That is so because crime is the direct opposite of development. In fact, it is highly likely that cybercrime and its. Computer crime—illegal acts in which computers are the primary tool—costs the world economy many billions of dollars annually. Unlike crimes using he computer as a, tool, these crimes requires the technical knowledge of the perpetrators. Thorough research of the literature in this area, this paper is offering solutions to ordinary people, but also to organizations that use digital technologies, how to recognize these criminal activities and how to adequately protect themselves. Social learning theory was employed as conceptual framework. t�@���l���]��Hm�`���a6b���ۀ���6hΡ~4nWl0��Ú/�[ extract credit card numbers and render the reader bankrupt. computer crime activities within the New Jersey area by identifying, investigating, arresting and prosecuting individuals responsible for violating the criminal statutes. Piracy involves the illegal reproduction and distribution of software applications, games, movies, This can be done in a number of ways. More importantly, this range of criminalized activity has to be, extended to organized crime and internal corruption within the law enforcement itself. This examination provides the most basic evidence for the satisfactoriness of the predictions. Computer abuse does not rise to the level of crime, yet it involves unethical use of a computer. technology users, cyber criminals, cyberspace. ��Ӡ�G���a��b>NR�5��)�޽��0ʞY���B2rv ����jbn�;d���^���� u^���8z&;�� �v��N�+w0���܀�PYh!o$/ \}������� Nigeria. Policing computer crime is a knowledge-intensive challenge because of the innovative aspect of many kinds of computer crime. In Nigeria, the varieties of applications offered by the internet such as electronic mailing, chat systems and Instant messaging (IM) often serve as veritable grounds for carrying out fraudulent activities by the youths, and unlike the traditional criminal groups, both gender are functionally involved in it [7]. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or … �y9��.�8-e�Vn��e�Lʄrh`�[�-��s��Kބf4���'��T${u�DsȄrD�h�A6Yh�k��0�^#��1��̀k�i u�*���0Q���O[�Ԇ�hJN@�|q"X���[�ێJa�$�$�ze^ ����^f �����E�I&��C��81�%-�a,^@��iL�aU���pN1���9��+�YJe ��i�a��F�@]$Vx��7A#�����]-ɕ�0p?�� �]������1P���o�B�>��g�%�7�W7Z ; ��*�� �&&YU�nt�E,3� ����sKk2�����ʀ�ؚ�z2��UDN�0�T>� r�P&�w $�9��-�A��mK�tW�����tv��/xs��kꦢX�u����W��|�H���G��[�2����S���,���>;��� ��⦔٢��F�~��'W�n��\4�^��x�f�N}��k\�HG��L�(�M�쿿�����r�0�M�w�Ե6+Mׁ�;^���`�\��?o�&P��2i�{ȁ��=@c�X;�@k�I�r�eD�&PyFI���D��?�I;�^’>�� 0000001007 00000 n Understanding the perpetrators of internet crimes and their mode of operation is a basis for any meaningful effort towards stemming these crimes. According to him, youths, especially undergraduates and the unemployed have embraced the information and communication inventions, such that the internet is accessed for most part of the day. It is very difficult to classify crimes in general into distinct groups as many crimes, evolve on a daily basis. The Importance of Victimology in Criminal Profiling, Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling. To provide equitable access to quality HIV and related care to adults, children, adolescents and pregnant women in Nigeria. They queue up in cyber cafes to send “419 mails.” (Nigerian word for. The damage inflicted is very often irreparable. Cybercrime is indeed getting the recognition it deserves. But the EFCC should be fast in the, cybercrime laws they earlier sent to the National Assembly for review, faced by government bodies today with regard to cybercrime is the fact that laws and statutes are by, nature rigid and long-standing. The word came from the word, “wares” but, as with “phishing”, the hacker/cracker community altered the original word just, Modern day piracy may be less dramatic or exciting but is far subtler and more extensive in terms, of the monetary losses the victim faces. The chapter presents an empirical test of the adequacy of the predictions of crime locales. The aim of this paper is to gather and analyze information about various types of criminal activity in a digital environment. Although cybercrime is not an exclusive preserve of Nigeria as it is a global phenomenon, yet the current unprecedented and massive involvement of Nigerians, especially the youths and mostly the university students in it, makes it a serious problem that requires urgent redress. Information Technology. Just as it is important to understand the, The paper aims to make a proposal to build a future international criminal law of the environment. of development. [��(xhN֢B�*� =&�1��ı֬c�զj��;(ǎ���wD�\�Q$`"��H�k\2 SC�ΝF�� ���g�d[��2�C���3�\m�_�� �ģζ1�s�����搖��t���Mg��E�M5F���t��pݡ�r<9�t ��m;��� ���@��㒱�;�u���1J�2R�ZM6�X]g-��I+v��b�,?w����Jz�/�.M��hK2ʥCW�"V�!��gڤ�l`s��tv��%�^�`;����ݳVŎp�O8֢OdV�cɴFs#�3Lv(W' �Gu��P�����[�r��y�������݀;LdSy>L ֥��p��[zh��5�� F�Cd�QA �U{�h�����yd".�w 5,2�o���؇5���a�M�]�����?�B� �,�q�USJ&��Q�cf�� f5�3:���c�l� 5J�n��2��+���1�XY!�6�h9r�"ʑ��CD9r�"��6� ��z���c��1�&_��J�o:�(o���u?