Free Essay

Cyber Crime in Bangladesh

In:

Submitted By hasanmuhtady
Words 1924
Pages 8
Research Proposal

on

RECENT TREND OF CYBER CRIME IN
BANGLADESH : LAWS AND PRACTICES

GOLAM RABBANI
Student of LLM
Roll 10119032
Department of Law
Rajshahi University
BANGLADESH

E-mail: g.rabbani.law@gmail.com

Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices

INTRODUCTION
The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world.

In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way to make any crime easily. For committing this crime the criminal need not to take any special risk. These crimes cover a wide range of illegal computer related activities such as theft of communication services, industrial espionages, dissemination of pornographic and sexy offensive material in cyberspace electronic money laundering and tax evasion, electronic vandalism, terrorism and extortion tele-marketing frauds, illegal interception of tele-communication etc. Such crimes may threaten a nation’s security and financial health.

The cyber law of every country defines certain acts, as cyber-crime and provides sanctions against individuals who are held responsible for the commission of such acts. An individual who is charged with the commission of a cyber-crime is regarded as an accused. Accused who are committed cyber-crime and they are treated as cyber-criminals.

To prevent cyber-crime all over the world there are some laws and conventions such as Convention on Cybercrime, Budapest, 23 November 2001, The Securely Protect Yourself Against Cyber Trespass (SPY) ACT, the U.S. Federal Laws, United Kingdom’s Cyber Laws, European Laws, Japan’s Cyber Laws, Australia: The Cybercrime Act 2001, Indian Law: The Information Technology Act and Indian Evidence Act.
Our main focuses on the cyber-crimes which are happened in Bangladesh and we also articulate the laws and practices. In Bangladesh ,there are no many laws relating to cyber-crime. But, in Bangladesh, the Information and Communication Technology Act 2006 mainly cover the cyber related offence and punishment. Besides this Act ,some provisions also inserted in the Amendment of Telecommunication Act 2001.

CONDITIONS OF CYBER CRIME IN BANGLADESH
The waves of technological development are also thrilled the people of Bangladesh like all over the world. In this situation to confirm the technological security the Government of Bangladesh pass a law at 8th October in 2006. It legitimates the using of technology and to prevent the offence relating to cybercrime. In this act defines some acts as cyber-crime and also keep the provisions of preventing cybercrime and establishing cyber-tribunal. This Act declared these following activities as cyber-crime:

- Unauthorized copying, extracting and downloading of any data, database
- Introduction of virus
- Damage and disruption to computer system and computer network
- Denial of access to authorized person to computer
- Providing assistance to make possible to commit to crime
- Hacking with computer system
- Tampering computer source documents
- Electronic forger for the purpose of cheating and harming reputation
- Using a forged Electronic record
- Publication of digital signature certificate for the fraudulent purpose
- Confiscation of computer, network etc.
- Publication of information which is obscene in electronic form
- Misrepresentation and suppressing material facts for obtaining digital signature certificate
- Breach of confidentiality and privacy
- Publishing false digital signature certificate

OBJECTIVES OF THE STUDY
This study is an attempt to make an evaluation of the recent trend of cyber-crime in Bangladesh with present situations under, international laws , especially laws of Bangladesh. Considering the vastness of the area of cyber-crime this study will be focused on the cyber-crimes and preventive steps. In view of the studies the goal is formulated in some specific objectives as follows:

(i) To identify the grounds of commission of cyber-crime; (ii) To focus on the ways of making to reform the current laws to prevent the cyber-crimes; (iii) To develop awareness about the cyber-crimes; (iv) To promote effectiveness of the government and law enforcing agencies to control and to accelerate the dynamism in exercising prevalent laws in respect of cyber-crimes; and (v) To find out ways and means of taking effective measures to reduce the cyber offences.

In order to procure these objectives some standards are necessary to evaluate the present situations about cyber-crimes in Bangladesh. With this end in view, the study aims to scrutinise general principles of laws, policies, norms, and mechanisms concerning cyber offences. In this regard, the study will review and analyse the literature, laws and practices of Bangladesh in accordance with the methodology of the study and the relevant data.

