Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Exploring our Screen Lives, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
The inescapable reality is that, in a relatively brief span of time, the world has become dependent upon the Internet, and in virtually every aspect of its functioning. On national levels, governments rely on it to store crucial data, safely communicate privileged information, orchestrate policies, and interact with other governments through secure channels. In societal arenas, citizens everywhere bank, shop, and conduct personal relationships through the Internet as frequently and as confidently as such activities were engaged in prior to its advent. Today, the Internet has become an indispensable means of conducting any facet of living not confined to literally personal contact.
This being the case, the opportunities for criminal exploitation of the Internet are, not unexpectedly, as widespread and diverse as the uses of it. Reliance upon the Internet being, again, a completely global affair, an exponential aspect to criminality arises, in that cybercrime is equally free to emerge from any quarter and directed at a target also vastly open in location. For law enforcement, it is very much a complicated process of “catching up”, and in a race begun before law enforcement even entered it: Measures are perpetually taken, but often in ignorance or opposition to existing ones. Meanwhile, new technologies continually provide fresh arenas for cybercrime. As the following will examine, the research on the subject reveals that cybercrime is changing the way crime itself is seen, and approached.
Five Reports on Cybercrime
With global usage of the Internet, all the conflicts both internal and external to governments become exacerbating components in any attempt to define, identify, and prosecute cybercrime. This is evidently made worse by the difficulties in merely establishing basic, regulatory, Internet standards and procedures, as the Internet is inherently always evolving: In “Dealing with the Problem of Cybercrime”, the authors address this particular aspect of the Internet: “It is as a result regulated in a largely ad hoc manner which makes it a rich environment for criminal behaviour” (Alkaabi, Mohay, McCullagh, & Chantler 12). In this complex address, the authors propose a series of new definitions of cybercrime based upon existing ones from various nations. Comparisons are made which reflect both identical concerns and contrasting approaches, and the research fully supports the contention that “The lack of a globally harmonized legal framework with respect to cyber criminal activities has become an issue requiring the urgent attention of all nations” (15). Moreover, the authors assert that a lack of globally organized attention to cybercrime is as potentially dangerous as any other global catastrophe the world may face.
Moreover, the above illustration highlights what may be the greatest dilemma in addressing cybercrime, which is, ironically, locale. This is the subject of “Approaches to Cybercrime Jurisdiction”, in which authors Breener and Koops examine the vastly influential issues of jurisdiction in regard to defining and prosecuting cybercrime. As they note, tt is not only that, as in the United States, different states have completely different statutes regarding degrees of criminality; it is also that what comprises jurisdiction itself is brought into question by virtue of the universality of the Internet. That is to say, the place where the cybercrime took place is as valid a jurisdiction as the location of the crime’s perpetrator, which may be on the other side of the world (Brenner, Koops 3). In such an instance, which region has the proper authority, or is obligated to pursue the offender? As this article clearly indicates, the “invisibility” of the Internet, as well as its universality, raise serious questions as to literal arenas of criminality.
“Is Your Information at Risk?: Information Technology Leaders’ Thoughts About the Impact of Cybercrime on Competitive Advantage” is a reflective work on the commercial vulnerabilities of the Internet. As regards this aspect, the dangers to businesses posed by cybercrime are many, and authors Jones and Mujtaba document the legal identifications of them. Nine specific forms of such crime, in fact, have been isolated. Of these, the authors note that the primary concerns are the intentional destruction of information, the unauthorized downloads of data and material, and unauthorized, or illegal, transactions (Jones, Mujtaba 9). The articles goes on to emphasize how even these definitions contain multiple potentials for cybercrime. For example, unauthorized downloads of data may be done for purposes of extortion, as well as espionage. Then, simple transactional crimes, in which an individual’s banking account may be accessed, place cybercrime on another level of difficulty, for elements of individual responsibility come into play. Plainly, it is easier to identify as a crime the robbing of a person on the street, while a theft permitted through a careless allowing of access on the part of the victim calls into question an enabling of crime too overt to be ignored. This thoughtful work addresses how even the parameters of known, traditional crime take on new meaning in a cyber context.
It seems inevitable that cybercrime must accompany Internet activity as certainly as crime occurs in any arena of mankind. Its potentials, however, are more extreme precisely because the Internet is, figuratively, everywhere, and possessed of every manner of information, and this poses the kinds of national threats addressed by Patrick Marshall in “Cybersecurity”. Commercial vulnerabilities are rampant, but the fact that the most sensitive information in a nation’s possession is stored, in some fashion, online, translates to extreme risks to national security. As Marshall notes, the most destructive activities imaginable are now permitted through the subtle means of data transmissions, and it is not surprising that cybercrime is now ranked by the Federal Bureau of Investigation as the third greatest security issue, following terrorism and counterespionage (Marshall 799).
In the article “Computer Hacking”, however, one benefit emerges from research, in regard to fighting cybercrime, and it is one created by a variation of crime itself. Author Marcia Clemmitt addresses the fact that computer hackers, typically at work to illegally access information, have actually discovered greater incentives in revealing their discoveries to commercial institutions and security agencies (Clemmitt 766). Initial impulses to generate illegal gain have, in fact, pointed the way to improved security. Clemmitt does not wholeheartedly endorse hacking as the answer to preventing cybercrime, however, and she presents opposing viewpoints that point out the inherent weaknesses of turning to any such activity as a strategy. Nonetheless, this evolution of hacking as a beneficial process is an encouraging development. As the article indicates, as far as cybercrime goes, a great many solutions may be found in the vulnerability of the technology itself.
Works Cited
Alkaabi, A., Mohay, G. M., McCullagh, A. J., & Chantler, A. N. Dealing with the Problem of Cybercrime. In: Conference Proceedings of 2nd International ICST Conference on
Digital Forensics & Cyber Crime, 4?6 October, 2010. Abu Dhabi. Retrieved from http://www.springerlink.com/content/w66l10404p6706p2/
Brenner, S. W., & Koops, B. Approaches to Cybercrime Jurisdiction. Journal of High Technology Law, Vol. IV, No. 1. pp. 1-46. 2004.
Clemmitt, M. Computer Hacking. CQ Researcher,21, pp. 757-780. 2011, September 16. Retrieved from http://library.cqpress.com/cqresearcher
Jones, C., & Mujtaba, B. Is Your Information at Risk?: Information Technology Leaders’ Thoughts About the Impact of Cybercrime on Competitive Advantage. The Review of Business Information Systems, Vol, 10, No. 2. pp. 7-20. 2006.
Marshall, P. Cybersecurity. CQ Researcher,13, pp. 797-820. 2003, September 26. Retrieved from http://library.cqpress.com/cqresearcher
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee