Premium Essay

Understanding Cyber Crime: a Sociological Study Among the Students of University of Dhaka

In: Computers and Technology

Submitted By tinni
Words 299
Pages 2
Cyber and technology related crime is on the increase and current trends indicate that itwill be a significant issue in Bangladesh. It has already been seen that a glomming threatbecomes visible in the arena of information technology. Recently the hacking of RABwebsite and e-mail threats of former prime minister are example for few of them.In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safeside to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information andCommunication Technology act is not the concert one. By enacting this act, there is achance to become safe side after committing crimes. So, considering these facts acomprehensive Cybercrime Protection Act should be imposed.This report incorporates the impacts of cybercrime in Bangladesh especially focuses onthe area of Personal life, Workplace as well as Policy making Bodies or thinkers. Webelieve the report would help all relevant concerns and especially policy makers
Computer literacy in Bangladesh is steadily on the rise. There is also a growing number of Internet users; cellular phone is widespread and so is accessibility of technology like SMS. While even a few years ago computers were vastly used as digital ‘typewriters’, they are now being employed to maintain accounts worth tens of millions of takas and more importantly, in storing useful information. It is anticipated that the revolutionary move by the present government to digitalise Bangladesh will significantly accelerate improvements in this sector. This change of outlook towards information technology is bringing ease, independence, growth and improvement in our Bangladeshi lives. But amidst this hope for a new future, a growing threat lurks in…...

Similar Documents

Free Essay

Study Skills Among Students

...deteriorating academic performance among college and university students. Those who lack that knowledge find themselves stuck when it comes to harnessing good time management. Many of these young adults are questioned at some point on how well they know about time management as they often encounter stress related problems which lead to failure in exams. 2.1 Causes 2.1.1 Stress Based on a survey conducted on the reasons of stress among first year students of Management and Science University (MSU), Shah Alam, Malaysia (2009) it was concluded that the major causes of stress were lack of sleep, academic work loads and social problems. This indirectly shows the lack of time management among students as these problems will be less likely to occur if their time were managed well. However it is not just the time management method the students fail to notice. The groups of students most prone to these problems are first year college students who are new to the environment, therefore more vulnerable to the changes from their high school. In college, students are bound to the illusion whereby there is an abundant source of time due to flexible time-tables, lengthy dead line for assignments and less daunting teachers (Katie Hern,2010). 2.1.2 Procrastination This causes procrastination which is the main catalyst for their failure in managing time. An analysis was done by York University (2010) which states that 40% of students from any university or college find......

Words: 995 - Pages: 4

Free Essay

Cyber Crime in Bangladesh

...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become......

Words: 14728 - Pages: 59

Premium Essay

Cyber Crime

...Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value Katherine T. Smith Department of Marketing Texas A&M University 4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study......

Words: 6032 - Pages: 25

Premium Essay

Prevalence and Factors Associated with Alcoholism Among College Student of Samar State University

...used to enjoy; losing interest in them, feeling an urge to drink, having relationship problems, having problems with the law, having money problems, and requiring a larger quantity of alcohol to feel its effect (Videbeck, 2007). Alcoholism does not only affect the adults. According to Sociological theory, alcoholism is a learned response. This often happens at a young age. A child may see things around them or on TV of people drinking and they tend to believe that is the right thing to do. This addiction is primarily believed to be because of society's influences. This often will affect persons who mostly drink in groups. This theory is based more on the peer pressure a person might receive, so they often turn to alcohol drinking problems during college years. Moreover, it has become a public health concern because of its effect on the future of a child. The goal of the current study is to assess the primary psychosocial factors that predict problem drinking among college students. Variables examined included demographic variables, personality, drinking history, alcohol expectancies, drinking motives, stress and coping, activity involvement, and peer and family influence. Evidence from studies of college drinking indicated that the variables associated with college drinking seem to vary at levels dealing with one’s personality and coping mechanisms, one’s thought processes about drinking, and the environment. (Isohanni, M., Oja, H., Moilanen, I., &Koiranen, M.......

Words: 8613 - Pages: 35

Free Essay

Drug Abuse Among University Students

...DRUG ABUSE AMONG UNIVERSITY STUDENTS Introduction As there are so many cases of drug abuse among university students, we need to find out the reasons why they are taking drugs and what can be done to overcome this problem. Body Family factors is one of the reason why university students are taking drugs. Poor parental supervision will give them more opportunities for exposure to drugs. Poor parental communication could lead the children to take drugs. They think their parents do not care about them. Educate your teenager about drug use, so they get the real * facts about the dangers of drug use. Family break up or parental conflicts. Parents keep quarelling everyday. Teenagers who failed to find ways to relief their frustration misuse drugs to feel better (Neil,n.d,as cited in Top 8 Reasons, n.d.) Students may take drugs due to the university factors. Availability of drugs in the university. Other students are selling drugs. They want to try something new. Students are stress in studies. Full of works and assignments. Parents play an important role in preventing or dealing with teenagers who abuse drugs. Talk to your teenager openly and honesty (Stanton,1983) Asking your child to tell you his/her thought and feelings about drugs. Talking with your child about his/her emotion and your feeling too. Teach responsible behaviour. Teach the balance of rights and responsibilities. Give rewards for their responsible behaviour. Encourage......