METHODOLOGY OF THE STUDY

This study will examine the law and practice relating to the cyber-crimes in Bangladesh. It will evaluate the present conditions of the laws and practices in this respect. In order to give complete shape to the study, a range of research methods would be used: (i) review of literature and instruments on cyber laws; (ii) examination of the legal provisions regarding cyber laws of Bangladesh; (iii) analysis of statutory law and case law relating to cyber-crimes in Bangladesh; (iv) review of relevant public records, available statistical data and annual reports of various private sectors; (v) case studies of specific incidents relating to the cyber-crimes; and (vi) collection and analysis of relevant data.

Discussion on the conceptual issues will be based on the literature including books, journals, electronic materials, statutory law and case law.

a. Study Design: The study will be empirical and at the same time it will be focused on present situations. b. Period of Study: The period of study will be two month including data collecting and analysing data.
SOURCES AND MODES OF DATA COLLECTION
The study will be based on both primary and secondary data. The primary data will be collected from newspapers, journals, Acts and case laws. The secondary data will be collected from the literature on the topic, internet, library catalogues. Moreover, information will be collected from the website of various national and international organizations. The collected data will be classified, analysed and tabulated according to the different objectives and variables of the study.

On the basis of the evaluation some proposals by way of recommendations will be made in the conclusion of each chapter to improve the preventive process of cyber-crimes in Bangladesh. An overall conclusion will be drawn in the last chapter of the study.

SCOPES AND LIMITATION OF THE STUDY
The scope of the study relates to the present conditions regarding cyber-crimes in Bangladesh. As the scope of cyber-crimes are wider than any other offences, so the researcher go through about the well-known offences which are commonly occurred in Bangladesh and preventive measures of those crimes . The scope of the study also will be limited within present laws of Bangladesh with in the essence of International laws Due to constraint of time and non-availability of necessary documents relating to cyber-crimes in respect of Bangladeshi cyber offences ,the study is limited in respect of time and place as mentioned above.
RATIONALES AND JUSTIFICATION OF THE STUDY
It is hoped that this study will make a significant contribution to the concepts of cyber-crimes . It will help the policy makers, legislators and researchers to know about the problems and prospects to reduce cyber-crimes. The findings of this study are intended to help the government to improve the existing laws relating to the information and technological safety in Bangladesh.

As the study is concerned with the present situation or present prospective of cyber-crimes and prevention thereof, as well as the effectiveness of laws, steps of Government, awareness of people and respect to laws, which are the glaring issues of day, it deserves some inordinate significance. It will be a new combination for the researcher, because as far as known, there has been no research work done as yet on this matter in Bangladesh. It is expected that this recent issue can be treated as an important and valuable source for the workers on this subject. The findings of the research will be helpful for the people, especially the concerning and interested people in this field.

Moreover, it will open wide opportunities for other researchers concerned with this arena. This research work may be helpful for the students of law to enrich their knowledge. Besides, many institutions, agencies and organizations will benefit from this type of new research work.

REVIEW OF LITERATURE
Since cyber-crimes are a fast growing matter and wherein interaction of the bcommon people as well as the society and Government. It became a subject of discussion and research from the days of the formation of peaceful society, innumerable books and articles are written on this topic in side of Bangladesh. But because of the changing patterns of the society and human behaviour with the development of science and technology earlier literature on this topic is becoming insufficient to give exact information and protection. Moreover, most of the previous literature is written by academics having no relation with recent situation. Thus, many books regarding cyber-crimes are found in different libraries and online; and mostly some aspects of these matters are found in foreign books. But none of them contains any adequate information about Bangladeshi legal system.

1. On the legal relationship some other books, which bear much significance are ;Oporad Biggan porichity By Prof. Dr. Borhan Uddin Khan ,A text Book on Cyber law of Bangladesh By Dr. Zulfiquar Ahmed, ICT Policy of Bangladesh – Govt. publication.

Apart from these works, a list of other books, articles, documents, statutes, and journals on different aspects of cyber law and crime may be found, but none of them has dealt with this research topic in the light and details as it has been intended to be done in this work. In none of them could be found an unbiased and in-depth treatment of this burning research area. Attempts will be made in this work to suggest reform where necessary and update the existing laws so that an effective prevention of cyber-crimes is ensured in a fruitful way.

