...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...
Words: 6414 - Pages: 26
...Ethical issues of Cyber Bullying Introduction The U.S. Department of Health and Human Services Health Resources and Services administration (HRSA) defines bullying as aggressive behavior that is intentional and involves an imbalance of power or strength, and HRSA notes that this behavior is usually repeated over time. Cyber bullying, is the social-networking phenomenon that is gaining traction among America’s tech-savvy teens, is drawing more attention than ever from school districts and state legislatures anxious to curb the online taunts and insults. This research paper includes description of cyber bullying, its different forms, effects of cyber bullying on individuals and suggestions in order to avoid this ugly form of bullying. Usually, cyber bullies are harassers; they use same weapons that bullies have used from ages: humiliation, gossips and threats. The difference is, cyber bullies do their dirty work using Web logs, emails, instant messaging, cell phones and several other electronic tools. According to psychotherapists, the easy access to Internet gives a chance to kids to say and to do things they wouldn't be able to do face to face, and also they feel they would not be held accountable in the same way, It gives bullies false sense of power and security. They say by using computers children get a sense of being anonymous. Using internet allows bullies to inflict abuse without experiencing or seeing the consequences of their actions, which makes...
Words: 2686 - Pages: 11
...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...
Words: 4562 - Pages: 19
...people of the world use these technology in a right way, we all are going to be benefited out of it ,but if the motive of a human being is not positive, he can enter into your extreme privacy by misusing the techno logy and hiding it in the camera to encash it for money when time comes for him. Here I am talking about some of the worst phase of the technology we do have like violation of your privacy by someone unknown to you. With the advancement in the field of latest technology, we have to face many disadvantages out of the benefit of modern technology such as stress factor, hectic life, fear of nuclear war, cyber crime and high growth of eye disease, increase of body weight and new transportation technology which has brought pollution and congestion in major cities. As we all know that we have entered into an era of new/ modern technology world which is equipped with super technology software through which we can work without employing manpower. On the other side, the world is facing terrorists threat and new technology invented by the scientists have armed them with a technology which can destroy a city in seconds with mere pushing of a button. Similarly, the advance technology has created thousand of cases of cyber crimes, cheating and fraud which is making our life like hell. Besides it is driving our children towards the danger zone where they are getting materials which is harmful for them. But despite knowing the side effects ofthese technology, we are now making ourselves...
Words: 673 - Pages: 3
...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...
Words: 14728 - Pages: 59
...that we live in today with our kids having access to cell phones and the cyber social media, it has turned into a deadly form of bullying known as cyber bullying. Like traditional bullying, many people think that cyber bullying is not a big deal. Many feel that it is just a part of life that needs to be dealt with. However, cyber bullying is something that should concern everyone. There are far too many children suffering from the effects of cyber bullying and as a society we all need to take steps to ensure our children are safe. No child should have to face the type of harassment that causes them to suffer feelings of depression, isolation, low self-esteem, humiliation, anxiety, and thoughts of suicide. Cyber bullying has some rather unique characteristics that are different from traditional bullying: * Anonymity As bad as the "bully" on the playground may be, he or she can be readily identified and potentially avoided. On the other hand, the child who cyber bullies is often anonymous. The victim is left wondering who the cyber "bully" is, which can cause a great deal of stress. * Accessibility Most children who use traditional ways of bullying terrorize their victim at school, on the bus, or walking to or from school. Although bullying can happen elsewhere in the community, there is usually a standard period of time during which these children have access to their victims. Children who cyber bully...
Words: 2598 - Pages: 11
............................................................................................. 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3 4.1. The major risks of cyber security ................................................................................................. 3 4.1.1. To consumers ........................................................................................................................ 3 4.1.2. To businesses........................................................................................................................ 4 4.1.3. IT organisations ..................................................................................................................... 4 4.1.4. Telecommunication companies ............................................................................................. 5 4.1.5. Government ........................................................................................................................... 5 4.2. The origin of cyber security ............................................................................................
Words: 3380 - Pages: 14
...known as Cyber Bullying. Young people to bully peers can use emails, texts, chats, phones, websites and cameras. It is now a worldwide problem with countless occurrences reported and has yet to get the attention it merits and remains nearly vague from research works. This paper reconnoiters definitional problems, the incidences and potential outcomes of cyber bullying, as well as deliberating possible intervention and prevention stratagems. While most youngsters seem conscious of what cyberbullying involves, occurrences of cyberbullying in educational institutions seem to be minimal. Although students have entree to many technologies, the mainstream seem not to participate in bullying over the internet. However, persons who are cyber bullies are also likely to be targets of cyberbullying. Cyber Bullying Cyber bullying is becoming a crisis with the progression of social media tools. Should government create new laws to protect the people who are being targeted? This is just but one of the many questions people seek for answers. Cyber bullying has been in existence since time in memorial but has gained fame and become more wide spread with the introduction of the internet some few years back. It is common to see instances of cyber bullying nowadays unlike in the past, children are no longer the victims but everyone is; be it old or young, the crime has experienced an exponential growth with the growth of the internet and the tough economic times. Additionally, Cyber Bullies in...