Words: 343 - Pages: 2

Free Essay

Crimes in Cyber Café and Its Rules and Ragulation, Perspective Bangldesh

...JAGANNATH UNIVERSITY DEPARTMENT OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case......

Words: 6680 - Pages: 27

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96

Premium Essay

Cyber Crime

...Project on Cybercrime www.coe.int/cybercrime Strasbourg, 15 January 2010 Draft Discussion paper Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from “Cloud Computing Providers” Prepared by Joseph J. Schwerha IV TraceEvidence, LLC Project funded by Romania, Monaco, Estonia, Microsoft, McAfee and the Council of Europe Council of Europe – Project on Cybercrime For further information please contact: Economic Crime Division Directorate General of Human Rights and Legal Affairs Council of Europe Strasbourg, France Tel: Fax: +33-3-9021-4506 +33-3-9021-5650 Disclaimer This technical report does not necessarily reflect official positions of the Council of Europe or of the donors funding this project or of the parties to the instruments referred to Email: alexander.seger@coe.int www.coe.int/cybercrime 2 Council of Europe – Project on Cybercrime Contents 1 2 3 4 Introduction ___________________________________________________ 4 Council of Europe Convention on Cybercrime Overview __________________ 5 What are Cloud Computing Providers? _______________________________ 6 The United States Perspective _____________________________________ 8 5 What are the challenges in the transnational acquisition of evidence from Cloud Computing Providers?_______________________________________________ 9 5.1 5.2 5.3 5.4 5.5 It can be impossible to know where the data resides ________________________________ 9 What Law Applies......

Words: 10207 - Pages: 41

Free Essay

Cyber Crime in Bangladesh

...RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer  and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way to make any crime easily.......

Words: 1924 - Pages: 8

Free Essay

True Crime or Moral Panic - Sociological Case Study

...Student ID:5145400 SY3 CASE STUDY - True Crime or Moral Panic Crime and deviance is present is all societies and has been throughout generations, and there are differing explanations for their existence through the various sociological approaches. Functionalism views society as a system of connected parts. Emile Durkheim (1982) saw crime in society as a stable system based on value consensus, norms and values which a society has established. Durkheim saw the need for some crime as an inevitable, normal and even necessary part of that system, and although it can disrupt social stability, it also performs some positive functions. One of these positives is boundary maintenance, and how crime produces a reaction from society against the wrong-doer which in turn reinforces their commitment to the value consensus (historylearningsite.co.uk, 2009). Criticisms of Durkheim's view on crime is how he failed to explain how much deviance is needed for society to function, and that just because crime has a function, it doesn't mean society is creating crime for the purpose of that function. Even how this 'necessity' doesn’t feel right for the victims (Jones, 2014). Conflict theories such as Marxism disagree with functionalism about crime being necessary, but instead suggest it is an inequality between the ruling and working class. Although Marx did not talk at length about crime, he did believe that laws were codified. Where one class kept the other classes in check through......

Words: 2550 - Pages: 11

Premium Essay

2012 Us Cost of Cyber Crime Study Final6

...2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report 2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: United States, which is the third annual study of US companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 56 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For the first time, Ponemon Institute conducted cyber crime cost studies for companies in the United Kingdom, Germany, Australia and Japan. The findings from this research are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Consistent with the previous two studies, the loss or misuse of information is the most significant consequence of a cyber attack. Based on these findings, organizations need to be more......

Words: 9057 - Pages: 37

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Premium Essay

Crimes in Dhaka

...Understanding Crime Trends in Dhaka city Literature Review In this modern technological sphere of human civilization ‘crime’ does not have any certain or universal definition. Though some the sociologists and criminologists have given some definition. In short, the deviation of law considered as crime. While every crime violets the law, not every violation of the law can traced as crime. In the modern forms of crimes, mostly evolve centralizing the urbanization process. The rapid urbanization process and crime conduction has some intimate relationships. Since urbanization process heavily influence the socioeconomic condition of the third world country, so there could be the possibility of having different trends of crime. Rapid urban settlement is the feature of contemporary urbanization process in Bangladesh. Dhaka city turned into the center hub of all possible crime and criminal activity. So, how urbanization process could be integrated to understanding crime trends in Dhaka city, as well as overall crime scenario of Bangladesh, we will be looking for it. The study will cover major trends of crimes in the past years, for coming days. Simultaneously how crime trends could possibly be changed, with the socio-economic variables related to crime in urban areas. The following literature reviews attempt to demonstrate and support the objectives of the study. In a research article by J. Walker, et al. (1990) was emphasized on the sectors and trends though. Australian rates of......

Words: 2123 - Pages: 9

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National......

Words: 6414 - Pages: 26

Premium Essay

Cyber Crime

............................................................................................. 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3 4.1. The major risks of cyber security ................................................................................................. 3 4.1.1. To consumers ........................................................................................................................ 3 4.1.2. To businesses........................................................................................................................ 4 4.1.3. IT organisations ..................................................................................................................... 4 4.1.4. Telecommunication companies ............................................................................................. 5 4.1.5. Government ........................................................................................................................... 5 4.2. The origin of cyber security ............................................................................................

Words: 3380 - Pages: 14