Cyber Crime: Prevention and Innovation Since the introduction of computers into our society and the Internet in the early 1980s, the world has never been the same. Suddenly our physical world became smaller, and the electronic world laid the foundation for an infinite electronic reality. As we approach the year 2000, the end of the millennium, humanity is already well established in the “Information Age.” So much so that, as a nation, we find ourselves out of a service economy and into an information-based economy. economy. Within a few years almost all systems are managed by purchasing computers in some way, shape or form. We depend on them for everything. Even the smallest malfunction or glitch in a system could now cause an unfathomable amount of problems in everything from catching the bus, to having access to your money, to getting your prescription from pharmacists. Furthermore, Icove suggested that as the price of home computers that run faster and store more memory declines every year due to market competition, it is estimated that by 2011 most American homes will have a PC with ready access to Internet services. Internet. As users increase every day and new businesses take advantage of the benefits of an alternative electronic world, this dimension of information will only become larger, more elaborate, provide more services, and we will find society as a whole increasingly dependent on from it. , even in an artificial environment such as cyberspace, it seems that humanity cannot escape its overwhelming natural attraction towards illicit behavior or criminal tendencies. In turn, this alternate dimension has been infected by the same criminal behavior that plagues our physical reality. The information age has opened the door for antisocial, intelligent, and opportunistic people to find new and innovative ways to commit old crimes. These people are called hackers. What is the social problem? Cybercrime is the official name given to this hacker-driven criminal phenomenon. Although a solid definition of cybercrime has yet to be agreed upon among scholars, it is described in a functional way and includes old crimes such as forgery, theft, damage, fraud, manipulation or alteration of documents; who are usually subject to criminal sanctions everywhere. The description of computer crime also includes the unauthorized invasion or violation of database systems of private companies or public bodies.
tags