Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Knowledge of e-crime from the perspective of crime science is insufficient in devolution of the problem, which cuts across various sections of social interaction through computers. There is a limitation in the forensic and social / legal exploration of information technology aspects and that is the possible cause of the limitations of the jurisdictions of the computer crime legislation, creating the insufficiency in the fulfillment of its purpose (Tonry 2009 p. 20-350).
The legislation approaches the infringement of the social precepts of technology without any consideration of social remedies. The use of police in regulation of operations is limiting because they may not have the capacity for gauging the extent of computer damage. It is logical considering the sensitivity of pro-social individuals, and their possibility of taking up their responsibilities. Social norms revolve around consideration of others and create a sense of mindfulness and consideration of activities (Humphreys 2007 p. 257).
Requirements for the success of the Computer Misuse legislation
That is an aspect, which the current Computer Misuse legislation fails to provide. The government must understand that the achievement of fairness in computer usage must accompany freedom of its access. Any approach designed for curbing cyber crime must put into considerations measurers, which can maintain the neutrality of information access without any compromise on users. Therefore, there is the need for a better understanding of social causal factors of computer crimes. This should put into account all forms of crimes for the realization of an enjoyment of computer networks without having to code its features (Lichtblau 2008 p.66).
As technical approaches take center stage in curbing computer crimes, there ought to be consideration to social resilience during policymaking (Reiner 2010 p.15). Policymakers must study the generational trends of computer crimes to understand the minds of criminals, and provide amicable solutions without infringing of neutrality and freedom of computer users. According to Wall (2007 p.20), there are commonalities in cyber crimes, which can help in predicting the possible future crimes and working way ahead of criminals in curbing the offence instead of depending on the restrictive coding efforts of the computer misuse legislation.
The common trends noted in the past are three. The first one is the e-jemmies generation, who committed computer crimes within the discretion of computer systems. The second generational trend was the network crime, which focused their activities in the exploitation of connections by remotely inflicting harm. The third generation is the distribution criminals. These ones focus on the creation of distribution channels and automation of harm through remote operations. By understanding such trends, there comes a fourth predictable possibility of computer crime known as ambient intelligence of technologies. This is because of the increasing internet usage, creating the possibility of exploitation of new technologies by people (Assange & Dreyufus 2011 p. 23-350).
Understanding such trends can reveal the possibilities of upcoming criminal trends in a broad way, which can help in curbing any future developing trends way ahead of any harm. This is because it is easier dealing with the social aspect of criminals given commonalities existent in their characteristics across generations (Gogolin & Jones 2010 p. 131-139). Further, there is the need for further research towards the instigating factors, which influence cyber offenders. It is necessary to understand the social precepts of offenders to be able to come up with strategies, which resolve the impending issue instead of creating more harm (Foltz & Renwick 2011 p. 119-125).
It is worthy understanding all possible reasons, which lead to computer crimes for the legislation to pass as a crime limiter. Otherwise, the cited limitations like the restrictions of technical coding, elaborative interpretations and language of the stature hinders the set objectives for defining a new era of computer safety. The government must understand the need for allocation of funds for further research on the matter. Also important is the need for collaboration with foreign governments to aid the prevention of the crime in a wholesome manner. It is only through this that the current computer legislation will manage to fit within its purpose instead of imposition of suctions as experienced currently (Assange & Dreyufus 2011 p. 56).
'a Comparative Study of Cyberattacks' 2012, Communications of the ACM, 55, 3, pp. 66-73, Academic Search Complete, EBSCOhost, viewed 20 August 2012.
Assange, J., & Dreyufus, S. (2011). Underground tales of hacking, madness and obsession on the electronic frontier. Edinburgh, Canongate. 56. Print.
Assange, J., & Dreyufus, S. (2011). Underground. North Sydney, N.S.W., Random House Australia. 23-150. Print.
Foltz, C, & Renwick, J 2011, 'Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination', Journal of Education for Business, 86, 2, pp. 119-125, Academic Search Complete, EBSCOhost, viewed 20 August 2012.
Gogolin, G, & Jones, J 2010, 'Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business', Journal of Digital Forensic Practice, 3, 2-4, pp. 131-139, Criminal Justice Abstracts with Full Text, EBSCOhost, viewed 20 August 2012.
Humphreys, E. (2007). Implementing the ISO/IEC 27001 information security management system standard. 257. Print.
Lawande, P 2012, 'A Study of Effectiveness of Cyber Laws in Dealing With Cyber Crimes in Developing Country Like India', Golden Research Thoughts, 2, 1, pp. 1-9, Academic Search Complete, EBSCOhost, viewed 20 August 2012.
Lichtblau, E. (2008). Bush's law: the remaking of American justice. New York, Pantheon Books.
Pisara?, M 2011, 'Status and Tendencies in Combating Computer Crime at European Level. (English)', Proceedings of Novi Sad Faculty of Law, 45, 1, pp. 487-505, Academic Search Complete, EBSCOhost, viewed 20 August 2012.
Rao, I 2011, 'Cyber Crimes: Issues & Concerns', Indian Streams Research Journal, 1, pp. 111-115, Academic Search Complete, EBSCOhost, viewed 20 August 2012.
Reiner, R. (2010). The politics of the police. Oxford, Oxford University Press. 56. Print.
Tonry, M. (2009). Crime and justice; v. 38: a review of research; ed. By michael tonry.…[continue]
"Computer Misuse Legislation Unfit For" (2012, August 20) Retrieved December 4, 2016, from http://www.paperdue.com/essay/computer-misuse-legislation-unfit-for-75226
"Computer Misuse Legislation Unfit For" 20 August 2012. Web.4 December. 2016. <http://www.paperdue.com/essay/computer-misuse-legislation-unfit-for-75226>
"Computer Misuse Legislation Unfit For", 20 August 2012, Accessed.4 December. 2016, http://www.paperdue.com/essay/computer-misuse-legislation-unfit-for-75226
Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's
Corporate Social Responsibility in Indian Pharmaceutical Industry An Exploratory Study Outlook of CSR in India History of CSR in India Philanthropy in Indian Society Modern Form of CSR in Indian Society Profile of Indian Pharmaceutical Industry Rationale for Selection CSR Activities by Indian Pharmaceutical Companies Major Influences Over CSR Activities Scope of CSR Activities Comparison of Indian & Western Pharmaceutical Companies This research paper is concerned with the recent practices of Indian pharmaceutical companies in the field of corporate social responsibility. For