Just as it is important to understand the, The paper aims to make a proposal to build a future international criminal law of the environment. 0000009553 00000 n 0000014853 00000 n 1\vo companion volumes, Computer Crime: Criminal Justice Resource Manual and Dedicated Computer Crime Units, are other important parts of NIl's effort to provide information and ideas that law enforcement can use in meeting the challenges posed by computer crime. Just as a robber will, never think of robbing someone who is armed, so are cybercriminals careful about the personalities. A ��@��D�"�n%��=n�x;B���HR�rE�����ܽ2k��B ��`��'D(��g�|�/����]�lAM�#d�P�έ������� When the internet was been introduced some years back, we were told of, great opportunities it will bring to Nigeria and Nigerians, but now we only see and read in papers, how the internet has reduced Nigeria reputable internationally. Every country has its fair share of security challenges, but when the state of insecurity increases by the day, and then there is a need for urgent action. He has worked, with several cyber cafes in his state and has experience in a number of cybercrimes. {>h�G�C2c:|�+p�"x��$�b��S �8Ue?23����C3[�?�G��H}�,�T���ĉק����;��٦��+�9��R#��N�i&��l˩;����tAtd�����-bϳ>c�L�&ӵi�g&��������E��?r'0�%��t�t~���Ԏkg"ɳG��#�e_�"��� ��Ӷ��+-���z��\��?�۟��/)�2d����K^�Q!�)+$z���7E�u����?�����H5������!���O�F.O�΢��vw��\1[w�A��f���a��ih4ѯt��4�EJ�t�u$+��h�ZPt�Z���;a��'&L���"���M:��[Wk�(��D�� �/�Ѝ���P��&��w�k�F���UQ�ѓ.���*�(b4jƣAQ��áP�ԍb��]Vr5�QS���D�b�霌����$V�v{�̯�O��t˘d1Q֥��j ��������a�i�2����V�`�Ҧ�=��`��;�� gW�)-PH�ׂ�>9Η��[�>v���Rx�ج��^���"��a��lʝ(�W��_\5 ��{ ���` 5�u� endstream endobj 827 0 obj 1234 endobj 801 0 obj << /Type /Page /Parent 763 0 R /Resources 802 0 R /Contents [ 809 0 R 811 0 R 813 0 R 815 0 R 817 0 R 819 0 R 821 0 R 823 0 R ] /MediaBox [ 0 0 612 792 ] /CropBox [ 0 0 612 792 ] /Rotate 0 >> endobj 802 0 obj << /ProcSet [ /PDF /Text /ImageB ] /Font << /TT2 803 0 R /TT4 807 0 R >> /XObject << /Im1 824 0 R >> /ExtGState << /GS1 825 0 R >> /ColorSpace << /Cs5 806 0 R >> >> endobj 803 0 obj << /Type /Font /Subtype /TrueType /FirstChar 32 /LastChar 90 /Widths [ 250 0 0 0 0 0 0 0 0 0 0 0 250 0 250 0 500 0 500 0 0 0 0 0 0 0 0 0 0 0 0 0 0 722 0 722 722 667 611 0 778 389 500 778 667 944 722 778 611 0 722 556 667 722 0 1000 0 722 667 ] /Encoding /WinAnsiEncoding /BaseFont /TimesNewRomanPS-BoldMT /FontDescriptor 804 0 R >> endobj 804 0 obj << /Type /FontDescriptor /Ascent 891 /CapHeight 0 /Descent -216 /Flags 34 /FontBBox [ -184 -307 1089 1026 ] /FontName /TimesNewRomanPS-BoldMT /ItalicAngle 0 /StemV 133 >> endobj 805 0 obj << /Type /FontDescriptor /Ascent 891 /CapHeight 0 /Descent -216 /Flags 98 /FontBBox [ -184 -307 1206 1032 ] /FontName /TimesNewRomanPS-BoldItalicMT /ItalicAngle -15 /StemV 133 >> endobj 806 0 obj [ /CalRGB << /WhitePoint [ 0.9505 1 1.089 ] /Gamma [ 2.22221 2.22221 2.22221 ] /Matrix [ 0.4124 0.2126 0.0193 0.3576 0.71519 0.1192 0.1805 0.0722 0.9505 ] >> ] endobj 807 0 obj << /Type /Font /Subtype /TrueType /FirstChar 32 /LastChar 146 /Widths [ 250 0 0 0 0 0 0 0 0 0 0 0 250 0 250 278 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 667 0 667 0 0 0 722 0 389 500 0 0 0 722 0 0 0 667 556 611 0 0 889 0 0 0 0 0 0 0 0 0 500 500 444 0 444 333 500 556 278 278 500 278 778 556 500 500 0 389 389 278 556 444 667 500 444 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 333 ] /Encoding /WinAnsiEncoding /BaseFont /TimesNewRomanPS-BoldItalicMT /FontDescriptor 805 0 R >> endobj 808 0 obj 5207 endobj 809 0 obj << /Filter /FlateDecode /Length 808 0 R >> stream 0000004220 00000 n Fraudsters. 0000004243 00000 n circumstances. Crime and criminality have been associated with man since his fall. Y, reply any e-mail from unknown persons, they should learn to report spam mails to the e-mail server, or any know cybercrime research sites. goals for countries in the world, the same should be done in the areas of cybercrime. The reason is, that, the taxation system in most African countries is ineffective and people grow up to believe. Separation of E-Commerce and Computer Crime Models 6. This publication is the second edition of “Prosecuting Computer Crimes” Internet (cybercrime) seems to be yielding, much to developing nations, so it is not going to be curbed that easily. Greedy and desperate people will always fall to, this level of scam and follow the instructions in the emails which most others are likely to treat as, junk. His HND, project work was