Professional Documents
Culture Documents
Criminology
Criminology
Criminology
Some of the measures to control cyber crime at the national and international level are:
Legislation: Developing and enforcing laws that define and criminalize cyber
crime, and that provide adequate penalties and remedies for victims1. For
example, the Council of Europe’s Convention on Cybercrime (2001) is an
international treaty that harmonizes the legal frameworks of its signatories and
facilitates cross-border cooperation and mutual assistance.
Education and awareness: Raising public awareness and educating users,
businesses, and institutions about the risks and prevention of cyber crime, and
promoting ethical and responsible use of ICT. For example, the
Stop.Think.Connect campaign is a global initiative that provides tips and
resources for online safety and security.
Technology and security: Implementing and updating security measures and
technologies that protect ICT systems and data from unauthorized access,
misuse, and damage. For example, encryption, firewalls, antivirus software,
and authentication systems are some of the tools that can enhance cyber
security.
Cooperation and coordination: Establishing and strengthening partnerships and
networks among various stakeholders, such as governments, law enforcement
agencies, private sector, civil society, and international organizations, to share
information, expertise, and resources, and to respond effectively to cyber crime
incidents and threats. For example, the International Criminal Police
Organization (INTERPOL) has a global cyber crime program that supports its
member countries in combating cyber crime.
This book is about cyber criminology, which is the study of internet crimes and criminal
behavior. The book consists of five sections, each covering a different aspect of cyber
criminology. The sections are:
Cyber crime is a broad term that covers various types of illegal or harmful activities
involving the use of computers and the Internet. Some examples of cyber crime are
hacking, identity theft, cyber stalking, online fraud, cyber terrorism, and digital piracy.