83. Print.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrade its ability to make decisions, and to command its military forces. Additionally, information warfare is composed of cyber warfare and related to the protection, disruption, destruction, denial, or manipulation of information in order to gain a benefit through the technologies (Taddeo, 2012). Accordingly, as technology becomes readily available to various entities, the ability to conduct or perform warfare through technological means is multiplying.
Just as traditional criminal activities, cybercrime can take many forms and occur virtually anytime and anywhere. Criminals committing cybercrime use very different methods, depending on their abilities and goals. This should not surprise anyone after all cybercrime is merely an activity "criminal" to the ingredient that adds a computer or an electronic network for its commission.
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
“On domains: cyber and the practice of warfare.” International Journal 69.3 (2014): 394+. Academic OneFile. Web. The Web.
"Internet Has Become Haven For Terrorists, Hate Groups: Wiesenthal Centre." Canadian Press, The (n.d.): Newspaper Source Plus. Web. 4 Feb. 2014.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.