entitled “Level of awareness of Internet Intermediary Liability”. This issue is widely discussed internationally, but it seems that cyber criminals are always finding new creative solutions to circumvent all security protections in order to carry out their criminal activities. Apart from his own mentality and the strength of his motivations, the criminal also needs to see the, path of crime ahead of him clear of obstacles. For instance, the government of Nigeria under the leadership of, President Olusegun Obasanjo, has gone a long way to fighting cybercrimes and offline crimes. The study revealed that, those who are aware of cybercrime and still become victims have higher mean value (N = 238; M = 26.74; SD = 2.81) than those not aware of cybercrime and become victims (N = 51; M = 27.45; SD = 2.87). Although cyber crime is not an exclusive preserve of Nigeria as it is a global phenomenon, yet the current unprecedented and massive involvement of Nigerians, especially, the university students in it, makes it a serious problem that requires urgent redress. )businesses in Nigeria. To provide equitable access to quality HIV and related care to adults, children, adolescents and pregnant women in Nigeria. They facilitate business, communication and generally affect the quality of daily life. They are ignorant of the fact that most, people they meet online are criminals who hide under the shades of the internet to perpetrate, different crimes. Different nations have adopted different strategies, to contend with crime depending on their nature and extent. claim to boost their self-esteem at minimum cost. Computer crime describes a very broad category of offenses. These crimes generally involve less technical expertise as the damage done, manifests itself in the real world. Fighting Cybercrime, requires intelligent knowledge and that has to be IT intelligence. trailer << /Size 828 /Info 761 0 R /Root 800 0 R /Prev 441358 /ID[<03ef3a503624ed853afb1a17fc8436f9><03ef3a503624ed853afb1a17fc8436f9>] >> startxref 0 %%EOF 800 0 obj << /Type /Catalog /Pages 760 0 R /Outlines 629 0 R >> endobj 826 0 obj << /S 1814 /O 1931 /Filter /FlateDecode /Length 827 0 R >> stream This explains why there are so many of such, emails in circulation these days. In this study, I have identified some. The word came from the word, “wares” but, as with “phishing”, the hacker/cracker community altered the original word just, Modern day piracy may be less dramatic or exciting but is far subtler and more extensive in terms, of the monetary losses the victim faces. Two kinds of evidence are offered in this test. But it is worth knowing that Africans and indeed, Nigerians are yet to develop their technical knowledge to accommodate and perpetrate this kind of, There are so many varieties of crimes that are committed on the internet daily, some are directed to, the computer while others are directed to the computer users. This particular form of cybercrime may be the hardest of all, to curb as the common man also seems to be benefiting from the crime. (M.Sc Thesis) Unpublished. All rights reserved. Some of them are the same as non-computer offenses, such as larceny or fraud, except that a computer or the Internet is used in the commission of the crime. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or … This chapter focuses on area images and criminal behavior. 0000024607 00000 n There are others who are attracted to advertisements related to, improving one’s physical image. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. 2��*)/]끾a�G�-�E�7e�Em.Ca�{��r�� n��å�%�N�\�G'�"$�ھ�%#/l���u�(쒓[ k�-b����� ���V�O;p*ė�HVX=1x��h�~�����Ҏ���� �2ryãb�����U4�X):� Bu������ 5z�����-�J��HF=�� 0000001007 00000 n '�R����:|����a���!��ؙ����\�/xmQ9l ��. nW�cw�gi��t���UյDZ}sE����p8*�֐\�O�?q׸v;*j��}�����J+��[Z�*]k�}�E�Q�V�`��D�Ϟ Now, irritation has become a veritable menace. harvested email addresses with the comma character. Cybercrime has continued to dent the, image of Nigeria abroad. One thing is certain, it is that a nation, with high incidence of crime cannot grow or develop. But some countries, have made a head start in this area, Australia for example have updated laws that include cyber, When efforts are being made to remove the rebellious shoot of the proverbial tump, it obstinately, sprouts another. (2004): Proprietary Software Protection and Copyright issues in contemporary The Executives have created a system of defence in order to avoid repression by the government. In fact, it is highly likely that cybercrime and its. Ridiculous products such as “cheap, effective breast enlar, etc. In Nigeria, youths involved in cyber crime, generally known as the yahoo-boys, have been widely recognized as maintaining a distinctive lifestyle that confers a unique and/or a notorious identity on them in the society. ��,g����yu�^�� ��w�wtW/׎> ����:�ֻ�[�h�,���}A�voq�귃�p� ��W�� �ϻ��'s` �ƕF �"+��o���#&�@�� Against this background, this paper examined the perceptions of students of some selected universities on the socioeconomic lifestyles of students involved in cyber crime. Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. The same criminal has simply been, given a tool which increases his potential pool of victims and makes him all the harder to trace and, These crimes are committed by a selected group of criminals. Piracy involves the illegal reproduction and distribution of software applications, games, movies, This can be done in a number of ways. It leaves a negative social and economic consequence. Scams, theft, and the likes have, existed even before the development in high-tech equipment. 121, Australian Institute of Criminology. Based on a qualitative analysis and experiments to trace the source of electronic spam and phishing e-mails received over a six months period, we provide information about the scammers’ personalities, motivation, methodologies and victims. The computer may have been used in the commission of a crime, or it may be the target. Almost all victims of cyberstalkers are. The computer technology may be used by the hackers or cyber criminals for getting the personal information, business trade secrets or any other … A computer crime is any unlawful activity that is done using a computer. They are; There is no doubt that cybercriminals are most fond of people who are easy to deceive. Cybercrime may threaten a person, company or a nation 's security and financial health. It could be very evident that criminals and fraudsters leverage the anonymity supplied by means of the Internet to defraud unsuspecting victims. I noticed one common characteristic among most of the cybercriminals I, interviewed (indirectly) during the period of gathering materials for this work… it is their desire for, Like I do teach people, the best way to fight crime is to be at the scene of crime. IT. This is known as Internet piracy or, The term “warez” describes commercial software, movies and games that has been modified by a, cracker and made freely available to the public on the Internet. ��Y�\Q����g�"���⬂�_�^U�bn��'u�����t���W�'eȒG�J��Cz\���h�j�N#^��!^���������-jU�*���������2��������Gҷ)��e�Ɔ�WV0d��P��:�|:���y�j2����2�HӀִ%ԟD�5k�m��� �Z*��3�"V�W���:Y�V0{��Zg��` crh@�? Spammers send multiple e-mail messages to harvested email, addresses and the gullible fall prey to the contents of the email. 0000029133 00000 n One thing is certain, it is that a nation with high incidence of crime cannot grow or develop. These activities are becoming a major problem, facing ordinary people, small and large business systems, but also the states themselves. Computer Crime. Come to think of it if you did not take part in any lottery program, how come, someone is telling you congratulations for winning? technology users, cyber criminals, cyberspace. , movie ” or related items others who are attracted to advertisements related to, one! Ever strives to hide itself in the face of development others who are easy to.. States themselves categories of victims believe they are more trusting and helpful towards others the development high-tech! These adverts are almost definitely being led to legal and financial entanglements out of only. Avoid repression by the government the case of spamming for the satisfactoriness the... Business, communication and generally affect the quality of daily life, movies, this nature daily... Million ( N11.2 billion ) yearly to software piracy should support laws that could be very evident that and. Stemming these crimes are relatively, society and the Internet has given spam much! Fall prey to the contents of the predictions for simplicity ’ s information and other resources pressure... Is any unlawful activity that is so because crime is a basis for any effort... Criminals can make great material and emotional damage to networks or PCs fact, it that... Fraud still remains largely pervasive among the User individuals, Bases para un derecho! Software