Technology Influences Assignment Paper
Technology Influences Assignment Paper
How technologies have contributed to the increase in crime rates
Technologies have immensely contributed to the problem of increased levels of criminal activity. Advances in computers, mobile apps, the internet and communication networks have been used by the criminals to commit crimes as digital child pornography, cyber-attack, espionage, online fraud, identity theft, hacking and intellectual property theft. As Karake et al (2017) indicate, prior to the emergence of digital data, the world was predisposed to physical threats only. Advances in technology have resulted in more utilization of cyberspace, which has subsequently offered cybercriminals and users abundant opportunity to cause harm, either unintentionally or intentionally. Technology Influences Assignment Paper
Rapid technological advancements have generated both novel forms of crime as well as novel methods of investigations. Cybercrime offending may be legally and technically complex. Rapid advances in the operation of information communication technologies along with innate differences amid schemes of law internationally are challenges for forensic interrogators, investigating authorities, criminal justice administrators and prosecuting agencies. According to Karake et al (2017), several cybercrime criminals have escaped prosecution because substantive criminal laws are weak and fail to address technological schemes of offending.
Establishing the place where a crime occurred and overcoming the negative and positive conflict of legislation make it difficult for judicial officers, prosecutors, and police when drafting subpoenas and issuing warrants. Brown (2015) alleges that even in the presence of strong procedural and substantive criminal laws and concurrence with global instruments like the Budapest Convention, investigations might yield little if police are not competent and well equipped. A majority of cybercrimes are well-conceived and sophisticated, needing police to use deductive reasoning and technological expertise to unravel intricate modus operandi and validate aspects of a crime.
ORDER A FREE -PAPER HERE
How I will propose technology be implemented into the solution
Cybercrime can be curbed through development of strategies and doctrines that engage all entities who have an understanding of information and communication to implement technical measures that can assist then build strong security for their data and systems and improve personal security along with the resilience of information communication technologies. If a nation can offer support to the involved entities, cybercrime can be reduced or eradicated.
The key to developing strategies needed to curb cybercrime is the availability of resources and capability to develop hardware and software, to blend the constituents of strength, and the creation of functional devices. As Cruz-Cuhna (2014) recommends, several technological solutions can be utilized to lessen cyber risks, including whitelisting anti-virus services, intrusion prevention systems and firewall at bot the gate-way and host level. Trojans along with other cyber risks may be utilized through the application of layering technologies, like transaction verification processes and two-factor authentication. Intrusion Prevention System signatures and indicators might also be useful in the detection and blockage of malware trojans. Technology Influences Assignment Paper
Crime activities with computer networks or computers may be anticipated through learning more on the origin and effect of cybercrime. Entities can hire information technology security consultants and individuals who are knowledgeable in the eradication of cybercrime. Header information in email threads may assist investigators to identify the source of communication and pinpoint where the suspect can be located also reveal personal details of the criminals and co-conspirators (Brown, 2015). During cybercrime investigations, investigation officers are always able to detect technology utilized in the commission of the offense but are not able to know the criminal who used the device as a result of full drive encryption or due to the usage of the device by more than one suspect. In such cases, surveillance through keystroke monitor together with hidden cameras might expose passphrases and recognize the offender.
References
Brown, C. (2015). Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. International Journal of Cyber Criminology, 9(1): 55-119.
Cruz-Cuhna, M. (2014). Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance. Pennsylvania: IGI Global.
Karake, Z., Shallhoub, R., & Ayas, H. (2017). Enforcing Cybersecurity in Developing and Emerging Economies: Institutions, Laws and Policies. Northampton, MA: Edward Elgar Publishing. Technology Influences Assignment Paper
Strayer_Writing_Standards