Selected Bibliography A. Books 1. Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. 2. Ahmed, Zulfiquar (2009) A Text Book on Cyber Law in Bangladesh, Dhaka: National Law Book, 3. NV Paranjape, Criminology and Penology, (Fourteenth edition, 2009): Central Law Publication, Allahabad, India 4. Borhan Uddin Khan, Monjur Kader (Fourth edition;2014) ,Oporad Biggan porichity, Kamrul Book House ,Dhaka , 5. Johannes M. Bauer, Michel J.G. van Eeten, Cyber security: Telecommunications Policy, (2009) 6. Joseph Straubhaar and Robert LaRose (2004). Media Now: Understanding Media, Culture, and Technology , B. Journals
1.
2.
3.

Similar Documents

Free Essay

Cyber Crime in Bangladesh

...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...

Words: 14728 - Pages: 59

Free Essay

Cyber Crime in Bangladesh

...committed suicide. It is not only about her, in all over the Bangladesh there are lots of women or girls who are facing problems of cyber crime and taking some deadly attempt. In the article “Cyber Crime” the author Supan (2015), he describes the definitions of cyber crime. To begin with, there are many cyber crimes which are actually women centered (morphing, cyber stalking, cyber pornography etc.). However, these types of cyber crime mainly destroy women’s reputation and the reason behind of this inexperienced in cyber world. Moreover, Supan (2015) morphing is basically done for blackmailing women or girls by changing their pictures using graphic animation. Furthermore, cyber stalking is another cyber crime which is done by former friend or ex-lover of women or girls with whom she shared her feeling and emotions, so they bother her taking this advantage. In addition, cyber pornography means criminals made a private video of a girl and upload it over the internet for destroying her respect. He also says, in our country dealing with rules and regulation for preventing cyber crime by information and communication technology act, 2006 (ICTA) and pornography control act, 2012 (PCA). The purpose of this essay is to analyze the article, discuss my points of agreement which include common effects (destroying reputation, create fear, harassing etc.) of cyber crime and also discuss my points of disagreements of which include cyber crime not only women centered. Reading the article has made it...

Words: 698 - Pages: 3

Free Essay

Cyber Crime in Bangladesh

...excesses of cyber crime, cyber harassment and more. Index 01. Introduction………………………………………………………………………………03 02. Cyber Crime……………………………………………………………………………...03 03. Major cyber Crimes……………………………………………………………………...03 a) Unauthorized access to a computer system………………………………………….04 b) Introduces or causes to introduce viruses……………………………………………04 c) Tampering with computer source documents………………………………………..04 d) Cause Damage to Computer system or causes any disruption………………………05 04. Real Scenario of Cyber Crime in Bangladesh………………………………………...…05 05. Prevention of cyber crime………………………………………………………………………..06 06. Law of Bangladesh about cyber crime…………………………………………………...07 07. Tribunal…………………………………………………………………………………..17 08. Conclution………………………………………………………………………………..18 09. Reference......................................................................................................................19 On 2012, Sabiha Sultana Sathi, a school girl of Bagerhaat who’s a friend takes her some personal photographs and broadens those on Internet. As a result Sathi committed suicide and this is not only Sathi’s story, a story of those girls who are the victim of cyber crime. Nowadays, cyber crime is a very common as well as a sevear crime all over the world. According to Bangladesh Police, cyber-crime take place every 20 seconds and over 500,000 web pages contain some form of hacker tool. Now the question arise what cyber crime? Well, Cyber...

Words: 5677 - Pages: 23

Free Essay

Crimes in Cyber Café and Its Rules and Ragulation, Perspective Bangldesh

...Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case study regarding crime in cyber café …………………………….…...

Words: 6680 - Pages: 27

Free Essay

Cyber Law of Bd

...Efficiencies of Cyber law in Bangladesh জুন 26, 2011 0 inShare Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people. Cyber law in Bangladesh In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c) Acceptance to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology. Objectives of the ICT Act, 2006 The objectives of the ICT Act, 2006 has been provided following purposes such as To smooth the progress of electronic filing of documents...