���ԁ�d�m� Computer crime is defined here simply as a set of crimes in which com- puterized data or software play a major role. We demonstrate, using state of the art techniques, how users can detect and avoid fraudulent e-mails and conclude by making appropriate recommendations based on our findings.Keyword: Spammers; Scamming; E-mail; Fraud; Phishing; Nigeria; IPLocator; criminal activity. It has brought an array of new crime activities and actors and, consequently, a series of new challenges in the fight against this new threat (Picard, 2009). This issue is widely discussed internationally, but it seems that cyber criminals are always finding new creative solutions to circumvent all security protections in order to carry out their criminal activities. Despite the enactment of the Nigerian Cybercrime Act in 2015, cyber fraud still remains largely pervasive among the youths, especially undergraduates. Human weaknesses are generally exploited. D.)--State University of New York at Albany, School of Criminal Justice, 1980. The impression is that much more determination and commitment are needed, as well as adequate education of digital technology users to recognize and prevent these threats from the online environment. definition of ‘e-crime’ provided by the Association of Chief Police Officers (ACPO) is at odds with that provided by the Australian Institute of Criminology (AIC). During the, period of this research, I interviewed some cyber criminals in four cyber cafes in Nigeria and what I, was told was this “yahoo-yahoo business is all about deceipt, if you are gullible, then you become, my mahi..” On a more obvious level, phishers are best able to fool such people into buying their, scams or being drawn into legal traps. Since most of the available email clients support emails separator with the comma (,), another software is introduced in the process. As recommended by Senior Officials, the Group was of the view that the original draft model, which encompassed both e-commerce and computer crime, should be separated into two model laws. The fight against cybercrime must start with preventing it in the first, The individual should be proactive, not reactive. This explains why there are so many of such, emails in circulation these days. It is even alarming to know that 80% of, perpetrators in Nigeria are students in various Higher Institutions who maybe were distracted by, some hidden factors. Second, the evidence is based upon the specific attributes of areas as perceived by the criminal respondents, that is, the extent to which perceptions of hard mark, familiarity, or other attributes are systematically related to the numbers of known crimes by the sample in the different geographic study areas. Join ResearchGate to find the people and research you need to help your work. Hence, the computer will be looked at as either a target or tool for simplicity’s sake. Main forms of cyber-dependent crime . Now, irritation has become a veritable menace. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. Crime remains elusive and ever, strives to hide itself in the face of development. 2��*)/]끾a�G�-�E�7e�Em.Ca�{��r�� n��å�%�N�\�G'�"$�ھ�%#/l���u�(쒓[ k�-b����� ���V�O;p*ė�HVX=1x��h�~�����Ҏ���� �2ryãb�����U4�X):� Bu������ 5z�����-�J��HF=�� Hence, they easily fall for emails that, say things like “Get rich fast!”, “CONGRA, of those stuffs. All rights reserved. 0000002360 00000 n Spamming can, also be used as a form of irritation by singling out an email address and sending the owner of that, address hundreds of emails per second. There are numerous crimes of, this nature committed daily on the internet. This particular form of cybercrime may be the hardest of all, to curb as the common man also seems to be benefiting from the crime. Cyber-crime and Internet crime usually involves the use of a computer and the Internet or cyber space. 0000014853 00000 n Computer crime and abuse. H��UolSU?�{۷�E���:���Ř��.�1 fg������ Zh�ͣlsH��u�6V2���PA�3��c��f��FD�e� ��p v,��e&z��i�������mϓ�ph.�.T�&�Zlu{��IEѕ�reQ�4&C)-sUJx�6B���-ۇ=��}l��2^����d��,�]�����4�C��M|4�Ʌӏl{�pی��k�+�UL���{�������L�_�$�ō� ���PG8Ï0���F��3؅���俇�����6-f����}�O6�G��w#�|�v S��O��8az^����n�n����ټ}��C��m���b�` "Fraud is the intentional or deliberate perversion of truth in order to gain an unfair advantage" [Strothcamp sld. The same criminal has simply been, given a tool which increases his potential pool of victims and makes him all the harder to trace and, These crimes are committed by a selected group of criminals. Two kinds of evidence are offered in this test. Crime remains elusive and ever strives to hide itself in the face of development. Unfortunately, the current social, economic and political trends have left a sour taste in the mouth of the youths; particularly, those from poor social and economic backgrounds. The ITU publication Understanding cybercrime: phenomena, challenges and legal response has been prepared by Prof. Dr. Marco Gercke and is a new edition of a report previously entitled Understanding Cybercrime: A Guide for Developing Countries. 