Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet155/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   151   152   153   154   155   156   157   158   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

147
 
References
UN, Convention on the Rights of the Child, 1989.
UNICEF Innocenti Research Centre, 2008. South Asia in Action: Preventing and Responding 
to Child Trafficking. UNICEF.
UNICEF Innocenti Research Centre, 2011. Child Safety Online Global Challenges and 
Strategies. UNICEF.
Wulczyn, F., Daro, D., Fluke, J., Feldman, S., Glodek, C., Lifanda, K., 2010. Adapting a 
Systems Approach to Child Protection: Key Concepts and Considerations. UNICEF, 
New York.


CHAPTER
149
12
Cybercrime classification 
and characteristics
Hamid Jahankhani, Ameer Al-Nemrat, Amin Hosseinian-Far
INTRODUCTION
The new features of crime brought about as a result of cyberspace have become 
known as cybercrime.
Cybercrime is growing and current technical models to tackle cybercrime are in-
efficient in stemming the increase in cybercrime. This serves to indicate that further 
preventive strategies are required in order to reduce cybercrime. Just as it is important 
to understand the characteristics of the criminals in order to understand the motiva-
tions behind the crime and subsequently develop and deploy crime prevention strate-
gies, it is also important to understand victims, i.e., the characteristics of the users of 
computer systems in order to understand the way these users fall victim to cybercrime.
The term “cybercrime” has been used to describe a number of different concepts 
of varying levels of specificity. Occasionally, and at its absolute broadest, the term 
has been used to refer to any type of illegal activities which results in a pecuniary 
loss. This includes violent crimes against a person or their property such as armed 
robbery, vandalism, or blackmail. At its next broadest, the term has been used to refer 
only to nonviolent crimes that result in a pecuniary loss. This would include crimes 
where a financial loss was an unintended consequence of the perpetrator’s actions, 
or where there was no intent by the perpetrator to realize a financial gain for himself 
or a related party. For example, when a perpetrator hacks into a bank’s computer and 
either accidentally or intentionally deletes an unrelated depositor’s account records.
Wall (2007)
 argues that in order to define cybercrime, we need to understand the 
impact of information and communication technologies on our society and how they 
have transformed our world. Cyberspace creates new opportunities for criminals to 
commit crimes through its unique features. These features are viewed by 
Wall (2005)
 
as “transformative keys,” and are as follows:

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   151   152   153   154   155   156   157   158   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish