Free Essay

Impact of Mobile Information and Communication Technology on Cybercrime

In:

Submitted By oyenikeolanrewaj
Words 6752
Pages 28
International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria
Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2
1,2

Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria

Keywords: Cybercrime, Intelligent, Investigatory

Security,

Mobile

I. INTRODUCTION

Information and Communications Technology (ICT) is often used as an extended synonym for Information Technology (IT). ICT is a term that summarizes the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society. A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld computing device has an operating system (OS), and can run various types of application software, mostly called apps. Most handheld devices are also equipped with wireless fidelity (Wi-Fi), Bluetooth, and Geographic Positioning System (GPS) that can allow connections to the Internet and other Bluetooth enabled devices along with a

IJE RT
Devices,

Abstract - The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth rate over the past decade but has however given way to something greater and a more alarming increase in the rate of internet insecurity and cybercrime in Nigeria. It is therefore no wonder that crimes like mail scams, phishing, identity theft and privacy intrusion among others are on the increase in the country. Although some efforts have been made in the past to reduce the incidence of these cybercrimes, it is quite obvious that the high demand on mobile ICT and their numerous benefits are been played upon to the detriment of innocent people. This paper discusses the current internet security situation and the direct impact of mobile information and communication technologies on cybercrime in Nigeria and as well proffer solutions.

stable battery power source. Mobile phones, Smartphones and PDAs are popular examples of these mobile devices. (Wikipedia) Cybercrimes on the other hand can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, or deny someone of what belongs to him/her, using modern telecommunication networks such as Internet and mobile phones. Such crimes may threaten a nation’s security and financial stability. Cybercrime can simply be explained as crimes carried out with the aid of a computer system against an individual, organization or a nation[9]. The whole African continent is increasingly relying on new information technology and the internet with new media to conduct business, manage industrial activities, and engage in personal communication among other numerous benefits connecting us to the developed world. While these mobile technologies and devices allow for enormous gain in efficiency, productivity and communication, they also create a vulnerability to those who wish to and thrive in taking advantage of new situations. The exponential growth of the internet and its global acceptance is generating increasing security threats. The cyber space creates unlimited opportunities for commercial, social, and, educational activities as well as a haven for societal miscreants to perpetrate their sinister acts. Technology is developing by leaps and bounds thereby making the internet easily accessible through various mobile devices including smartphones, tablets among others. Even the smallest phone is now internet enabled and thereby susceptible to internet crime or cybercrime. This article therefore looks into the growth of mobile devices as well as the different cybercrime methods that have threatened the basic benefits of our ICT age. The approach used was to review related literatures on cybercrime in Nigeria, analyze the impact of the tremendous increase in mobile ICT on cybercrime, propose an intelligent cybercrime investigatory system framework and suggest various ways cybercrime can be controlled.

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

586

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

II.

LITERATURE REVIEW

Reference [2] carried out investigations into the activities of cyber criminals within Nigeria, where they discovered that cybercriminals’ strategies include collaboration with security agents and bank officials, local and international networking, and the use of voodoo that is, traditional supernatural power. It was also revealed that most perpetrators of cybercrime were involved in on-line dating and buying and selling with fake identity among others. The article discussed the need for reorientation of Nigerian youths in higher institutions towards various other means of livelihood. Reference [9] identify urbanization, unemployment, quest for wealth, weak implementation of cybercrime laws and negative role models among others as major reasons why Nigerian youth commit cyber-crimes. Several youth engage in cybercrime with the aim of emerging as the best hacker, or as a profit making venture since the tools for hacking in our modern world has become affordable by many. The article highlighted reduction of competitive strength, loss of time and resources among others as part of grievous effect of cybercrime in Nigeria. In the review article by [10], it was stated that 23 percent of people worldwide will fall for spear phishing attacks, while web pages are infected on average every 4.5 seconds. The review also stated that African Countries like Kenya, Nigeria, Tunisia, Tanzania etc. are almost free from the cyber laws and policies. The article highlighted that cybercrime is a sensitive issue for people relying on iPhones for their day today working because some worm can eat all the iPhones and convert the Androids to bricks. In a survey carried out within Nigeria by[24], the research scope is focused on gathering data on the economic cost of cybercrime on the Nigerian citizen thus simulating a better grasp of this issue and the need to actively promote proper, firm and fair legislation. 2,980 persons participated in the survey from five locations in the country. 41% have been affected by cybercrime in one way or the other.

These are anomalies that can easily be aided with mobility of devices.

Fig. 1. Distribution of various Cyber-attacks according to Internet Cybercrime Report 2012

III.

CYBERCRIME IN NIGERIA

Cybercrime has evolved in parallel with the opportunities afforded by the rapid increase in the use of the Internet for e-commerce and its take-up in the developing world. In February 2013, 2.7 billion people, nearly 40% of the world population, had access to the Internet. The rate was higher in the developed world (77%) than in the developing world (31%). While Africa had the lowest Internet penetration rate (16%), between 2009 and 2013, Internet penetration has grown fastest in Africa (annual growth of 27%) followed by Asia-Pacific, the former Soviet Union, and the Arab states (15% annual growth rate). Around one quarter of all Internet users used English (27%) on the web, and another quarter (24%) used Chinese [20]. The exponential growth of the internet and its global acceptance is generating increasing security threats. The cyber space creates unlimited opportunities for commercial, social, and, educational activities as well as a soft spot for haven for those who thrive by perpetrating treacherous acts. Figure 1 below is graphical representation of various cybercrime methods according to internet cybercrime reports. Virus, worms, Trojans and Malware top the list.

IJE RT

A. TYPES OF CYBERCRIME PERPETRATED THROUGH MOBILE DEVICES Cybercrimes simply put are crimes that are committed using the Computers and Networks. There are several types of cybercrimes which are aided and given a boost by the advent of mobile devices some of which include: 1) Cyber Terrorism The Center for Strategic and International Studies (CSIS) has defined it as “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” Reference [29] defines cyber terror as “the intimidation of civilian enterprises through the use of high technology to bring about political, religious, or ideological aims and actions that result in disabling or deleting critical infrastructure data or information.” On the other hand, [21] defined Cyber terrorism as an act of terrorism committed through the use of cyberspace or computer resources. It means that any act intended to instill fear by accessing and distorting any useful information in organizations or Government bodies using Computer and Internet is generally referred to as Cyber Terrorism. 2) Fraud - Identity Theft Fraud is a criminal activity in which someone pretends to be somebody and retrieve vital information about someone says [16]; For instance, creating a false bank webpage to retrieve information of someone’s account. The concept is about someone gaining access to another person’s information and uses it for his own benefit. This could range from a black-hat hacker stealing online banking account login and password to getting access to ATM to commit. In Nigeria people design web links forms requesting users to fill inn their basic information including,

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

587

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

unique details like pin numbers and use that to commit crimes. 3) Drug Trafficking Deals Another type of Cyber Crime is Drug Trafficking; it is a global trade involving cultivation, manufacture, distribution and sale of substances which are subject to drug prohibition law. According to Cyber Advocate, drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals online, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restrictedaccess chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to comfortably purchase illegal drugs. 4) Cyber Stalking Cyber stalking is essentially using the Internet to repeatedly harass another person. This harassment could be sexual in nature, or it could have other motivations including anger. People leave a lot of information about themselves online. Such information can leave one vulnerable to cyber stalking, a term that essentially refers to using the Internet to stalk (to illegally follow and watch somebody) [12]. Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. 5) Spam Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam [23]. Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. A person who creates electronic spam is called a spammer.

tandem with viruses. Whereas a simple virus infects a program and then replicates when the program starts to run, the logic bomb does not replicate – it merely waits for some pre-specified event or time to do its damage. Time is not the only criterion used to set off logic bombs. Some bombs do their damage after a particular program is run a certain number of times. Others are more creative. There are several reported cases that a programmer told the logic bomb to destroy data if the company payroll is run and his name is not on it; this is a sure-fire way to get back at the company if he is fired! The employee is fired, or may leave on his own, but does not remove the logic bomb. The next time the payroll is run and the computer searches for but doesn’t find the employee’s name, it crashes, destroying not only all of the employee payroll records, but the payroll application program as well. Logic bombs present a major threat to computer systems, not just because of the damage they themselves can do, but because they provide a technique to facilitate more devastating crimes [9]. 7) 7. Password Sniffing Password sniffers are able to monitor all traffic on areas of a network. Crackers have installed them on networks used by systems that they especially want to penetrate, like telephone systems and network providers. Password sniffers are programs that simply collect the first 128 or more bytes of each network connection on the network that's being monitored. When a user types in a user name and a password as required especially when using certain common Internet services like FTP (which is used to transfer files from one machine to another) or Telnet (which lets the user log in remotely to another machine)--the sniffer collects that information. Additional programs sift through the collected information, pull out the important pieces (e.g., the user names and passwords), and cover up the existence of the sniffers in an automated way. Best estimates are that in 1994 as many as 100,000 sites were affected by sniffer attacks [9]. IV. INFLUENCE OF CYBERCRIME

6) Logic Bombs A typical logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions. The instructions may tell the computer to display “I gotcha” on the screen, or it may tell the entire system to start erasing itself. Logic bombs often work in

IJE RT

A. ON INDIVIDUALS The effects of cybercrime are becoming too expensive to bear as many people are falling prey each day and losing huge sums of money from attacks by cybercriminals. Because of this, many people in Nigeria have lost faith in the benefits of the internet and mobile technologies as the negative side seems to prevail. Services aided by mobile technologies such as internet and mobile banking are being termed insecure because loopholes are being found and people duped by the day. People would rather perform their transactions over the counter which could be time and cost ineffective for them. Fig. 2. is a pictorial representation of items that individual have lost due to cybercrime in Nigeria according to [24].

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

588

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

Fig. 2. Individual Loss to Cybercrime Source: Economic Cost of Cyber Crime in Nigeria[24]

B. ON ORGANIZATIONS In spite of the outcry on cybercrimes, not all organizations and institutions have put in place measures to safeguard their systems and data making them susceptible to logic bombs, data theft among other things. These in the long run cost them a lot of money and efforts to recover from attacks by cyber criminals. Also, financial institutions that are introducing electronic means of carrying out financial transactions to cut back on operational expenses are finding it hard to gain necessary ground because people do not yet trust the system. C. ON THE SOCIETY/NATION Nigeria’s reputation has suffered greatly due to the increase of cybercrime in the country. In the years before full penetration of the internet and mobile technologies, Nigeria had already gained the reputation of one of the most corrupt countries. However, as internet penetration

Fig. 3. Distribution of Cybercrime impact by location. Source: Economic Cost of Cyber Crime in Nigeria[24]

Fig. 4 is a representation of impact of cybercrime on the image of Nigerians according to the research carried out by [16]. Research shows that if a country like Nigeria is highly polarized by cybercrime, communication within and outside

IJE RT

and technologies gained ground, the situation has grown worse as financial crimes and other forms of crime have escalated with the use of the internet and new mobile technologies. This has caused Nigeria to lose a lot of foreign exchange from business and opportunities from investors. A stigma has been created for Nigeria and almost every Nigerian outside the country is observed suspiciously as a perpetrator of crimes. Reference [24] represented the distribution of cybercrime activities as displayed in Fig. 3 below where Uyo and Abeokuta have the highest value. Nigeria as a whole has been stigmatized as a nation whose citizens are mostly untrustworthy. This has brought about serious embarrassment when Nigerians have to travel to foreign countries; extra searching at airport as well as denial of opportunities because of high rate of cybercrime and other related offences common to Nigerians. Fig. 3 below represents the distribution of cybercrime activities across Nigeria.

such a country would be difficult because everybody will appear as a suspect which would in turn have a negative impression on such a country. A larger population of

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

589

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

respondents strongly agreed that this is possible while few

respondents disagreed with this view.

Fig. 4. Fig. 4- Effect of Cybercrime on the image of Nigeria [16]

V.

GROWTH OF MOBILE ICT IN NIGERIA

As the world goes mobile, and anxiously desiring more portable and convenient devices, it is obvious from the trend of things that cybercrime will increase. According to current state of cybercrime report (2013), mobile computing levels reached new peaks in 2012. Worldwide smartphone shipments reached 671 million for the year an increase of almost 42% over 2011. As more of our personal and official lives move to the mobile device, cybercriminals continue to develop and refine their schemes to exploit mobile transactions and mobile apps. As the number of mobile users continues to grow globally, mobile transaction volume increases, organizations will continue to add new functionalities to the mobile channel. The report further stresses that global mobile transaction volume and value is expected to have an average 42% annual growth between 2011 and 2016. As users continue to move more of their
TABLE I.

Ran k 01 02 03

Country region World China India United States

No. of mobile phones 6,800,000,000+ 1,227,360,000 1,104,480,000 327,577,529

IJE RT
Population 7,012,000,000 1,349,585,838 1,220,800,359 350,000,000 97 89.2 93.6

daily lives to their mobile devices, it is expected that cybercriminals will do the same and direct more attacks at this growing channel. The last two years have witnessed the revolution of the information technology world due to massive development and deployment of mobile systems. Unfortunately the development of the sector has not witnessed corresponding increase in the implementation of appropriate security mechanisms to protect these systems. The lack of adequate awareness programs for users to understand the necessity of having to defend a system so valuable is another trouble on its own. Mobile systems have become so valuable and an extension of our personal lives and most of the time the closest companions we have. Table 1 below is a display of the usage of mobile phones across the nations of the world. Nigeria occupies ninth position which indicates that Nigeria is competitively positioned among other nations[18].

LIST OF COUNTRIES BY NUMBER OF MOBILE PHONES

Phones per 100 citizens

Data evaluation date 2013 December 2013 31 October 2013 June 2013

90.47

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

590

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

Ran k 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 25 25 26 27 28

Country region Brazil Russia Indonesi a Pakistan Japan Nigeria Banglade sh Germany Philippin es Iran Mexico Italy United Kingdom Vietnam France Egypt Thailand Turkey Ukraine Spain South Korea Argentin a Poland Colombi a South Africa

No. of mobile phones 271,100,000 256,116,000 236,800,000 130,583,076 121,246,700 114,000,000 114,808,000 107,000,000 106,987,098 96,165,000 92,900,000 88,580,000 75,750,000 72,300,000 72,180,000 92,640,000 69,000,000 68,000,000 57,505,555 55,740,000 52,510,000 56,725,200 47,153,200 49,066,359 59,474,500

Population 201,032,714 142,905,200 237,556,363 188,854,781 127,628,095 165,200,000 165,039,000 81,882,342 94,013,200 73,973,000 112,322,757 60,090,400 61,612,300 90,549,390 63,573,842 82,120,000 65,001,021 75,627,384 45,579,904 47,265,321 48,580,000 40,134,425 38,186,860 47,000,000 50,586,757

Phones per 100 citizens 136.45 155.5 99.68 69.18 95.1 69 69.5 130.1 113.8 130 82.7 147.4 122.9 79

Data evaluation date December 2013 July 2013 September 2013 December 2013 June 2013 May 2013 January 2014 2013 October 2013 February 2013 Dec. 2011 Dec. 2013 Dec. 2013 October 2013 Dec. 2013 Egypt Ministry of Communications & IT, August 2013 2013 2013 Dec. 2013 Feb. 2013 2013 2013 2013 2013 2013 GSM African Mobile Observatory report

IJE RT
105 89.9

114.2 112.81

126.0 118.0 108.1 141.34 123.48 104.4 117.6

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

591

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

Ran k 29 30

Country region Algeria Taiwan

No. of mobile phones 33,000,000 28,610,000

Population 35,000,000 23,197,947

Phones per 100 citizens 94.2 123.33

Data evaluation date 2013 September 2013

A. THE CONTRIBUTION OF MOBILE DEVICES TO CYBER INSECURITY According to the 2012 Norton Cybercrime report, Cybercrime has gone mobile with the increase of mobile technologies and devices. In the report, it is stated that 2/3 of adults use a mobile device to access the internet which has increased mobile vulnerabilities by double the previous occurrences. Mobile vulnerabilities doubled in 2011 from 2010. Also, 31% of mobile users received a text message from someone they didn’t know requesting that they click on an embedded link or dial an unknown number to retrieve a voicemail. In short, as consumers go mobile, so do cybercriminals. According to internet report, [11] the top 10 perpetrators of cybercrime are: 1. United States 65.4% 2. United Kingdom 9.9% 3. Nigeria 8.0% 4. Canada 2.6% 5. Malaysia 0.7% 6. Ghana 0.7% 7. South Africa 0.7% 8. Spain 0.7% 9. Cameroon 0.6% 10. Australia 0.5% Nigeria occupies 9th position on mobile phone users and correspondingly occupies 3rd position on cybercrime table. The location independent operations of mobile devices alongside with the low cost of these devices make cyber security more difficult to implement. According to a survey carried out by [6] in 2013, one of the respondents claimed “My view on the perpetrated point of crime is the home. This is due to the fact that even ordinary Nokia C3 can browse and with the reduction in the price of MB (data bundles), anybody who is interested in criminality can afford it.” It is therefore very clear that as Nigeria is celebrating progress in the technological world, cyber criminals are also celebrating an increase of their territory and impact. B. CHALLENGES OF CYBER SECURITY PROVISIONING IN NIGERIA Based on an interview with a Governmental Cyber security Agency, The National Information Technology Development Agency (NITDA) suggests that the major problem towards identifying cybercrime activities is Section

14 of the Nigerian Constitution, which states that “no person shall be punished for a crime unless such crime is prohibited by written law and specific penalties are provided for the violation”. As such; there is no cybercrime in Nigeria because there is no written law prohibiting any activities on the Internet. The agency reports that, the law enforcement agencies get evidences to ensure conviction through any other means apart from electronic evidence because there are no legal provisions or instruments available in the Nigerian Criminal Law that address cybercrime directly. The agency contributes to efforts towards cyber security through capacity building workshops on cybercrime, public enlightenment programs, and interactive sessions with the Bankers’ Committee and law enforcement agencies. They also sponsored the cybercrime bill, worked with the Law Reform Commission in updating the evidence act, and partners with the private sector in setting network security rules. In spite of all their efforts, they still face some challenges owing to the fact that they are not a law enforcement agency. Another great challenge is the alarmingly low awareness of the general populace as well as law enforcement agencies and policy makers on cybercrime. For instance, banks in Nigeria will hardly provide information to law enforcement agencies on cyber security threats they receive. Furthermore, the Agency is plagued with inadequate funding which makes it difficult for them to set up a forensic laboratory, equip and train personnel. C. SUGGESTED SOLUTION TO CYBERCRIME BY STAKEHOLDERS 1) INDIVIDUAL NIGERIANS It may be almost impossible to completely eliminate the incidence of cybercrime in Nigeria as criminals will always try to find a loophole to perpetrate their crimes either for financial gain, reputation or revenge. However, individual Nigerians will have to be more alert about the situation and put in place measures to secure themselves. Some of these include having strong passwords for their emails, systems and mobile devices. A good password should never consist of things people would easily guess including your name. It is advisable for a password to contain a mixture of lower and upper case characters, numbers and special characters. Also, debit (ATM) card PINS should not be written or stored in places people have access to and should be changed periodically. Since mobile devices and smartphones are being used for financial transactions, they should be guarded jealously and protected with a good antivirus and passwords to forestall intruders.

