1 / 17

Contemporary issues: Cyberspace

Contemporary issues: Cyberspace. By Toby and Michae l. Introduction. Cyber space is the environment in which electronic communication occurs; the culture of the internet. . The Nature of Cyberspace. There are three distinctive features of cyberspace:

gomer
Télécharger la présentation

Contemporary issues: Cyberspace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Contemporary issues:Cyberspace By Toby and Michael

  2. Introduction Cyber space is the environment in which electronic communication occurs; the culture of the internet.

  3. The Nature of Cyberspace • There are three distinctive features of cyberspace: • It facilitates anonymity – it allows anyone to say anything and remain anonymous, or have a fake identification. • Creativity – the internet allows for information and service to be accessible to almost anybody. Individuals or groups can create software and further develop the internet. • Global – the internet is accessible globally. Individuals from different countries can communicate and international online communities may be established. Information or ideas can be spread across countries.

  4. Cybercrimes • A cybercrime is criminal activities committed via the use of the internet and computers. • Types of Cybercrime may include: • Hacking • Internet fraud • Spam

  5. Hacking (Cybercrime) • Hacking is an unauthorized access to data held in a computer or computer system. Changing data and interfering with electronic communication between devices is also considered hacking. • The Cybercrime Act 2001 (Cth)recognised offences pertaining to computers, data and the internet. These offences are recognised as federal offences under the legislation. Although in some cases they can be charged under the states powers. In some cases such as R v Boden (2002) in Queensland they can be both charged under laws that do not directly relate to cyberspace. In this case Boden hacked into the sewage system pumps which released a million liters of sewage around the sunshine coast area. He was then charged under the terms of the Criminal Code 1899 (Qld) which prohibits the use of identification information to commit an indictable offence.

  6. Internet Fraud • Fraud is intentional misrepresentation or concealment in order to deceive or mislead. • Internet fraud can be carried in a number of ways often with conjunction to hacking. • Fraud may also be perpetrated through the use of fake websites. • An example of internet fraud is a scam, which is an attempt to obtain money through deception. • Email scams – these are well known scams. Often they promise large rewards for aiding an organisation or bank with financial difficulty. It involves transferring money electronically and supplying banking details. • Phishing – this is another common form of a scam where an email is sent asking for account details.

  7. Spam • Spam is junk mail received electronically. Most spam is harmless however, a lot of spam is designed to be damaging to the recipient. Spam can be used for the purpose of fraud and can advertise unwanted items. • spam act 2003(Cth) – it is illegal to send unsolicited commercial electronic messages through email, instant message services (im), sms, text, phone or multimedia message service (mms). It is enforced by the Australian Communications and Media Authority (ACMA). This act also amended other statuaries that allow for the enforcement against spam.

  8. Law Reform: • Cybercrimes are new to the legal system and is continuously changing and so the law is also required to do so, to protect peoples rights. Many of these statutory laws have only been made in the past 20 years. • For law reform to be effective in the cyberspace it must be broad and introduced quickly to keep up with the dynamic and growing cyberspace. • ‘Unique Cases’ may arise and the courts must generate precedents to adapt to these cases.

  9. Significant Events • Threats – • A teenage student threatened to kill two of his teachers and a school girl on his MySpace website in 2006. • A guy in WA posted a YouTube video which showed him making threatening comments towards people of a particular ethnic and religious groups.

  10. Continued. • Stalking (online) • In 2009 an individual from Victoria copied pictures from a girl’s profile and posted them on adult websites along with her name and contact details. Police investigated the case. • In 2011 an American girl received threatening messages and unwanted gifts from a teenage boy. He was arrested under stalking.

  11. Continued.. • Defamation • In 2009 a teenager in SA made a harassment page on Facebook that made false accusations of a local police officer. He was sentenced to a two year good behavior bond for defamation. • Gutnick v Dow Jones & Co Inc. [2001] Victoria VSC was a case in the Victorian Supreme Court. The case was about the company posting on a financial journal website labeled ‘Barron’s Online’. It alleged that Gutnick had irregularities in business dealings with religious charities and with a convicted criminal Nachum Goldberg. The High Court dismissed an appeal by Dow Jones to have the court case heard in America, stating it was under Victorian jurisdiction. Gutnick successfully sued the company for defamation. The case made the precedent to the place that material is viewed is where the jurisdiction comes under rather than the location it was posted at.

  12. Summary on Events • These events indicate that the law was administered from existing statutes, and that were not directly related to cyberspace. This may demonstrate a need for reforms/amendments in the future to aid interpretation of statutes and apply them to cybercrimes.

  13. Conditions that gave rise to law reform • The increasing frequency of cybercrime is seen as the main condition of cyberspace law reform. Societies’ views on these crimes have remained relatively the same; however the increasing frequency of these crimes are getting the attention of the public. • This is a graph about the amount of cybercrime cases that are reported to this website.

  14. Legal Responses • The law reforms such as the Cybercrime Act 2001 have made changes such as requiring encryption data to be released from computers; and banning some security software which allowed for complete anonymity, which contradicts some of the common law decisions made in the courts. • Some laws such as the Cybercrime Legislation Amendment Act 2012 (Cth) have been introduced to allow for greater co-operation with other countries in investigating crimes. Also some companies may keep records of conversations of employee’s. Some argue that this legislation is ‘invading their privacy’.

  15. Difficulties of Enforcing(Effectiveness) • It is mostly anonymous. • There is no ‘nation boundaries’ so crimes can be committed across two nations. Therefore it is difficult to enforce or punish crimes committed in multiple nations. (e.g. which jurisdiction does it come under?) Another issue is that a crime in one nation may not be a crime in another in regards to the cyberspace. • People can have fake accounts on websites and make it difficult to identify the individual or group. • There is a lot of cyber crimes. It makes it difficult to investigate the crimes if there are so many of them.

  16. Issues of Cybercrimes (Effectiveness) • The victims rights are often not held as the perpetrator often ‘gets away’ with the crime. • Cyber crimes are relatively easy to commit instead of physically stealing money. (for example downloading a movie is easier than stealing it from the shop).

  17. THE END 

More Related