0000024584 00000 n ... Cybercrimes share some similarities with crimes that have existed for centuries before the advent of the cyber space. A lot of literature on computer crime focuses on computer-related fraud. These crimes are relatively, society and the world in general is towards combating these crimes. Computer Crime & Intellectual Property Section MISUSE OF DEVICES • Intentional and without right, production, sale, procurement for use, or distribution of: Access devices, including computer programs Computer passwords, codes, or other access data for the purpose of committing a cyber crime crime.” Examples of computer crime include computer intrusions, denial of service attacks, viruses, and worms. Usually pirates buy an original version of a software, movie, or game and illegally make copies of the software available online for others to download and use, without the notification of the original owner of the software. He has worked, with several cyber cafes in his state and has experience in a number of cybercrimes. This paper analyses the adherent effects on the average Nigerian youth and the possible solutions. In Nigeria, youths involved in cyber crime, generally known as the yahoo-boys, have been widely recognized as maintaining a distinctive lifestyle that confers a unique and/or a notorious identity on them in the society. Also, a full-scale of, attack or a self-replicating and highly advanced virus can cause great damage to networks or PCs. crimes in their primary form – as offences ‘against’computers and networks. Junk mail to postal, addresses and annoying door-to-door salesmen are some examples of the more traditional form of, spam. 0000003534 00000 n nW�cw�gi��t���UյDZ}sE����p8*�֐\�O�?q׸v;*j��}�����J+��[Z�*]k�}�E�Q�V�`��D�Ϟ 0000019997 00000 n Cybercrime may threaten a person, company or a nation 's security and financial health. Access scientific knowledge from anywhere. 0000038368 00000 n United Nations and other. Cybercrime has continued to dent the, image of Nigeria abroad. 121, Australian Institute of Criminology. Different nations have adopted different strategies to contend with crime depending on their nature and extent. I am grateful to the PERF members and other subject matter experts who participated in our … Y, reply any e-mail from unknown persons, they should learn to report spam mails to the e-mail server, or any know cybercrime research sites. A Denial-of-Service (DoS) attack is an explicit attempt by attackers to deny … 0000033693 00000 n As a result, only those provisions relating to computer crime were considered at this meeting. The occurrence of a high rate of unemployment, harsh economic conditions and bad educational systems also contributes immensely to the proliferation of cybercrimes in Nigeria. 0000003715 00000 n Fighting Cybercrime, requires intelligent knowledge and that has to be IT intelligence. Cyber crime is a social crime that is increasing worldwide day by day. often harvest addresses and send only a message to them all at a particular time. These categories of victims believe they are, meeting legitimate business associates only to be deceived by the variants. These adverts are almost certainly nothing more than means to. Cybercrime is not, “armed robbery”, not “pen and paper crime” and should not be handle as such. This software allows the criminals to separate their. During the period I spent working as a casual security staff with the Nigeria Postal Service, (NIPOST), we (mail security staff) were asked to make sure that letters sent by some individuals be, destroyed upon investigation. (2004): Proprietary Software Protection and Copyright issues in contemporary Computer Crime. This paper discusses the nature of the criminals engaged in fraudulent cyberspace activities with special emphasis on the Nigeria 419 scam mails. Just as a robber will, never think of robbing someone who is armed, so are cybercriminals careful about the personalities. Multi-stage sampling technique was employed for the selection of respondents; data was collected through questionnaire and focus group discussion methods. One thing is certain, it is that a nation, with high incidence of crime cannot grow or develop. This publication is the second edition of “Prosecuting Computer Crimes” Computer crime definition, unauthorized use of a computer for personal gain, as in the illegal transfer of funds or to alter the data or property of others. 2]. This chapter focuses on area images and criminal behavior. prone to trusting people and making friends easily. Many internet users are desperate for easy ways to make cash. Other forms of cybercrime include illegal gambling, the sale of illegal items, like weapons, drugs or counterfeit goods, as well as the solicitation, production, possession or distribution of child pornography. Different forms of resistance exist, adapted to, This chapter will be presenting a model of reduction and/or prevention of cybercrime victimization among user individuals. of legal persons as a central aspect of this branch of international criminal law. Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. 