IJE RT

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

592

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

Individuals are also advised to avoid downloading supposedly free software from untrusted sites online as they tend to carry baggage along with them that are harmful in the long run. 2) ORGANIZATIONS AND PROFESSIONAL BODIES Organizations, companies, firms and institutions that work with the internet and technological devices should take measures to protect themselves from attacks. Usually, cyber criminals are on the lookout for loopholes and the best thing would be to find them out internally and plug them before they are found out and damage is caused. Also, security policies and strategies should be put in place for all staff and guests as regards access to organization data and resources. Different professional bodies like Nigerian Computer Society (NCS) and Computer Professionals of Nigeria (CPN) could partner with government agencies like Nigeria Communications Commission (NCC), National information Technology Development Agency (NITDA) among others to create awareness and sensitize the Nigerian people on the menace of cybercrime and ways to avoid them. 3) NIGERIAN GOVERNMENT Different nations have adopted different strategies to contend with crimes depending on their nature and extent. Certainly, a nation with high incidence of crime cannot grow or develop. This is because crime is the direct opposite of development. It leaves a negative social and economic consequence[32]. For Nigeria, a nation in the process of saving her face regarding cybercrimes, efforts should be directed at the sources and channels through which cybercrimes can be perpetrated - the most popular one being internet access points. The bill on cybercrime should be passed into law by the National Assembly. This will at least restrain the criminals to some extent[31]. Nigerian law enforcement agencies are basically technology illiterate; they lack computer forensics training and often result to conducting police raids on internet service sites with little information and imperfect strategies. This becomes imperative because there is the need to do more in the area of legal framework. The traditional provisions on impersonation and criminal fraud as contained in Nigerian Criminal Code, Penal Code and AFF Act 2006 should be updated adequately take care of complex cases of phishing, identity theft and other electronic related economic crimes. At the moment, some of the legislative frameworks we have in the country have not been enacted, including the EFCC Act of 2010, sponsored by Hon. Abubakar. Even before the EFCC Amendment Act of 2010, there were some other bills that were also drafted and have been sent to the National Assembly, part of which has not yet been enacted as well. In 2005, there was the Computer Security and Critical Infrastructure protection bill sponsored by another law maker, that bill has never being enacted. In 2008, the Cyber Security Agency bill was sponsored by Hon. Bassey Etim, and has not been enacted and others like that which have not been enacted. There is therefore serious need for the law-makers to amend the EFCC Act for them to be able to arrest and prosecute cyber criminals in the most effective way [5].

Urgent Forensic training is therefore necessary for our law enforcement agencies and law makers. Cybercrime policy should be evidence-based and subject to rigorous evaluation to ensure efficiency and effectiveness. Therefore, concerted and coordinated efforts at the international level should be made to establish funding mechanisms to facilitate practical research and curb many types of newly emerging cybercrimes. It is, however, equally important to ensure that research be internationally coordinated and that research results be made widely available. 4) NETWORK OPERATORS As technology is increasing rapidly and network operators are trying to gain customers in the country, the cost of internet services has come crashing down. As much as this is of immense benefits to the general populace, the network operators like MTN, Glo, Etisalat and Airtel should help to sensitize people and put in place policies to safeguard their clientele from attacks. Also, it is paramount they readily cooperate with law enforcement agencies when such crimes are reported and being investigated. To prevent cybercrime committed through calls placed from mobile phones and smart devices, Network operators could develop a system that would request for user authorization before a call is allowed. This system would enable each registered user to create and change a Personal Identification Number (PIN) that would be required before a call connects and the account balance subsequently debited. This means that an unauthorized call cannot be placed from one’s mobile number to perpetrate any crimes to implicate other individuals. VI. PROPOSED CYBERCRIME INVESTIGATORY SYSTEM ARCHITECTURE

IJE RT

Fig. 5 below is a representation of the system architecture for the proposed Intelligent Cybercrime Investigatory System (ICIS). The ICIS will be a user friendly system that would allow various stakeholders in the Nigerian community to lodge their complaints related to suspected cybercrime activities or actual crimes. Once complaints are received, they will be forwarded to the appropriate bodies for investigation after which, reports will be given to complainant and other relevant bodies.

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

593

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

National Intelligence Online Complaints System

Intelligent Secured Tracking System

Network Operator s

Civil Rights Departme nt

Law Enforceme nt Agencies Professiona ls Bodies {NCS, CPN etc.}

Online Secured Interactive Collaboration system

Other Relevant Organizatio ns. Cyber Crime Discovery report

Fig. 5. Proposed Intelligent Cybercrime Investigatory System

1) National intelligent Complaint system This is a system any user can immediately log on to from any internet enabled device to report cybercrime cases. This system is expected to have interfaces that will enable concerned individuals or organizations to supply information that is crucial to the crime in focus. This system captures the complaint and forwards it to the intelligent tracking System. 2) Intelligent Tracking System This system is saddled with the responsibility of securing the information received from the complainant, dissemination of the details to the collaboration system. 3) Online Secured Collaboration System The contributors/participatory units comprises of Network Operator/Internet Service Providers, Security agencies, Professional bodies. Relevant organizations and Civil right commission. The respective unit is expected to play their part in the investigatory process to discover the cybercrime perpetrators. The civil right commission is to make the right of individual concern is not be tampered with unjustifiably.

IJE RT

The report from this collaboration system will be a detail report that can be used to prosecute the offender.

VII. CONCLUSION It is glaring that the advent and increase of mobile information and communication technologies has paved a smooth path for cybercrime being perpetrated in Nigeria. It is also clear that our current strategies, laws and efforts are inadequate to curb the situation on ground. However, the fight against cybercrime is not on any individual, law enforcement agency or government; rather, it has to be a collective and united effort of all. Though we might not be able to completely eradicate cybercrime, hand in hand we will be able to frustrate their work and ensure a fairly safe technological Nigeria. The government should immediately work on laws concerning cybercrime and provide the appropriate law enforcement agencies with required instruments to investigate and prosecute cybercrimes.

