Criminology

Read Complete Research Material

CRIMINOLOGY

Cyber Crime Task Force Plan



Executive Summary

This report constitutes an overview of Cyber Crime. It briefly defines what Cyber Crime is and the kind of Cyber Crime that exists. It highlights the history of internet crime along with the crime ratio in St. Louis. It also discusses the law and Criminal Justice with respect to cyber crime along with the international law enforcement standards. The report emphasizes on the role of robotics and Tele robotics in eradicating those crimes which might be apparent in the near future. It also focuses on the basic prevention tactics that can aid in reducing cyber crime.

Cyber Crime Task Force Plan

What is Cyber Crime?

The term cyber crime has no certain definition. Generally speaking, cyber crime can be referred to as any illegal conduct that takes place though the medium of a computer or networks of computer. Some school of thoughts have emphasized on the fact that the illegal conduct that takes place on the internet can eventually lead to a comprehensive crime taking place at a larger level.

Technological means used to commit cyber offenses refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. Modern information technology (IT) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wirelessly, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or legal jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes.

History of Cyber Crime

Online crime began in the early 1960s when universities and certain government agencies and banking institutions began using networked computers to send text messages, for research, financial transactions, and record keeping. The earliest abusers of computer systems were college students who experimented with using them to play games and solve problems. Early abuse involved relatively harmless pranks and computer hacking (i.e., breaking into computer systems) to view files and sometimes manipulate or steal data. By the 1970s, as computer use in society increased, so too did the amount and variety of online abuse. Offending evolved beyond pranks and hacking into high-tech forms of embezzlement and fraud that were increasingly difficult to detect, investigate, and prosecute. In response, U.S. government and many states began creating computer crime laws during the 1980s. Even so, the real onset of modern cyber offenses began in the 1990s as more sectors, organizations, and individuals in computerized countries like the United States increasingly purchased more affordable, powerful, and interconnected personal computers (PCs), and later, portable devices such as mini- and laptop computers, PDAs, and cellular phones. This trend, which is continuing into the 21st century, along with the millions of broadband (high-speed) Internet connections made available via thousands of Internet service providers located around the world, makes it possible for billions of Internet users to become victims of cyber offenses.

Types of Online Abuse and Crime

Every form of online abuse and crime ...
Related Ads
  • Criminology
    www.researchomatic.com...

    Criminology , Criminology Essay writing ...

  • Criminology
    www.researchomatic.com...

    Criminology , Criminology Research Pape ...

  • Criminology
    www.researchomatic.com...

    Criminology , Criminology Assignment wr ...