Nothing Special   »   [go: up one dir, main page]

Cybercrime and Cybercrime Trends

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

CYBERCRIME AND CYBERCRIME TRENDS

The Internet, computers, and mobile technologies have dramatically


reshaped modern society. Although it is difficult to comprehend, less than two
decades ago most individuals did not own cellphones, and personal computers
were still somewhat expensive pieces of coffee equipment. Individuals could not
text and e-mail. Internet connectivity was possible through dial-up modems or
Ethernet cabling and people paid by the hour for access to the web. Video game
systems use 16-bit graphics and did not connect to other devices. Global
positioning systems were largely used in military applications only. (Holt, et.,
al., 2018)

Today according to Holt. Most of the world now depends on computers, the
Internet, and cellular technology. Individuals now own laptops that are
connected via Wi-Fi, cell phones that may also connect with the Internet, and
one or more video game systems that may be networking. In addition, people
have multiple e-mail accounts for personal and business use, as well as social
networking profiles in multiple platforms. Cell phones have become preferred
method of communication for most people, especially text messages. In fact,
individuals under the age of 20 regularly send more thoughts than any other
age group and prefer to send texts, rather than make phone calls. Individuals
also frequently purchase goods online and are increasingly using e-readers for
books and newspapers rather than traditional print media.

This is especially true with the proliferation of Internet of Things (IOT). It has
open vast opportunities for improvement in the various fields like e- learning,
e-banking, e- shopping, communication via e-mail, Messenger, Facebook,
Instagram and the like.
People have embraced the use of technology without resistance and has
become very reliant to various Internet of Things to make life more comfortable
and convenient. Worldwide statistics will confirm how digital natives and
immigrants have embraced the world of technology.

According to Statista.com (2020). Facebook has a monthly active user


(MAU)of about 2.70 billion. And smartphone has become very convenient in
using Facebook. Furthermore, the social network is accessible for mobile web
users and has published a series of acts based on the original Facebook
features such as Facebook Messenger, which had 1.3 billion monthly active
users as of the most recent report. The wide range of Facebook related apps
ensure that the company is one of the most app publishers worldwide based on
downloads. Similarly. Twitter, on the other hand, has a monthly active user
of 330 million. And 145 million daily active users. Instagram, the mainly
mobile photo sharing network, has reached 1 billion monthly active users
and 500 million daily active users.

The ease and benefits of an ultra- modern technological society has made our
world smaller. More and more people will use the Internet in their daily lives
that policing our actions and others become paramount to maintain order.

Over the past few decades, the Internet has also transformed the way products
are bought and sold all over the world. As shoppers are increasingly making
purchases online, global retail ecommerce sales have surpassed 3.5 billion U.S.
dollars in 2019. A growing number of online transactions are carried out via
mobile devices, making ecommerce an ever more profitable industry. But while
digital literacy is expanding, so are the concerns about online privacy, fraud
and hacking. All this information tells us that the world is becoming more
digital. According to statistica.com 2020, there are now more than 4.57 billion
people using the Internet. China, India and the United States, ranked ahead of
all other countries in terms of Internet users, surprisingly enough. This data
show that about 59% of the world’s population is now online. This figure will
grow and grow each year as we embrace this Internet of Things that makes our
lives easier than ever.
As emphasized by Holt. Technology has not simply shifted the behaviors of
youth, but has shaped and molded their behavior and worldwide from the
start. Most people born in the mid to late 1980s have never lived without
computers, the Internet, person books. Therefore, they do not know a world
without these devices and what life was like without these resources.
Therefore, these youths are called digital natives in that they were brought in
the world which was already digital, spending large amounts of time in digital
environments and use technological resources in their day-to-day lives.

By contrast, Digital immigrants, are those who were born prior to the creation
of the Internet and digital technologies. These individuals quite often need to
adapt to the digital environment, which changes much more rapidly than they
may be prepared for otherwise.
With this development, the world has indeed become smaller. People can do
business easily in whatever part of the world. We can communicate with
friends and family in any part of the world, but with all good things. There is a
downside. The criminals can also do the same, manage their illicit business
from any part of the world, steal our money or personal information, and more.
However, this is not the worst scenario. Criminals in cyberspace cannot easily
be held accountable for criminal acts if committed in one country while he or
she is staying in another country with different laws,
A sovereign country cannot just turn over their citizen, to another sovereign
country. This will take a long and lengthy mutual legal assistance treaty
(MLAT) between countries, but this legal process takes time. Committing
crimes in the cyberspace makes it easier for cyber criminals to perfect their
trade with little risk or identification or being caught.
But all is not lost, to address this, countries around the world must harmonize
their loss to expedite the prosecution of these cybercriminals. One good
example is the Budapest Convention that allows for the harmonization of
cybercrime laws.

The Budapest Convention provides the needed mechanisms for the eradication
of cybercrimes by facilitating their detection, investigation, and prosecution at
both the domestic and international levels, and by providing arrangements for
rapid and reliable international cooperation.

One of the main features of the convention is the establishment of central


authorities which will enable state-parties to ensure the provision of immediate
assistance for investigation and prosecution of cybercrime and/or cyber-related
cases, or for the collection of electronic evidence which may be situated
anywhere in the world.
GENERAL CONCEPT OF CYBERCRIME
According to Blitz in 2013. Cybercrime refers to any criminal activity which has
been committed through or facilitated by the Internet.
According to Yor and, Steinmetz 2019. Cybercrime is any criminal activity that
takes place within or by utilizing networks of electronic communication such
as the Internet.
Cybercrime, according to the Department of Justice to attune the definition of
cybercrime to the legal framework of the Philippines Republic act number
10175 or the cybercrime prevention act of 2012 punished certain acts that
constitute the offense of cybercrime such as offenses against a. the
Confidentiality, Integrity, and availability of computer data system, b.
computer- related offenses, and content- related offenses.
For all the variations in terminology, Clough (2010) stressed that there is now a
broad consensus as to what cybercrimes encompass. This involves a three-
stage classification. As summarized by the US Department of Justice.
1. Crimes in which the computer or computer network is the target of the
criminal activity. For example, hacking, malware and denial of service attacks.
2. Existing offenses where the computer is a tool used to commit the crime. For
example, child pornography, stalking, criminal copyright infringement and
fraud.
3. Crimes in which the use of a computer is an incidental aspect of the
Commission of the crime, but may afford evidence of the crime. For example.
Addresses found in the computer of a murder suspect or phone records of
conversations between the offender and the victim before the homicide. In such
cases, the computer is not significantly implicated in the Commission of the
offense but is more repository for evidence.

You might also like