Cybercrime: Concerns, challenges and opportunities
Document Type
Book Chapter
ISBN
978-3-319-44257-0
Publication (Name of Journal)
Information Fusion for Cyber-Security Analytics
Department
Institute for Educational Development, East Africa
DOI
https://doi.org/10.1007/978-3-319-44257-0_6
Publisher
Springer International Publishing
Abstract
It is widely accepted that technology is an agent of change in the society. If used properly, it can increase productivity and improve our quality of life. However, the current rate of change in technology leaves room for it to be exploited and be used for things it was not meant to do. This includes criminal activities which are carried using technology on the cyberspace that can be classified as cybercrime. Cybercrime or computer crime can be defined as a criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity. Cybercrime can also be defined as the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud and, in some cases, corporate espionage.
In this chapter, we explore the challenges of combating cybercrime given its dynamic, pervasive and international nature. We examine in detail the technical, social and legal factors that are continually shaping the landscape of cybercrime. Further, the chapter consolidates research and practical work in the area of cybercrime, emerging perspectives, paradigms and trends. A deliberate effort is made in making sure that the role of underground economy is clearly spelled out and its contribution to cybercrime is analysed. The impact of new laws which are being quickly enacted without much thought, discussion on the regulatory framework for combating cybercrime and ethical dimension of cybercrime given its global nature are examined. This chapter is expected to stimulate constructive discussions on novel ways of mitigating and promoting research in cybercrime.
Recommended Citation
Oreku, G. S.,
Mtenzi, F.
(2017). Cybercrime: Concerns, challenges and opportunities. Information Fusion for Cyber-Security Analytics, 691, 129-153.
Available at:
https://ecommons.aku.edu/book_chapters/467
Comments
This work was published before the author joined Aga Khan University.