Crime In The Cyber Realm Essay

1032 words - 5 pages

The following report takes into consideration two recent cybercrimes for the purpose of analyzing what cybercrime is and who is responsible for it. The opinions of Joseph Migga Kizza and Lawrence Lessig will be evaluated as they relate to the two cybercrimes. As part of the analysis, the underlying assumptions and the practical implications of the two authors will be considered.
Two Recent Cybercrimes
With the popularity of the social media site Twitter, single letter handles are rare. Naoki Hiroshima was the owner of one of those rare handles, @N. He had been offered as much as fifty thousand dollars for the account, which he always declined. On January 20th of 2014, a hacker was able to ...view middle of the document...

8). The technical aspect is the technology that is used to commit or prevent the crime. Under Kizza’s theory of cybercrime, Anonymous and the GoDaddy/PayPal hacker are both to blame for their crimes because they have a lack of moral/ethical foundation which would prevent them from committing their respective crimes. Lawrence Lessig (2006) takes a more technology-based approach to cybercrime, which he terms “Code” (p.5-6). Code is the hardware and software that composes cyberspace, therefore cyberspace administrators and developers are responsible for what is permitted and restricted over the Internet. With the Code theory, administrators and developers share some responsibility for the crimes in both mentioned cases because their lack of diligence led to the vulnerability which facilitated each crime.
For both of the mentioned crimes, the Code theory of cybercrime best fits the situation. In the case of Anonymous breaching ManTech’s servers, political targets will always have hacking attempts made against them – this will only increase as the Internet continues to grow. As such, administrators and security personnel must stay one step ahead of those that seeks to cause the organization harm. To rely on moral/ethical behavior for network security would have disastrous consequences. Likewise in the case of the GoDaddy/PayPal hacker, moral/ethical behavior can be attributed to the success of the crime. It is the innate desire of most human beings to be helpful which makes social engineering attacks as dangerous as they are. On the other hand, having strict policies in place that state specific conditions for the release of information, would likely have prevented PayPal and GoDaddy representatives from releasing sensitive customer information. Security policies are in alignment with the Code theory of cybercrime.
One problem with basing cybercrime and cybersecurity on a foundation of morals and ethics is that morals and ethics are widely subjective. The theory is based on the idea of an objective morality. General consensus on moral issues might be achievable on a local scale, but the Internet is global. Ideas about morals and...

Find Another Essay On Crime in the Cyber Realm

cyber crime and its use in modern times - university - assigment

1300 words - 6 pages them and it mill make easier the judiciary to convict the offender. Another difference between traditional crime and cyber-crime is the violence or force use to commit them. The majority of traditional crimes such as rape, burglary, murder… include the use of violence or force that will result is physical abuse or trauma of the victim. in cybercrime no force is required because the criminal only uses the victim’s identity to steal from them

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages accessing data protected by encryption and provide for an offence of failing to reasonably cooperate with such an investigation. Additionally, the act could lawfully authorise the commission of offences by the police in investigating crimes; a tool that some have argued as necessary for addressing online child pornography. As a response to the more than 400 cyber incidents against government systems in 2011 and 2012, Julia Gillard has announced

cyber security in the millitary

1155 words - 5 pages We as Americans tend to think that because we have the best military, the most money, and the strongest defense organizations (nsa, ect) that we somehow have a natural advantage in cyber space.the world of cyber relations is dominated by offence. We have far more divided territory to defend than any other country. And not enough trained personnel to defend it. While we have yet to encounter a full scale Cyber war,we have been in some sense at

Role Conflict in the Realm of Management Theory

909 words - 4 pages Role Conflict in the Realm of Management Theory As a manager, the task of personnel performance and organizational cohesion is of the upmost importance. In order to more effectively stimulate an environment that is conducive to optimizing personnel performance, theories have been developed to help managers more effectively mitigate any conflicts that have the potential to sideline production and employees. As a manager, one of the most

The Realm of Sisterhood in Mary Leapor’s Poetry

3097 words - 12 pages The Realm of Sisterhood in Mary Leapor’s Poetry For a woman writer to be read by her peers in eighteenth century England was somewhat unusual. For this woman to procure some kind of living from her writing was even more remarkable. But for such a woman to claim both these accomplishments, with writings attacking the very state of women no less, was extraordinary. Yet Mary Leapor was this woman. Not only did she herself defy

It's War in the Cyber-World

1887 words - 8 pages The new internet legislation acts, SOPA and PIPA, are creating serious disputes between internet corporations and national authorities. Those acts seem to be hindering global freedom of expression, which goes against the bases of the concept of the cyber-world. The internet has proved to be one of the most revolutionary concept and tool of the century taking communication and sharing of information to a whole new level. From education to arts

This paper describes the crime of cyber crime and how to prevent it from happening to you

1661 words - 7 pages Cyber Identity TheftIdentity theft is a crime that causes damages to a person that can last a lifetime. One of the ways peopleT's identity is being stolen is through the use of the internet. Cyber Identity Theft is becoming very popular and is a problem that every person that uses the internet needs to be well aware of. For most people once it has happened it is too late to for them to recover from the losses. People are damaged financially, as

The Drop in Crime

642 words - 3 pages The Drop in Crime The national crime rate has been dropping for the past several years. Over a 38% drop has been reported since 1993. The drop in the crime rate of America is mainly because of three top reasons. These reasons include the involvement of the community, the offenders of small crimes are being interrogated to come up with leads of larger crimes, and the new computer technology available today. Many citizens have

A comparison of Behar’s The Vulnerable Observer and Tsing’s In the Realm of the Diamond Queen

1350 words - 5 pages When presented with ethnographic works, the first thing one would normally do would be to compare. The Vulnerable Observer by Ruth Behar and In the Realm of the Diamond Queen by Anna Lowenhaupt Tsing, both demonstrate key factors that prove to be prevalent throughout the anthropological world today. Through the examination of each piece, it is clear that they both share similar restrictions, trials and tribulations. As both books begin to

The Necessary Inclusion of Cyber-bullying Legislation in Canada

2421 words - 10 pages In Canada, the emergence of bullying has risen to new heights as advancements in technology have allowed almost anybody to conduct harmful acts against another person while maintaining vast amounts of anonymity (Shariff, Cyber-Bullying: Issues and solutions for the school, the classroom and the home, 2008; Li, Cyberbullying in Schools: A Research of Gender Differences, 2006; Shariff & Jaishankar, Cyber Bullying: A Transnational Perspective, 2009

Similar Essays

Cyber Crime On The Rise Essay

2393 words - 10 pages information over to the criminal never knowing their intent. These crimes are known as cybercrime or computer crime and they are becoming prevalent in the 21st century by taking crime new levels. The definition of cybercrime according to the Federal Bureau of Investigation (FBI) is a crime that is committed from a computer or from the internet in which criminals use for financial gain, reputation, or cause fear (2010). With cyber crime the computer can

Hope In The Totalitarian Realm Essay

1592 words - 6 pages Hope in the Totalitarian Realm The method of the Republic of Gilead to mold subdued and subservient women is first to disenfranchise, then to reeducate. Unlike the women discussed in Swastika Night, women in the United States were not readily compliant in the removal of their economic and reproductive rights. Even Serena Joy, the wife of the commander that Offred has been assigned to, who once toured widely touting the sanctity of the home, now

Hope In The Totalitarian Realm Essay

2001 words - 9 pages Hope in the Totalitarian Realm Religion and the manipulation of history are the most important steps in creating a totalitarian state. In the novels discussed the reader comes to understand true oppression results when hope and power are removed in their totality. Katherine Burdekin’s novel, Swastika Night, portrays women who are degraded and removed, stripped of identity, femininity, and important self-efficacy as societal role-players

Bad Effects Of The Internet: Cyber Crime

903 words - 4 pages Nowadays with the growth of internet usage among people, there are always bad effect of internet. One of the problems that always occur in internet is cybercrime or scam. According to cyber-crime also can be define as computer crime which the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy