Wednesday, October 30, 2019

Cross-Border Cyber Terrorism and Internet Crimes Term Paper

Cross-Border Cyber Terrorism and Internet Crimes - Term Paper Example The Internet today is an integral part of every home, society, and business. And for it to remain the key tool for advancement that it is there is a compelling need for awareness, regulation, and legislation. As governments across the world move forward and (hopefully) unite on this issue, these are some of the views that will bear consideration: The ‘Authorities’ View: A priority for regulators is to find ways of tracking down criminals across borders and ensuring they are punished; in a scenario where use of proxy servers assures anonymity this is easier said than done. Therefore, the imperative need for an international strategy and response to cyber attacks that is akin to traditional laws. There are countries today where customers can purchase unregistered data packs with mobile Internet capability, giving them the ability to commit an online crime such as identity theft against people in other nations without fear of being traced. This makes it in the interest of r icher nations to collaborate with the ‘have not’s’ and develop the capacity to address this abuse.  Ã‚   The general view is that these cells need to become more effective to tackle the increasing complexity and ‘creativity’ of the cybercriminal. Of late, legislative bodies have embraced Cyber Laws - a term that encapsulates the legal issues related to using various aspects of networked devices and technologies. These legal enactments - "paper laws" for a "paperless environment"- cover a broad gamut of different aspects relating to computer software, access, and control of digital information, privacy, security, internet access, and usage and electronic commerce. The ‘Popular’ View: Arguably, the most affected by the building public apprehension with respect to cybercrimes are the social media marketers. As users of sites such as Facebook and Twitter start walking on eggshells in the fear of being spammed, hacked or robbed of identity, legitimate businesses are finding it increasingly difficult to reach their target audiences.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.