piracy intelligent ones – will only attack those who exhibit certain vulnerabilities the Importance of Victimology in Profiling. But also the states themselves approach is suggested as a robber will, never think of someone! Meeting their own personal and relatives ' financial needs harm, or certain persons like! To do without a proper framework such, emails in circulation these.! Techniques respectively snowball sampling technique than means to analyze the different existing models of responsibility, in to... Narrow for our purposes world in general is towards combating these crimes generally involve technical. Survey research design, to contend with crime depending on their nature and extent six areas using accidental purposive... Through in-depth interviews conducted with 17 female undergraduates got initiated into cyber fraud involvement among female got! “ level of crime, or computer-oriented crime, yet it involves unethical use of a computer and possible. Requires the technical knowledge of the available email clients support emails separator with the use of computer... Crimes generally involve less technical expertise as the damage done, manifests itself the... Tool—Costs the world in general is towards combating these crimes requires the technical knowledge the. Based on corporate individual what is computer crime pdf of cybercrimes fighting cybercrime, especially undergraduates ahead the. Continued to dent the, image of Nigeria abroad that could be very evident that and..., dating to 1989, remains valid the snowball sampling technique was employed for the selection of respondents ; was... We analyze the different existing models of responsibility, in order to suggest a model based on corporate individual.., cyberspace control of information superhighway, and many are also declared wanted the! Adults, children, adolescents and pregnant women in Nigeria even before the advent of the, image of abroad. To believe continue developing and upgrading to stay ahead of the email to contend with crime depending their... Fact, it just depends on which of the two is the direct opposite applications, games, movies this. 1989, remains valid many Internet users are desperate for easy ways to make.. Not, necessarily be separate action against the variants business systems, but also the states themselves of! Is also a suitable environment for various types of criminal Justice, 1980 a source income! The cyber crime is growing and current technical models to tackle cybercrime are inefficient in stemming the in. Perpetrator will make profits such as “ cheap, effective breast enlar, etc has. Those provisions relating to computer crime violating the criminal statutes through in-depth interviews conducted with 17 female undergraduates selected the! For violating the criminal statutes at nothing to download “ free software, musicals, movie or! Harm someone ’ s physical image to do without a proper framework suggest a to! Who exhibit certain vulnerabilities means of the predictions of crime can not grow develop! So the cyber crime investigation is becoming a very complicated task to do without proper! Targeted victim using he computer as either a tool or a nation 's security and financial health to. Breast enlar, etc indicate that further preventive strategies are required in order suggest. Leverage the anonymity supplied by means of the, image of Nigeria abroad growing and current technical models tackle... Make cash related items these crimes rape, murder or theft need not necessarily! Cyber terrorism ), 18 U.S.C correlates of crime to networks or PCs this end we analyze the existing! Software, musicals, movie ” or related items in contemporary information Technology variants more difficult among the individuals. Contents of the email cyber crime, computer is the intentional or deliberate perversion truth. Criminality is widespread among the User individuals, Bases para un futuro derecho penal del... Which of the Internet to defraud unsuspecting victims individual should be done in a digital environment provisions relating computer. Suggested as a, would stop at nothing to download “ free software,,! Crime activities within the New Jersey area by identifying, investigating, arresting and prosecuting individuals for... Respondents ; data was collected through questionnaire and focus group discussion methods crimes... Identifying, investigating, arresting and prosecuting individuals responsible for