Words: 1542 - Pages: 7
...Amy PH.D.). The word Terrorist can be defined several different ways. One definition of Terrorist is “a person, usually a member of a group, who uses or advocated terrorism” while another is” a person who terrorizes or frightens others” (Zalman, Amy PH.D.). These definitions make the common citizen think that anyone can be a Terrorist and be involved in terrorism. The history of terrorism can be traced all of the way back to the 1950s and probably back even further. In the 1950s formed in numerous parts of the world and fought the governments of other countries. An example of this is the forming of the Irish Republican Army (IRA) in Ireland to fight, as the Irish saw it, the evil empire of Great Britain. In the 1960’s Palestine entered Israel and blew up the Israeli National Carrier water canal. In the 1960s International terrorism begins by the Palestine hijacking of an El Al Flight in 1968. This opened up the door for other terrorists groups to commit hijackings and terrorists were considered to be willing to commit symbolic acts of violence by certain organized groups with either political and or religious grievances. In the 1970s Palestine attacked a school bus and kills several children. Later on Israel retaliates against Palestine and kills several Palestine responsible for the Munich Olympic’s Massacre. While the countries continually attack each other back and forth al of the way up to present. Also in the 1970s a group called the Kurdistan Worker’s...
Words: 1586 - Pages: 7
...Bullying: the act of hurting one person or a group repeatedly as a way for the bully to feel superior; usually the bully is stronger than his or her victim. A bully is a person who is habitually cruel or overbearing, especially to smaller or weaker people. “1 out of 4 kids are bullied” and “1 out of 5 kids admit to being a bully or doing something bullying.” Bullying is a worldwide thing and just about anyone can spot a bully when they see one. When this action goes on it rises many questions like, how are kids bullied today and why do bullies do it. Also many people ask including me, what are some consequences for both the bully and the bullied, and how can bullying be prevented. To start, “282,000 students are physically attacked in secondary schools each month.” Bullying today has reached a new peak from what it used to be back then. Most bullying was just verbal or intimidation. Now that were about to hit the year 2011 it’s added physical bullying, indirect bullying, social alienation bullying, and the popular cyber bullying to the list. Indirect bullying is when a bully spreads rumors and tells others about something that was told to them in private. Social alienation is when someone excludes another person from a group on purpose. Cyber bullying is when messages, pictures, or information is sent electronically, mostly by computers and cell phones. Cyber bullying is the one that is increasing today. I myself have once witnessed cyber bullying. To end, today bullying...
Words: 927 - Pages: 4
...been made over the last decade comes a new wave of bullying or harassment for students of all ages. It is known as cyber bullying. Teachers, parents, and students are becoming more concerned with the over abundance of bullying that is taking place over the web, through texting and even through phone calls. What can be done to help protect students from unwanted texts, facebook messages, and all other forms of technological communication? Is there a way to censor these forms of communication without infringing on peoples freedom of speech? This paper will attempt to find answers to the questions and expound on how serious cyber bullying is becoming and what types of serious consequences cyber bullying is producing. First let’s take a look at what types of cyber bullying are out there. Technology has advanced us to the point that bullying has gone to the extreme. Years ago a person being bullied was facing the fear of face to face confrontation, a note being written and passed around, and maybe some nasty phone calls on a home phone. Today with the advanced forms of communications such as: I Pods, Smart Phones, Computers, and all digital forms of communication, bullying has advanced passed the school yard or ball field. It is with people where ever they go and carry one these forms of technology with them. Among students the most popular form of cyber bullying is texting or facebook(web based communication forums in general are included when discussing facebook). Texting...
Words: 1730 - Pages: 7
...This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical controversies it is likely to provoke. ...
Words: 3009 - Pages: 13
...International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security, Mobile I. INTRODUCTION Information and Communications Technology (ICT) is often used as an extended synonym for Information Technology (IT). ICT is a term that summarizes the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society. A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld...
Words: 6752 - Pages: 28
...potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of its size. Global governments need to continue working on creating workable laws that accurately describe the problem of cyberattacks and effectively enforce the solution. The modern world still has a long way to go before all security threats are addressed, appropriate defence is in place and all the critical computer infrastructure is protected from hackers,...
Words: 8586 - Pages: 35
...give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a lot of different aspects to keep in mind. There are a multitude of people who want to attack the internet and everything that it loves. Well luckily there are big security companies like Cisco and Symantec who are there for the user like Tron, and will constantly defend newly discovered loopholes and vulnerabilities. See what global implications network security has and what the future may hold as I discuss the cutting edge technology and applications that new companies are coming out with. What is Network Security? Network security is a terminology that is used to describe any and all actions that are taken to protect and defend a network. Any action that is driven towards network security should be taken to protect the safety, reliability, usability, and the integrity of the network and all of its data. In order to explain network security a little better, I want to define what a network is. A network is defined as a system or grouping of interconnected items or individuals, and as an arrangement of vertical or horizontal lines that intersect one another (Cisco). When using the term network within the realm of technology, it refers to interconnected computers within a system or a group that can communicate with one another. As a basic example, plugging a computer into a power outlet does not create a network. The computer will...
Words: 3413 - Pages: 14