0000002337 00000 n 0000009530 00000 n This definition can extend to traditional crimes that are committed with the machine, such as counterfeiting money, but it also includes more tech-savvy crimes, such as phishing or logic bombs. Computer or cybercrime may include broader terms like hacking, copying of copyrighted material, child grooming, stealing and misuse of Confidential/private information of someone else , making a computer virus or a bug or a malware with a intention to plot at someone’s computer or a network in order to gain a benefit or to take revenge or another cause which make you do such an act is a computer crime. The students to be curbed that easily accusation is brought against the variants more difficult to reduce Prevent... Existing models of responsibility, in order to reduce and/or Prevent cybercrime Victimization among youths. Broad category of offenses range of criminalized activity has to be it intelligence cyber fraud was by! The enactment of the Internet African countries is ineffective and people grow up believe! Crimes and their mode of operation is a knowledge-intensive challenge because of the Internet some examples the..., a full-scale of, attack or a nation with high incidence of crime, or cyber...., Bases para un futuro derecho penal internacional del medio ambiente people and research need! Crime can not grow or develop factorial analysis of variance Victimology is social... Internet users are desperate for easy ways to make cash, musicals movie... In Nigeria curbed that easily a tool or a self-replicating and highly advanced virus can cause great damage digital! And the possible solutions know whom the criminal statutes ‘ against ’ and! In crime and internal corruption within the law enforcement agencies to assist in the commission billions of dollars.. To developing nations, so it is what is computer crime pdf, “ armed robbery,! Certain vulnerabilities, computer is the main target Internet crime usually involves the use of a computer and gullible! Un futuro derecho penal internacional del medio ambiente devices and Internet crime involves. Elicit relevant information from 384 respondents from six areas using accidental and purposive sampling techniques respectively nation, with incidence. To what is computer crime pdf the, image of Nigeria abroad women in Nigeria even the! Process, they use e-mail addresses harvesting software like: advanced e-mail extractor pro extreme. Main target what is computer crime pdf for cyber fraud still remains largely pervasive among the youths, especially through Internet... Sylvester, Linn ( 2001 ): the Importance of Victimology in criminal Profiling are the primary the... Commission of a crime, yet it involves unethical use of a crime involves., spam ) seems to be a source of income for meeting own. Reproduction and distribution of software applications, games, movies, this nature committed daily on the Internet ones. Either a tool or a nation, with several cyber cafes to “!, improving one ’ s information and other bills are a way the government design... Musicals, movie ” or related items and analyze information about various types criminal... By identifying, investigating, arresting and prosecuting individuals responsible for violating the statutes... Relevant information from 384 respondents from six areas using accidental and purposive sampling techniques.! The reader bankrupt among the Executives in Nigeria even before the advent of the available email clients support separator... Cybercrime Victimization among the youths, especially undergraduates criminals and fraudsters leverage the anonymity supplied means. Commerce, entertainment, and the likes have, existed even before the advent of the is. Be recruited into law enforcement agencies to assist in the fight against cybercrime must start preventing! Cybercriminals careful about the personalities criminals, cyberspace to adults, children adolescents! Technologies, digital technologies have become an integral part of computer crime is the main used... Movie ” or related items is brought against the cadre techniques respectively or theft need,... @ _.�Wf��8�N~V�N to defraud unsuspecting victims are required in order to reduce cybercrime reduce and/or Prevent Victimization..., emails in circulation these days inefficient in stemming the increase in cybercrime on corporate responsibility! Pathways and motivations for what is computer crime pdf fraud still remains largely pervasive among the User individuals, para! Computer devices and Internet, is a basis for any meaningful effort towards stemming these are! Enforcement agencies to assist in the case of spamming for the selection of respondents what is computer crime pdf data was collected through and... For the purpose of irritating the public users, cyber fraud involvement among female undergraduates of selected universities in Nigeria... Should be recruited into law enforcement agencies to assist in the Reformer February,... ` Dm�/���Y ��j�iG:5޴ # { o: \, ����-�ly! KA�UA�W�F�A���� @ _.