(9) سائبر کرائمزکا تعارف، تاریخ، خطرات و نقصانات اور چیلنجز + Introduction, History, Dangers and Challenges of Cyber Crimes

  • Hafiz Samiullah + Dr. Muhammad Hammad Lakhvi

Abstract

With the invention of the Internet, the world has become a universal village as the Internet has brought people from all over the world closer together. While modern technology, cyberspace, and the Internet are a great source of blessing and development for human civilization, there are many opportunities for criminals to commit crimes. Those who use information technology for negative purposes are called cybercriminals and all criminal activities, committed by the computer; the Internet, cyberspace and the World Wide Web are called cybercrimes. The first recorded cybercrime occurred in 1820 (1). Cybercriminals freed from geographical boundaries can commit their crimes from anywhere in the world. Today, cybercriminals have access to various systems of the countries of the world, including security, defense, communications, education, economic and ground and air transportation, and they also have access to the private information of individuals and the entire record of various institutions. At present, the world faces technical, legal, operational and general challenges regarding cybercrimes both domestically and internationally. This article explains: What are cybercrimes? When did they start? What are the types of cybercrime? Who are the cybercriminals and what are their goals? What are the risks and challenges of cybercrime?

References

(1) Mali, Parshant, A Text BOOK OF CYBER CRIME AND PENALTIES [AS PER ITA A 2008 AND IPC] (Draft Version), p4.available at: https://archive.org/stream/ATextBookOfCyberCrimeAndPenalties/ATextBookOfCyberCrimesAndPenaltiesByAdv.PrashantMali_djvu.txt
(2) https://dictionary.cambridge.org/dictionary/english/cyber?a=british (visited on 21-7-2018)
(3) https://www.merriam-webster.com/dictionary/cyber (visited on 21-7-2018)
(4) https://en.oxforddictionaries.com/definition/cyber- (visited on 21-7-2018)
(5) https://www.merriam-webster.com/dictionary/crime (visited on may4, 2018)
(6) A Text BOOK OF CYBER CRIME AND PENALTIES, p4
(7) Kamini Dashora, Cyber Crime in the Society: Problems and Preventions, Journal of Alternative Perspectives in the Social Sciences, 2011, Vol 3, No 1, p 242
(8) Ibid
(9) Debarati Holder, K. Jaishankar, Victimization of Women: Cyber Laws, Rights and regulation, Information Science Reference,USA, 2012, p14
(10) Moore, Roobert, Cybercrime Investigating High-Technology Computer Crime, Second edition, Routledge New York, 2015, p4
(11) A Text BOOK OF CYBER CRIME AND PENALTIES, p7
(12) Atul Jain, Cybercrime Issues Threats and Management, ISHA Books Dehli, 2005, p4-5
(13) A Text BOOK OF CYBER CRIME AND PENALTIES, p6
(14) Smith RG., Trajectories of Cybercrime, in Smith RG, Cheung RC-C & Lau LY-C (eds) Cybercrime Risks and Responses: Eastern and Western Perspectives, Palgrave Macmillan: London, 2015,p 13-34
(15) Ritu, Cyber Crimes: National and International Perspective, Department of Law, Kuruksheta University, 2017, p 88
(16) Cyber Crime in the Society: Problems and Preventions, p248
(17) Cyber Crimes: National and International Perspective, p 89
(18) Cyber Crimes: National and International perspective, p 90; Zibber Mohiuddin, Cyber Laws in Pakistan; A situational Analysis and Way Forward, 2006, p 9 (Available at: www.supreme court.gov.pk/ijc/articles/10/5.pdf visited on 22-6-2018)
(19) Verma,Amita, Cybercrimes: An analytical Study of International and National Legal Regimes, Punjab University, Chandigarh, 2004, p 59
(20) یوزنیٹ ایک نیٹ ورک ہوتا ہے جو انٹر نیٹ کے ذریعے ڈسکشن گروپ مہیا کرتا ہے۔
(21) Cybercrimes: An Analytical Study of International and National Legal Regimes, p 59, 60; Cybercrimes: National and International perspective, p 91
(22) Cybercrimes: An Analytical Study of International and National Legal Regimes,
p 61
(23) Thomas, Douglas and Loader, Brain., Cybercrime Law and enforcement, security and surveillance in the information age, Routledge New York, 2000, p 6-8
(24) Bhaskar,S.M. Ahson,S.I, Information Security A Practical Approach, Alfa Science, 2009,p 212
(25) Stamatellos,Giannis, Computer Ethics: A Global Perspective, Jones and Bartlett Learning, 2007, p 11
(26) Cybercrime Issues Threats and Management, p5
(27) A Text BOOK OF CYBER CRIME AND PENALTIES, p5-6
(28) Ibid, p7
(29) Byron Acohido, Meet A–Z: The Computer Hacker behind a Cybercrime Wave, USA Today, August 5, 2008. Available at: http://www.usatoday.com/tech/news/ Computersecurity/2008-08-04-hacker-cybercrime-zeus-identity-theft_N.htm.
(30) Ahmad Raza, Securing Cyberspace for Pakistan, Available at: http: //www. Technology review.pk/securing-cyberspace-for-pakistan/ (Visited on 26-5-2018 at: 4 pm)
(31) Ibid
(32) David Talbot, Cyber security: The Age of the Mega breach, 2016 Available at: https: // www. technologyreview.com/s/545616/cybersecurity-the-age-of-the-megabreach / (Visited on 26-5-2018 at 3 pm)
(33) http://www.4-traders.com/ACCENTURE-11521/news/CORRECTING-and-REPLACING-Accenture-and-Ponemon-Institute-Report-Cyber-Crime-Drains-11-7-Million-Pe-25175624/ (Visited on 26-5-2018 at 3 pm)
(34)https://www.google.com.pk/search?q=year+wise+ratio+of+cyber+crime&tbm=isch&source (visited on 23-6-2018 at 12 pm)
(35) https://www.forbes.com/sites/forbestechcouncil/2018/05/15/cyberthreats-a-10-year-perspective/#1ba2872a5e9e (visited on 15-07-2019)
(36) Kshetri, N., The economics of Cybercrime, IEEE Security and Privacy, 2006, p 33-39
(37) Broadhurst, R. and P. Grabosky, eds. Cyber-crime: The challenge in Asia, Hong Kong University Press, 2005, p 434
(38) Cybercrimes: An Analytical Study of International and National Legal Regimes, p 64
Published
2021-01-06
Section
Articles