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

594

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014

REFERENCES
[1] [2] 2012 Norton Cybercrime report, http://www.norton.com/2012cybercrimereport March 19, 2014 Aransiola J. O. and Asindemade S. O (2011), Understanding Cybercrime Perpetrators and the Strategies They Employ in Nigeria; Cyberpsychology, Behavior, And Social Networking Volume 14, Number 12, 2011 Mary Ann Liebert, Inc.DOI: 10.1089/cyber.2010.0307 Barry Collin (1997) The Future of Cyberterrorism, Crime & Justice International Journal (March 1997): Vol#13 Issue #2, http://www.cjimagazine.com/archives/cji4c18.html?id=415 retrieved May 7, 2014 Cyber Advocate; Computer Crime http://www.cyberadvocate.com/ComputerCrime.html retrieved May 7, 2014 Emmanuel Ebeleke (2011) Why cybercrime thrives in Nigeria, by Ewelukwa; Vanguard News, http://www.vanguardngr.com/2011/04/why-cyber-crime-thrives-innigeria-by-ewelukwa/ retrieved May 5, 2014 Folashade B. Okeshola & Abimbola K. Adeta (2013), The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria, American International Journal of Contemporary Research Vol. 3 No. 9; September 2013 General Introduction to Cybercrime (2013) http://martinslibrary.blogspot.com/2013/08/general-introduction-tocyber-crime.html, 2013 Gyongyi (2005) Web Spam Taxonomy; Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web AIRWeb 2005 airweb.cse.lehigh.edu/2005/proceedings.pdf; retrieved May 7, 2014 [9] Hassan A. B., Lass F. D. and Makinde J (2012) Cybercrime in Nigeria: Causes, Effects and the Way Out; ARPN Journal of Science and Technology ©2011-2012.VOL. 2, NO. 7, August 2012 ISSN 2225-7217 http://www.ejournalofscience.org 626. Hemraj Saini, Yerra Shankar Rao, T.C.Panda (2012) Cyber-Crimes and their Impacts: A Review. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr 2012, pp.202-209 202 Internet Crime Report, (2009), Internet Crime Complaint Centre; http://www.ic3.gov/media/annualreport/2009_ic3report.pdf retrieved April 25, 2014 Justin Plot (2010) Top Five Computer Crimes & How to Protect Yourself From Them http://www.makeuseof.com/tag/top-fivecomputer-crimes-protect/ retrieved May 7, 2014 K. Jaishankar(2008); Identity Related Crime In The Cyberspace: Examining Phishing And Its Impact, International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January-June 2008, Vol 2 (1): 10–15 Knowledge@Wharton (2013), Mobile Devices and Cybercrime: Is Your Phone the Weakest Link?; Wharton University of Pennsylvania , http://knowledge.wharton.upenn.edu/article/mobile-devices-andcybercrime-is-your-phone-the-weakest-link/ retrieved April 24, 2014 Maitanmi Olusola, Ogunlere Samson, Ayinde Semiu and Adekunle Yinka(2013). Impact of Cyber Crimes on Nigerian Economy The International Journal Of Engineering And Science (IJES) Volume| 2 Issue 4 Pages 45-51 ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 www.theijes.com Maitanmi Olusola, Ogunlere Samson, Ayinde Semiu, & Adekunle Yinka (2013); Cyber Crimes and Cyber Laws in Nigeria The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 4 ||Pages|| 19-25||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 Mbaskei Martin Obono (2008); Cybercrimes: Effect on Youth Development; http://www.igenius.org/member/profile.php/id/1138/post/1007 retrieved May 7, 2014 Mohit Kumar(2011) 3G technology will increase cybercrime Wednesday, February 16, 2011 by http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobi le_phones_in_use

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[19] Oladeji, Matthew Olaniyi(2011), New Media and Revolutionary Changes: Challenges of Cybercrimes In Nigeria; POLYCOM Journal (FBCS) Vol. 15 No. 2 2011 [20] Overview of Cyber security, Recommendation International Telecommunications Union, Telecommunications Standardization Sector, ITU -T X.1205 (04/2008), http://www.itu.int/ITUT/recommendations/rec.aspx?id=9136 [21] Parker, D (1983): Fighting Computer Crime,”Charles Scribner’s Son s, United States, [22] Roderic Broadhurst, Peter Grabosky, Mamoun Alazab, Brigitte Bouhours, and Steve Chon (2013) Organizations and Cybercrime; ANU Cybercrime Observatory; International Journal of Cyber Criminology https://www.academia.edu/5196452/Organizations_and_Cybercrime [23] Saul Hansell (2007); Social network launches worldwide spam campaign New York Times retrieved May 7, 2014 [24] Sesan O., Soremi B. and Oluwafemi B Economics Cost of Cybercrime in Nigeria, Cyber Stewards Network Project, Munk School of global affairs, University of Toronto [25] The Cost of Cybercrime(2011), A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office, http://www.baesystemsdetica.com/uploads/press_releases/THE_CO ST_OF_CYBER_CRIME_SUMMARY_FINAL_14_February_2011 .pdf [26] United Nations (2004). A More Secure World, Our Shared Responsibility: Report of the High-Level Panel on Threats, Challenges, and Change (Online Report). http://www.un.org/en/events/pastevents/pdfs/secure_world_exec_su mmary.pdf Retrieved May 7, 2014 [27] United Nations (2005). UN recommendations on fighting cybercrime. http://www.crime-research.org/news/13.05.2005/1225/ Retrieved May 6, 2014. [28] What is Cyber Security (2013) http://www.itgovernance.co.uk/what-is-cybersecurity.aspx, February 10, 2014 [29] William L. Tafoya, Ph.D. (2011) Cyber Terror; FBI Law Enforcement Bulletin http://www.fbi.gov/statsservices/publications/law-enforcement-bulletin/november2011/cyber-terror; retrieved May 7, 2014 [30] Yip, M. (2011); An investigation into Chinese cybercrime and the applicability of social network analysis. University of Southampton EPrint, 1-4. http://eprints.soton.ac.uk/272351/1/139_paper.pdf Retrieved May 7, 2014 [31] F. Wada, G.O. Odulaja(2012); Assessing Cybercrime and its Impact on E-Banking in Nigeria Using Social Theories. African Journal of Computing & ICT Vol4. No 3. Issue 2 [32] Sylvester Linn (2001); The Importance of Victimology in Criminal Profiling. http://isuisse.ifrance.com/emmaf/base/impvic.html

[14]

[15]

[16]

[17]

[18]

IJE RT

IJERTV3IS080606

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

595

Similar Documents

Premium Essay

Transition of Malaysia Towards Knowledge Society by 2020: Ethical Consideration on the Use of Electronic Gadget in Malaysia Schools

...Master in Engineering Business Management Razak School of Engineering and Advanced Technology Universiti Teknologi Malaysia International Campus Kuala Lumpur, Malaysia Abstract Due to demands to full fill necessity of K-economy towards Vision 2020, Malaysia is now on the race to create more Information Technology (IT) literate. Education sector has been targeted to be an introduction sector to implement Information and Communication Technology (ICT) tools to advance learning and teaching processes. As such, Government of Malaysia has been working on few strategies to introduce electronic gadget applications in Malaysian schools to improve quality of education inclusively. In this study, we have conducted a survey to study the needs and acceptability of electronic gadgets such as mobile phones in schools, then analyzed outcome of survey accordingly. The result of the survey shows level of acceptance on the use of electronic gadget in schools and ethical consideration has been considered to decide best decision to overcome its negative impacts. Based on ethical consideration, the use of electronic gadgets in schools should be permitted as it brings more valuable benefits towards nation and society well-being. Malaysian to maintain high level of ethics and morality act to be able to use and handle knowledge well. Keywords: IT gadgets; Mobile phone; Information and Communication Technology; Malaysia Schools 1. Introduction 1.1. ICT as enable tools towards K-economy...

Words: 4314 - Pages: 18

Free Essay

Submit a 4 Page Paper Discussing Three Types of Cybercrime Risks and How Organizations and Individuals Can Protect Themselves from These Schemes. Please Identify at Least One Real-Life Exmaple and Provide Details on the Incident.

...Introduction David S. Wall, author of Cybercrime: The Transformation of Crime in the Information Age, once said, “In a nutshell, we are shocked by cybercrime, but also expect to be shocked by it because we expect it to be there, but – confusingly – we appear to be shocked if we are not shocked (if we don’t find it)!” In today’s society, cybercrimes are considered a greater threat than ever. Computer crime can be defined as a crime that is committed where the computer or electronic data device is integral to the criminal act (Kranacher, Riley, and Wells 114). Although many do not believe that they can cause any vital damage, cybercrimes such as wiretapping, piggybacking, and computer viruses can have significant repercussions on various organizations. By identifying the type of cybercrime, discussing how organizations can protect themselves from it, and multiple real-life examples, an insightful analysis of the implications of cybercrime can be better understood. Wiretapping Wiretapping has become a very common way of committing computer fraud. This occurs when perpetrators read information being transmitted between an organization’s computers. In order to decrease this, companies can implement various encryption techniques to help ensure that confidential information does not reach the hands of a person who can use it with malicious intent (Kranacher, Riley, and Wells 120-21). This information that is obtained could be pertaining to an organization’s consumers, employees...

Words: 1097 - Pages: 5

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Efefe

...Manila Fifteenth Congress Second Regular Session Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven. [ Republic Act No. 10175 ] AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled: CHAPTER I PRELIMINARY PROVISIONS SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers...

Words: 5454 - Pages: 22

Free Essay

E-Security Review

...last thirty years there have been dramatic advances in information technology - the development of the microprocessor, the rise of the personal computer, the emergence of the Internet - which have revolutionised the way information is created, stored, shared, and used. Today, powerful, affordable and diverse devices, together with expanding broadband networks, create a powerful opportunity for connectivity for individuals and communities. Over the past two decades, rapid advances in software, IT services, and communications have enabled many traditionally separate and disparate infrastructures and business operations to become more connected. Through this connectivity virtually every aspect of society has experienced a transformation. Businesses and governments have been able to manage and streamline their operations. Individuals have been offered ready access to multiple sources of information thereby expanding knowledge and choice. Across every field of endeavour – commercial, social, scientific and philanthropic – the power of information has been increased and the transaction costs of engagement have been lowered. Our broad reliance on software, services, and communications, along with the benefits they offer, has naturally attracted the malevolent interest of terrorists, criminals, and other sophisticated attackers. To address this threat requires unprecedented cooperation and constant effective action by technology vendors, governments, businesses, and consumers. Drawing...

