Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet141/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   137   138   139   140   141   142   143   144   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

134
CHAPTER 11
ICT as a protection tool against child exploitation
In a report by “E-Crime,” The House of Commons Home Affair Committee we 
read: “We are deeply concerned that it is still too easy for people to access inap-
propriate online content, particularly indecent images of children… There is no 
excuse for complacency. We urge those responsible to take stronger action to re-
move such content. We reiterate our recommendation that the Government should 
draw up a mandatory code of conduct with internet companies to remove material 
which breaches acceptable behavioural standards… [it is] important that children 
learn about staying safe online as it is that they learn about crossing the road safely” 
(E-Crime House of Commons, 2013).
While there is much to do to develop the legal framework around what can be 
blocked, or not, and to put the necessary technologies in place, the Web itself is 
rapidly developing and new technological challenges emerge. Time magazine 
(November 2013) produced a special report about what has been termed as the “Deep 
Web.” Like the story of the Internet the story of the “Deep Web” is also associated 
with the US military and research done by scientist associated with the US Naval 
Research Laboratory aimed at “Hiding Routing Information.” The report states that 
what was being developed: “laid out the technical features of a system whereby us-
ers could access the Internet without divulging their identities to any Web server or 
routers they might interact with along the way.”
The “Deep Web” as the report worryingly suggests is where organized crime or 
terror networks work with masked identities and it is also where drugs, false pass-
ports, sophisticated SPAM, child prosopography and other criminal activities are or-
ganized with untraceable currency like “Bitcoin” (also see Chapter 9).
So given the complexity of the legal frame work and the ever increasing technical 
challenges what are the key issues that we need to tackle not only to provide a safer digital 
world for the children but also use the technology itself to help us develop the solutions.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   137   138   139   140   141   142   143   144   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish