Cybercrime describe a heinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitating the intervention of the government through enactment of policies that govern the usage of computer ...view middle of the document...
Among the many forms of crime that takes place online, the internet serves as the tool, the source, and the target of the crime (Sukhai, 2004, p 129). The crime revolves around the cyber space, and they affect persons, property and institutions.
Cases of Cyber Crime
Russia and China have reported significant cases of cyber crime attributed to the advances in the use of computer in transactions and communications. This suggests that cyber crimes among other form of crimes are prevalent in technologically driven economies. The offences in such nations include illegal interception of communication, data distortion, and system interference. Brazil, United States, and India also feature among the nations affected by an increase in cases of cyber crime due to computer usage in data processing. In a bid to overcome the crime, the respective countries have put measures to monitor the use of their networks in additions to encouraging people to use antivirus software’s in assessing networks (Yar, 2013, p 102). The aim is to bar criminals from furthering their agenda of interfering with the effective use of technology in promoting the wellbeing of the society.
Preventing Cyber Crime
Collective effort is necessary in overcoming cyber crime since the act causes negative impacts to both users of computers, and the crime is also difficult to detect in some instances. For years, system administrators have grappled with the challenges but a solution has not yet been found due to the complex nature of the crime. This has necessitated the enactment of legislation that bars criminals from promoting their...