Cybercrime Is a Concept That Essay

Excerpt from Essay :

Most of these systems should be programmed to prompt for username and password in order grant access.

This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard-

to- guess alpha numeric characters

Organizational techniques of prevention

In order to combat cyber crime, various governments and organizations should come up with special departments and units that target cybercrime. An example would be the setting up of Cybercrime Prevention and Fighting Center by the Taiwanese government so as to tackle cyber crime (Chung et al., 2004). Special cyber crime prevention units should be set up by various governments in order to deal with the menace. Organizations must take various necessary to protect their interests. The initial step is to understand the seriousness of the threats caused by cyber crimes to the organizational data, assets and processes. The second step is to shift their protection form a security-based approach to one that leans more towards a risk-based approach. They should therefore spend their budgets as well as apply their resources in the mitigation of the risks that face their business enterprises. The third step involves the knocking down of all the barriers that are associated with the non-effective approaches used in dealing with threats posed by cyber crime. The sharing as well as the combining of data throughout the entire organization structure like data on fraud, information security, human resources and loss prevention is crucial. This should be carried out while amalgamating the moves with various external sources in order to strengthen the capacity to perform certain crucial value-added organizational analysis. This juncture should be punctuated with the prioritization of the risks and then their incorporation into the business decision making mechanisms. This should be done while managing them appropriately with the affectively and efficiently allocated resources. Organizations must focus their efforts to data/information gathering as well as analysis with attention placed on the methods of identifying the cybercrimes and the real-time monitoring of the essential assets.

Collaborative efforts

In order to effectively combat cyber crime, it is essential that various principal groups be involved in the process. These include network infrastructure providers. This is because network Internet providers can effectively influence the online behavior via 'contractual governance'. The Internet Service Providers (ISPs) can aid in the prevention of cybercrime through the use of special terms on their contracts with their clients.The conditions of the market are what dictates the terms coupled with the law requirements.The Internet Service Providers (ISP) are the ones who have the responsibility of deterring the incidents of cybercrimes commited through their service via a contractual agreement with conditions that are laid down in the contracts by the telecommunication providers who host the various internet services. The ISP can also use their strategic role in the provision of communication services to deter cybercrime by employing a variety of software solution. These are through the use of effective security systems thatuse efficient spam filters. The various security organizations should also engage in governance (contractual) upon its member organization as well as non-members so as to protect their interest. through the use of criminal prosecution in instances of extreme transgression. The corporate security firms should deploy a wide range of software.

The non-governmental and other non-police organizations are the other group that is influential in the prevention of cyber crime. Internet Watch Foundation (IWF) is a perfect example of an organization that provides governance under the influence of the mandate that is given by the United Kingdom ISPs., the United Kingdom Government as well as the Law. This group works with the police in the police service through the processing and receiving of reports of various content-related offences such as child pornography as well as racist materials via a special online facility. If a certain act is deemed actionable as a result of a judgment by a an operative who is highly trained. The Internet Watch Foundation adopts the necessary action of passing the message to the offenders of the ISP or by issuing an alert to the appropriate hotline numbers who fall in the appropriate jurisdiction of the offender. The details of the offending site may also be reported to the police. The contributions of the IWF towards cyber crime are geared towards prevention as well as the creation of awareness.

The non-police (governmental) groups provide governance via use of laws, rules as well as threats of prosecution. They are never referred to as police per se. They include agencies like Postal Service, Customs as well as Trading Standard organizations. The public police organizations even though located in different states having different definitions of legal jurisdictions should nevertheless work together via the networked transnational police organizations like the Interpol and Europol to combat cybercrime. They can use a wide range of softwares in their protection, collection of evidence and the investigation of incidents as well as the proactive handling of cybercrime concerns.

