Crime Theories

Pages:2
Words:529
Cooee… deadline? or busy in your job?
Let our writers help you to meet your deadlines
We can deal with any subject and any deadline

Some crimes are traditional and can easily be included in conventional criminal activities, but some need exclusion. The criminal use of cyber methods is due to the increased use of globalization and the internet of things. Traditional crimes and cyber crimes are two different aspects, but they are intermingled due to technical expertise and dynamic globalization. For instance, felonies like murder, theft, or drug abuse are crucial kinds of traditional crimes. Still, human trafficking at the airport, false data information, and criminal approaches by immigration agents are linked to cybercrime. The use of the internet and technology facilitates cyber crimes. Traditional crimes are related to cyber crimes in terms of drug abuse, theft, data and security breach, and professional tactics (offense, 2019). Most often, traditional crimes are an aspiration that leads to cybercrimes.  For instance, it constitutes key motivations as boredom, political support, and vandalism. In some cases, illegal means are used to obtain data, and later, it is used for malicious purposes, terrorism, and sensationalism. These traditional crimes are easily considered into cybercrimes because they harm in similar means or adverse in more cases, like that of cybercrimes (Miklaucic, 2019). The use of technology has made it easier to undergo criminal activities because it has provided massive access to personal data, credentials, and security systems. Sexual and domestic harassment are also linked with cybercrimes in the form of online harassment with the use of social media.

There are several advantages of separate criminal statutes that are associated with new cyberspaces. Under the cybercrime law, the acceptable behavior of an individual is based on the type of profession and method to commit a crime. For instance, in information and communication technology, the use of the internet for official purposes is an advantage that is misused in the case of cybercrime (Dolliver, 2019). The scope of crime is linked explicitly to the system, data, services, and infrastructure employed to harm people. In cyberspace, various structural crimes take the assistance of ICT and digital technologies. Under this framework, employees are offered specific rules and regulations to comply with, in order to show moral behavior and adhere to an ethical framework. Cybercrime law implements rules in public and private enterprises to control the behavior of people and mitigate potential harm done to people. With the cybercrime law, preventive and procedural law is implemented to focus on moral principles (law, 2019). The advantages to spate criminal statuses constitute the legitimating of goods and services and ease of operations at a global level. New dimensions under cyberspace allow for violent threats about potential harm and acquire the need for the law enforcement mechanism. Legislations implemented under cyber law prioritize risk performance and implement anti-cybercrime strategies.

References

crime, t. (2019). What is the difference between cyber crime and traditional crime?. Retrieved 30 October 2019, from https://www.pgitl.com/explore/article/what-is-the-difference-between-cyber-crime-and-traditional-crime

Dolliver, D. (2019). HOW CYBERCRIMES CHALLENGE LAW ENFORCEMENT. Retrieved 30 October 2019, from https://scholars.org/sites/scholars/files/ssn_basic_facts_dolliver_on_cybercrime.pdf

law, c. (2019). Cybercrime Module 3 Key Issues: The Role of Cybercrime Law. Retrieved 30 October 2019, from https://www.unodc.org/e4j/en/cybercrime/module-3/key-issues/the-role-of-cybercrime-law.html

Miklaucic, M. (2019). 13 Cybercrime: The Evolution of Traditional Crime. Retrieved 30 October 2019, from https://cco.ndu.edu/BCWWO/Article/980849/13-cybercrime-the-evolution-of-traditional-crime/

Table of Contents

Your time is important. Let us write you an essay from scratch

Crazy Offer!

25% off

on your first order