Words: 13936 - Pages: 56

Premium Essay

Cyber Crime Law

...[ Republic Act No. 10175 ] AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled: CHAPTER I PRELIMINARY PROVISIONS SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international...

Words: 4460 - Pages: 18

Premium Essay

Information Technology

...Information Technology Name American Intercontinental University Information Technology (IT) and its effects Information Technology can be described as the use of computers and telecommunication devices in organizations for storage, retrieval and sending of data and information. In the past two decades, advancements in technology have been through the internet and the use of the World Wide Web, among other IT innovation such as advancement in computers. The IT innovations are important as they have assisted organizations in processing and storing as well as exchanging appropriate information for decision making and competitive advantages. In the field of business, potential customers use the internet and World Wide Web to look for company information, and product news since companies started to use internet to advertise their products. Through the Internet, business information is present across the globe and the Web has two main advantages. The first is that it offers convenience where people can communicate and complete transaction from different locations. The second advantage is that it provides information. There is a lot of information concerning companies, their products, as well as competitors and the information is also of high quality, and readily available. The main innovation of IT advancements is that the world has become a global village with easy access and exchange of information. But on the other hand, some individuals and organizations have used...

Words: 885 - Pages: 4

Premium Essay

Csec Ia1

...Introduction Cybercrime targets both government and private industries with various methods and motives behind them. Those various attack methods can make a significant damage ranging from an individual identity theft based scale to national scale concerning its security as a sovereign nation. In other words, cybercrime equally brings serious concerns for both private industries and government. Also, private industries have an interchangeable relationship with government agencies as client to provide services. Most of utilities-related critical infrastructure systems in every city are mostly managed by private organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry...

Words: 3978 - Pages: 16

Premium Essay

Common Information Security Threats for Colleges

...Common Information Security Threats for Colleges CMGT/400 August 11, 2014 Common Information Security Threats Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally. Identification of Threats There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include Social media vulnerabilities, Unauthorized access to employee or student information, and Email attacks (phishing) For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students. Information Vulnerabilities Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures...

Words: 1428 - Pages: 6

Premium Essay

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

...15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion attempts 9,986 7753 8,090 6,000 3,566 4,000 2,123 2,000 81 196 1997 1998 527 347 1999 2000 860 625 2001 2002 1,372 912 915 754 2003 2004 2005 1,038 2006 2007 2008 2009 2010 Number of cyber security incidents referred to CyberSecurity Malaysia (excluding spams) Copyright © 2013 CyberSecurity Malaysia 2011 2012 2013 HIGH LEVEL USAGE = HIGH RISK 1.6 RM The cybercrime situation in Malaysia Billion lost to scams in...

Words: 1957 - Pages: 8

Free Essay

Russian Patriotic Hacking

...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...

Words: 8586 - Pages: 35

Premium Essay

Cybercrime Law

...crimes essay THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008 Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime Cyber law and cyber crime Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: * In a narrow sense, the term cyber crime has been defined as any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them. * In the broader sense, cyber crime has been defined as any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network. The extent of cyber crime is so vast and complicated that an act which may be crime in one nation may not be so in another. Some of the basic examples of cyber crime are unauthorized access, damage to computer data and program, computer sabotage, unauthorized interception of communications, computer espionage...

Words: 5688 - Pages: 23

Free Essay

Paul

...IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime. This study aims to provide an overview of the said topic and depict real life incidents with major companies and also discuss ways...

Words: 7997 - Pages: 32

Free Essay

Accounting Tech

...How Technology is Changing Accounting Accounting 525 Melissa Holland-Mitchell December 20, 2014 Professor Jones K. Kasonso Computer technology is always changing, so fast that many companies will simply update their current computer system continuously. Technology and the computer are a part of our lives; it helps managers make decisions to improve business operations, allows for faster transfer of information, and is simply a basic necessity to do business in many professions including accounting. There are technological trends that will have a tremendous impact on the accounting profession: cyber security, cloud, mobile devices, and big data. The Cloud and mobile technology available today is transforming the job of the tax and accounting professionals (Proformative.com, 2012). Where technology used to be behind the scenes at the office, its use is increasingly extended beyond internal use and out to the client. Mobile accountants work remotely between 5.8 to 8.6 hours per week. By 2015 the number of mobile workers is in North America and Latin America is to exceed 212 million (Proformative.com, 2012). More accountants are using smart phones for work; mobile access allows firms to connect with clients outside of regular business hours, and other locations. Smartphone’s are quickly being adopted by the accounting professional, many still think of the Smartphone as just a mobile phone with additional features such as texting and music player. However with the...

Words: 2332 - Pages: 10

Premium Essay

Ethics

...Ethics in Cyberspace: Have We Seen This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction       Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical controversies...

Words: 3009 - Pages: 13