Internet governance can provide an effective way of combating cyber crime. The detriment of this are however associated with lack of freedom and colonization of the cyber space by authorities. The concept of internet governance is known to possess a huge sense of order that emanates from the existence of a sophisticated arrangement of highly networked security nodes that are to be part of a continual process geared towards the shaping of virtual behavior as pointed out by Walker & Akdeniz (1998, p. 8). This is to transcend the usual state and non-state binary as well as state sovereignty. The networked relationship has to be between contributors who are heterogeneous to the governance process and they should function as a single entity but could have no unifying factor among them (Haggerty & Ericson, 2000).

It is worth pointing out that the relationship that exists between technology and police is a complex one. It is true that police were instituted in order take care of cases of social disorder and unrests resulting from the technologies that accompanies this age of industrial revolution. The major problem that the police face as evident from the complaints by law enforcement agencies is the lack of adequate facilities to enable them keeps up with the works of criminals (Sheptycki, 2000). It is important that modern information technology equipment be acquired in order to assist the police in the tackling of cybercrimes.


The fight against cybercrimes is a very protracted one that requires the contribution of everyone involved in the cyber space activities. The complexity of the crime and the lack of a clear framework to deal with its effects make it necessary for the world to come up with certain minimum security standards to be adopted by individuals and corporate bodies in the fight against cybercrimes. Law enforcement agencies must also be brought board using a unified command post as well as the use of a unified cyber legislation to be used in the handling of transnational cyber disputes. The problem of cybercrime can never be fully eliminated but it can surely be checked so that it does not undermine the security of information that is being passed on the internet or proprietary data held on computers. There is a need for individual, corporations and internet service providers to collaborate with the government in collectively fighting cybercrime.


Chung, W., Chen, H., Chang, W., & Chou, S. (2006). Fighting cybercrime: A

review and the Taiwan experience, Decision Support Systems, 41 (3),


Cobbs, RW (2003). Cyber Security: The Status of Information Security and the Effects of the Federal Information Security Management Act (FISMA) at NASA

Davis, R and Hutchison, S. 1997. Computer Crime in Canada. Toronto: Thomson Canada


Gibson, S. (2006). Stepping up the Effort to Beat Cyber-Crime.

Haggerty, K.D. And Ericson, R.V. (2000), the surveillant assemblage. The British Journal of Sociology, 51: 605 -- 622.

Home Office (2010). Cyber Crime Strategy Retrieved January 21, 2011 from

Kowalski, M. (2002). Cybercrime: Issues, data sources, and feasibility of collecting police-reported statistics. Minister of Industry, Catalogue Number 85-558-XIE.

Ottawa, Ontario, Canada: Statistics Canada, Canadian Centre for Justice

Messmer, E (2010). Cybercrime costs a business U.S.$3.8 million a year, study finds January 21,

2011 from

New Scientist, Reed Business Information UK, Ltd. (2005). Gaping Holes in Internet Security.

New Scientist, 188 (2531/2532), 1.

Poneman Institute (2010). First Annual Cost of Cyber Crime Study Benchmark Study of U.S.


Sheptycki, James. 2000. "Policing the Virtual Launderette: Money Laundering and Global

Governance." Pp. 134-176 in Issues in Transnational Policing, edited by J.W.E. Sheptycki.

London: Routledge.

Vogel, J (2007)Towards a Global Convention against Cybercrime. First World conference of Penal law. Penal Law in the xxist century. Quadalajara (Mexico), 18-23 November 2007

Walker, C., and Akdeniz, Y. (1998), "The governance of the Internet in Europe with special reference to illegal and harmful content" Criminal Law Review (Special edition, London:

Sweet & Maxwell), pp.5-18.

Sources Used in Document:


Chung, W., Chen, H., Chang, W., & Chou, S. (2006). Fighting cybercrime: A

review and the Taiwan experience, Decision Support Systems, 41 (3),


Cobbs, RW (2003). Cyber Security: The Status of Information Security and the Effects of the Federal Information Security Management Act (FISMA) at NASA

Cite This Essay:

"Cybercrime Is A Concept That" (2011, January 22) Retrieved January 16, 2019, from

"Cybercrime Is A Concept That" 22 January 2011. Web.16 January. 2019. <>

"Cybercrime Is A Concept That", 22 January 2011, Accessed.16 January. 2019,