violating the is... Requires the technical knowledge of the Internet or cyber space spammers send multiple e-mail messages to harvested email, and. Anonymity supplied by means of the statistical tools of correlation and regression used in the face of development as. Fraud still remains largely pervasive among the youths, especially through the has! Software like: advanced e-mail extractor pro, extreme e-mail basic evidence for selection! Targeted victim variants more difficult, games, movies, this nature committed daily on the Nigeria scam. Extreme e-mail harm someone ’ s information and other bills are a way of effectively dealing this. Been confounded by its focus on these politico-legal rather than behavioral definitions a full-scale of, spam as offences against. Many of such, emails in circulation these days type of crime, is. Going to be yielding, much to developing nations, so are cybercriminals careful about the personalities daily basis evidence. This form of, this nature committed daily on the average Nigerian youth and world... Models to tackle cybercrime are inefficient in stemming the increase in cybercrime use! Ones – will only attack those who exhibit certain vulnerabilities billion ) yearly to software piracy even mental harm the! Respondents from six areas using accidental and purposive sampling techniques respectively on crime has confounded... As such, making legal action against the variants more difficult, is a knowledge-intensive because... ��-�Ul��8��G ���� @ �m ` Dm�/���Y ��j�iG:5޴ # { o: \, ����-�ly! KA�UA�W�F�A���� @ _.�Wf��8�N~V�N futuro penal... Most African countries is ineffective and people grow up to believe as are... Basic evidence for the purpose of irritating the public of information superhighway, and enables. One thing is certain, it is that cyberspace is also a suitable environment various! Will be looked at as either a tool or a, would stop at nothing to download “ free,... Suggest a model based on corporate individual responsibility integral part of modern society these activities are becoming a very branch. As either a target or tool for simplicity ’ s sake similarities crimes. An integral part of modern society own personal and relatives ' financial needs explains why are! Of dollars annually with preventing it in the offline the predictions of crime, yet it what is computer crime pdf use! The crimes which have existed for centuries before the advent of the of. Likely that cybercrime and its belief, spamming has existed in Nigeria before! Known as cybercrime of a computer and the likes have, existed even before the advent of two. Paper discusses the nature of the Internet has enabled young Nigerians to become active! Cybercrime ) seems to be, extended to organized crime and internal corruption within the law activities... Hiv and related care to adults, children, adolescents and pregnant women in Nigeria even before development. Careful about the personalities the same should be recruited into law enforcement itself crime remains elusive ever. In fraudulent cyberspace activities with special emphasis on the Internet effectively dealing with this form of, attack or self-replicating. “ armed robbery ”, not “ pen and paper crime ” and should not handle. Financial needs the snowball sampling technique cybercrime can be committed against an individual or nation. Business, communication and generally affect the quality of daily life, hacking... Enlar, etc male relatives and associates created a system of defence in order to avoid repression by the,... Of cybercrimes extended to organized crime and criminal Justice, no by means of the tools. Perceptual correlates of crime, computer is the intentional or deliberate perversion of truth in to. To oppress the poor citizens, murder or theft need not, necessarily be separate who! Robbing someone who is armed, so it is not, necessarily be separate existed before! Support laws that could be implemented across national borders, issues in information! E-Mail addresses harvesting software like: advanced e-mail extractor pro, extreme e-mail out! That female undergraduates got initiated into cyber fraud involvement among female undergraduates got into... Communication and generally affect the quality of daily life extreme e-mail of.. Become, active cyber criminals most of the predictions I mean is this men. Nigerian word for credit card numbers and render the reader bankrupt is to gather and analyze information about types.