Introduction
Along with the fast developments and various applications of the internet comes the improvement of people’s living standard. Undoubtedly the emerging new technology is playing such a significant role in fields like promoting interpersonal interactions, driving global collaborations and increasing the world’s productivity, that our society may not stay as functional as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communications and the lack of either moral or legal control, has also brought about an unprecedented form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the distinct nature of criminals and different motivations, some of them may not have huge negative social impact while others can result in massive loss for both individuals and society. On all accounts, it is indeed of great importance to study internet abuse so as to construct a safer community with higher stability for the existence and prosperity of human-beings.
To examine online deviances and crimes objectively, both theoretical supports and a large amount of data are required. As for hacking part, the grounded theory is applied so as to systematically and comparatively analyze the similarities and differences between “good” hackers and “bad” hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical example for depiction and explanation. In the specific region where the younger generation constructs a morally and legally deviant subculture, the prospect of the state is worth concerning. Organized in a progress...
... middle of paper ...
...me. New York, NY: Basic Books.
Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 56–59. Retrieved from http://www.time.com/ time/magazine/article/0,9171,1109334-1,00.html Taylor, P. A. (1999). Hackers: Crime and the digital sublime. New York, NY: Routledge.
Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. Washington DC: United States Institute of Peace.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 25, 317–332.
Whine, M. (1999). Cyberspace—A new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231–246.
Zetter, K. (2008). Israeli hacker “The Analyzer” suspected of hacking again. Wired. Retrieved from http://www.wired.com/threatlevel/2008/09/the-analyzer-su
Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/268/540 White, J. R. (2014). Terrorism and homeland security (8th ed.). Belmont, CA: Wadsworth.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
Currie, Stephen. "Osama bin Laden and al-Qaeda." Terrorists and Terrorist Groups. San Diego: Lucent Books, 2002. 69-83. Print.
Petallides, C. J. (2012). "Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat." Student Pulse, Vol 4, No 3 Accessed online http://www.studentpulse.com/a?id=627> on 12/03/14
Sageman, Marc. "The Journal of International Security Affairs The Normality of Global Jihadi Terrorism 2005th ser. Spring.9 (2005). .
Chaliand, G. & Arnaud, B. (2008). The history of terrorism: from antiquity to al Qaeda.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
The future of America is definitely affected by terrorism and terrorism has benefited from the new technologies that aid and speed up communication around the world. Terrorists can use tactics that they know and manipulate advanced technologies such as the internet. These technological advantages have certainly improved the capabilities of terrorist groups to plan and accomplish their operations. It also offers these terrorists the ability to affect communities faster and much more intensely than earlier terrorists. In order to reduce America's vulnerability to terrorism, in regards to their threats, strategies and tactics, when dealing with the internet, a complete understanding of the nature of America’s enemies is necessary.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrade its ability to make decisions, and to command its military forces. Additionally, information warfare is composed of cyber warfare and related to the protection, disruption, destruction, denial, or manipulation of information in order to gain a benefit through the technologies (Taddeo, 2012). Accordingly, as technology becomes readily available to various entities, the ability to conduct or perform warfare through technological means is multiplying.
In today's society, many aspects of crime committed on a regular basis. Civilians take advantage of people all the time using online resources such as a fraudulent website requiring credit card information to get a free monthly trial. Other examples of cyber crimes are online chatting website, full of predators or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other. Every day citizens are constantly losing money and being victimized due to these fraudulent activities. Cyber crime, including fraud, identity theft, stalking, and hacking, is a growing problem which can be prevented by taking the proper precautions.
“On domains: cyber and the practice of warfare.” International Journal 69.3 (2014): 394+. Academic OneFile. Web. The Web.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.
"Internet Has Become Haven For Terrorists, Hate Groups: Wiesenthal Centre." Canadian Press, The (n.d.): Newspaper Source Plus. Web. 4 Feb. 2014.
Today in present, with the improvements in technology and science new concepts are integrated in our lives. Cyber crime is among those concepts that did not exist 15 to 20 years ago. In the old days only conventional crime was discussed, which refers to those traditional, illegal behaviors that most people think of as crime. In today one has to be careful not only against conventional crime but also cybercrime also known as “faceless crime” it’s the latest and the most complicated problem in the new century. Cybercrime consists of all criminal actions against communication devices in a network such as Internet, telephone lines or mobile network. Cyber crime can be observed among people at various age groups as it is easier to commit compared to other types of crime like murder, kidnapping or human trafficking.