Words: 695 - Pages: 3

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Understanding Cyber Crime: a Sociological Study Among the Students of University of Dhaka

...Cyber and technology related crime is on the increase and current trends indicate that itwill be a significant issue in Bangladesh. It has already been seen that a glomming threatbecomes visible in the arena of information technology. Recently the hacking of RABwebsite and e-mail threats of former prime minister are example for few of them.In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safeside to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information andCommunication Technology act is not the concert one. By enacting this act, there is achance to become safe side after committing crimes. So, considering these facts acomprehensive Cybercrime Protection Act should be imposed.This report incorporates the impacts of cybercrime in Bangladesh especially focuses onthe area of Personal life, Workplace as well as Policy making Bodies or thinkers. Webelieve the report would help all relevant concerns and especially policy makers Computer literacy in Bangladesh is steadily on the rise. There is also a growing number of Internet users; cellular phone is widespread and so is accessibility of technology like SMS. While even a few years ago computers were vastly used as digital ‘typewriters’, they are now being employed to maintain accounts worth tens of millions of takas and more importantly...

Words: 299 - Pages: 2

Premium Essay

Cyber Laws

...theory and practice for developing a knowledge and technology based police by integrating governance, social system, crime aspects and technology. I have had my graduation in Political Science along with a Diploma in ICT and DDD (Database Design and Development). Moreover I have an international certification as named OCP (Oracle Certified Professional) along with comprehensive more than three year experience in programming. Thus I want to re-rearrange my past educational and professional career in ICT Sector in the framework of rising usages of ICT and good governance. The focal areas should be E-POLICING, E-GOVERNANCE, New Approaches of Information War (HACKING), Information Technology based Crime (Cyber Crime) etc. Police Reform Program is now running in its second phase to enhance policing in Bangladesh. I want to be a key player to reform Bangladesh Police with the help of Information Management Technology and Techniques. This post graduate course is a rich one in the area of IT related post graduate courses. This university has a great reputation in the world context as being the top ranked technology based educational institute. However in the previous column I mentioned my career objectives in the light of current technology based policing. The present government of Bangladesh has a keen interest on digitalization of government works. We the Bangladesh Police is also trying to foster its functioning with the use of newly emerged technology like information technology...

Words: 391 - Pages: 2

Premium Essay

Twrm Paper

...INFORMATION TECHNOLOGY AND CRIME: AN ANALYSIS 1.Introduction In the era of technology all activities are being conducted with the help of technology in all over the world. Now it is considered that ‘information is power’ and so the widely used term ‘information’ is combined with ‘technology’ that encompasses the term ‘information technology’. Information technology generally means processing and distribution of data using computer hardware and software, telecommunications and digital electronics. So the common medium of information technology is computer, internet, and mostly used cellular phone. This system helps us take the optimum benefit from this ‘Global Ocean of knowledge’ that much our every day needs. The strength of internet in which everybody’s knowledge is open for use by everybody within a global village for better living standards. On the other hand crime is a social and economic phenomenon and is as old as the human society has become a legal concept and has the sanction of the law. So in combination the term of information technology and crime if positive relation then makes a definition that information technological crime is those facts which is made by digital way getting economical and social benefit illegally and legally prohibited by law, on the other hand if opposite relation then make definition is a method if reducing crime by digital way in the digital era. From the view of positive technology stimulates not only a free trade and economic...