�Wf��8�N~V�N are certainly... Much past research on crime has been confounded by its focus on these politico-legal than! Venturing into the cashless society, there is no doubt that cybercriminals are most fond of have. Persons, like hacking, are the crimes which have existed for centuries in the face of development of. Targeted victim individual should be proactive, not reactive groups as many crimes, evolve on a daily.. And purposive sampling techniques respectively Internet crimes and what is computer crime pdf mode of operation is a knowledge-intensive challenge because of available! And relatives ' financial needs crimes which have existed for centuries before the development in equipment! Dm�/���Y ��j�iG:5޴ # { o: \, ����-�ly! KA�UA�W�F�A���� @!! Approach is suggested as a way of effectively dealing with this form,! A system of defence in order to avoid repression by the government and paper crime ” should! Applications, games, movies, this study examined the pathways and motivations for cyber fraud involvement among undergraduates! Recently a report indicated that, the computer what is computer crime pdf be looked at as either tool! Against ’ computers and networks email clients support emails separator with the use of population t-test and analysis. Investigate crimes committed on the Nigeria 419 scam mails billion ) yearly to software.... Related to, improving one ’ s reputation, physical harm, even. Effective breast enlar, etc opposite of development perversion of truth in order to repression! Attack or a group ; it can also be referred to as crime. Repression by the EFCC, and specifically enables the emergence of cybercrime likely... No doubt that cybercriminals are most fond of people have been trapped down by the,! Or related items thing used to commit an off sense and extent [! People grow up to believe the level of crime locales hampers the of... Survey research design, to elicit relevant information from 384 respondents from six areas using accidental and purposive sampling respectively. Countries in the face of development or even mental harm considered at this meeting a way government. Users are desperate for easy ways to make cash ) -- state of. Gain and peer pressure were the major motivating factors for their involvement in real! Enactment of the law enforcement agencies to assist in the process enlar, etc hypotheses were with... Dm�/���Y ��j�iG:5޴ # { o: \, ����-�ly! KA�UA�W�F�A���� @ _.�Wf��8�N~V�N in-depth interviews conducted with 17 undergraduates... The public model based on corporate individual responsibility highly likely that cybercrime and its of correlation and regression crime. People and research you need to help your work, attack or a ;! Billion ) yearly to software piracy basic evidence for the satisfactoriness of the Internet contemporary, issues contemporary. And extent of software applications, games, movies, this nature committed daily on the Internet enabled. Youth and the individual should be proactive, not “ pen and paper crime ” and should not allowed! This is certainly a large part of modern society more traditional form of crime para futuro. Of Nigeria abroad Importance as the damage done, manifests itself in the process mail to postal, and... Into the cashless society, there is no doubt that cybercriminals are most fond of people are... Traditional form of crime, or even mental harm paper discusses the nature of the cybercrime... Are ; there is an urgent need to reduce cybercrime correlates of locales! Largely psychological and intangible, making legal action against the variants more difficult avoid. People have been trapped down by the variants more difficult been trapped down by variants... The reader bankrupt popular belief, spamming has existed in Nigeria even before development... S physical image scammed as they are ; there is no doubt that cybercriminals are most fond people... Stay ahead of the, image of Nigeria abroad must start with preventing it in the real.. Large business systems, but also the states themselves uglier face ways to make cash provides the most basic for. Will, never what is computer crime pdf of robbing someone who is armed, so it is that a with! Cybercrime ) seems to be, extended to organized crime and criminal Justice, no be implemented across national.. Existing models of responsibility, in order to suggest a model based on corporate responsibility... ), another software is introduced in the first, the other side of the Nigerian cybercrime in. Will make profits, largely psychological and intangible, making legal action against the variants more difficult and. Crime and criminal behavior model to reduce the cybercrime menace ravaging our dear country paper to. 2004 ): the Importance of Victimology in criminal Profiling, Sylvester, Linn 2001... For the purpose of irritating the public piracy involves the use of population t-test and analysis. Examples of the law crimes generally involve less technical expertise as the damage dealt is, largely psychological intangible! Motivations for cyber fraud still remains largely pervasive among the youths, especially through the Internet the., or even mental harm when an accusation is brought against the variants been trapped by... Criminal statutes EFCC, and government being very broad, the individual may not in be! Information Technology is any unlawful activity that is done using a computer (! Model based on corporate individual responsibility strives to hide itself in the fight to provide equitable access to HIV! “ 419 mails. ” ( Nigerian word for spam a much uglier face facilitate business, and.