Words: 5282 - Pages: 22

Free Essay

Ict Act-2006 Bangladesh

...INFORMATION AND COMMUNICATION TECNNOLOGY ACT, 2006 Prepared for Md. Ziaul Haque Senior Lecturer, Dept. Of Business Administration East West University Prepared by Bus-361 Sec: 6 Name | ID | 1. Md.Musrukh Ruhaim | 2010-2-10-091 | 2. MD. Tajul Islam | 2011-2-10-240 | 3. MD. Naiem Bhuiyan | 2011-2-10-110 | 4. Sunjida Haque | 2010-2-10-355 | 5. Md.Mahfuzur Rahman | 2011-1-10-049 | 6. MD. Mahmudul Hasan | 2011-1-13-060 | Date of Submission: December-03, 2014 Acknowledgement We are very pleased to accomplish the assign task given by our honorable course instructor Md. Ziaul Haque on the subject “Legal Environment of Business”. We are very much obliged to those persons who gave their valuable time in the organization overview part, opinion and advice to complete this report. At first, our profound gratification goes to, Md. Ziaul Haque the honorable course instructor of Business Communication for his supervision to complete the assignment successfully. By providing us the opportunity of preparing this assignment, he has made us able to relate the academic knowledge of Business law with practical scenario. Not only this, he has also contributed much in this term paper by giving us proper guideline. We are acknowledging to all of those web sites from which we have taken necessary helps. Our gratitude also goes to some senior students for their guidance in various stages of completing the term paper and our...

Words: 12177 - Pages: 49

Premium Essay

Child Prostitution in Bangladesh

... there is a human right crisis of sexual abuse of millions of women, children and thousands of men in the prostitution & other form of sexual abuse. Child prostitution is the major part of total prostitution. Children are also involved in prostitution when they engage in sex in return for basic needs such as food, shelter or safety, or pocket money to purchase consumer goods. My paper explores the criminological factors associated with child prostitution in Bangladesh such as human trafficking and child prostitution, forced into prostitution, street children, broken home, social reintegration, livelihood and poverty, marital relationship and children in cyber world. My paper is based on secondary analysis and available studies, journals, reports and internet publications. Child and child prostitution concept To identify child prostitution first we have to know about the minimum age that has legal approval of child in Bangladeshi aspects. The definition of children is not uniform in the laws of Bangladesh....

Words: 3781 - Pages: 16

Premium Essay

Strength & Weakness of E-Commerce in Bangladesh

...Globalization has brought in many changes in the business scenario with the whole world inching towards a big market place. Communication between buyers and sellers become critical as each can opt to explore a greater number of alternatives than before. E-commerce through the use of internet, e-mails, websites and other facilities enables a businessman to be linked with every corner of the world and thus opens up greater opportunities in the world market. As a signatory of WTO practices Bangladesh has accepted The Code of Good Practices of WTO agreement on Technical Barriers to Trade. E-commerce facilitates the very process of International transactions; this involves securing and finalizing a contract, delivery of a product and finally payment for the performance of the product. The movement of goods and services and payment mechanism within a country and outside of a country is governed by regulatory and legal issues. Though Bangladesh Govt. has a strategic vision and policy framework to boost up e-commerce, a lot of factors are also hindering the way of doing E-commerce. Definition of E-Commerce: E-Commerce refers to the process of buying or selling products or service over an electronic network. The most popular medium in which e-commerce is conducted is the internet. It combines a range of process such as: • Electronic Data Interchange (EDI). • Electronic mail (E-mail). • World Wide Web (WWW). • Internet Applications. • Network Applications. ...

Words: 4033 - Pages: 17

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Premium Essay

Term Paper

...ABSTRACT This paper gives an outline of the developing cybercrime issue and surveys two criminological speculations that have been connected to the investigation of cybercrime and cybercrime exploitation. Enactment which characterizes cybercrimes. Also gives the lawful base to arraigning such wrongdoings has been produced at both the government and state level. Numerous government law requirement orgs have offices that endeavor to battle a wide scope of PC unlawful acts from PC interruptions to licensed innovation burglary. This paper additionally surveys different meanings of cybercrimes and orders these unlawful acts into three general classes. It then goes ahead to analyze the current level of cybercrime exploitation for both organizations and people in internationally. Digital exploitation has influenced numerous people and organizations in the very states and this issue appears to have expanded as the utilization of PCs and the web expanded in the course of the most recent decade. In the wake of investigating the current level of cybercrime internationally in this paper inspects the use of restraint and routine movement hypothesis to the investigation of cybercrime. Both of these hypotheses can be connected to the investigation of PC wrongdoing and exploitation. We also going to take interview with some IT experts of software and network companies based on cybercrimes. At long last this paper closes with a few proposals for territories of future exploration. ...

Words: 1780 - Pages: 8

Premium Essay

Crime

...http://en.wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a...

Words: 6044 - Pages: 25