blog




  • Essay / Electronic crimes resulting from the evolution of technology and digital society

    Table of contentsSituational crime prevention Crime mappingConclusionCrime is a problem in all societies around the world because, as society and As technology advances, new crime challenges emerge. These new crime challenges include electronic crimes which are often committed in cyberspace. The rise of the Internet has given rise to a digital society that operates on the basis of technology. The digital society is characterized by the invention of new technological products likely to increase the risks of committing crimes. According to Tilley (2011), digital society is also characterized by both advantages and problems. We must therefore act to resolve the problems. This paper will aim to critically examine the viability of the “design” of criminal principles and practices in the era of digital society. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essaySituational Crime PreventionClarke (2009) states that situational crime prevention (SCP) is primarily concerned with the design of crime and reduction of opportunities. By focusing on the situational factors that facilitate the commission of a criminal act, SCP aims to discover methods to reduce an offender's opportunities to commit a crime (Newman et al, 2016). SCP has been criticized for being too quiet on electronic crimes, as it focuses more on crimes committed in physical space. However, its viability in terms of the “design” of crime will be critically examined in this section. Moving situational crime prevention into the online realm requires taking real-world principles and applying them to the Internet environment. Redoubled efforts to make crime not easy to commit in the digital society means tougher targets. Target hardening can include the use of hard-to-crack authentication passwords and personal identification numbers (PINs). This ensures that criminals do not easily access important files on computers and other digital devices. Tilley (2011) states that physical devices can be installed to ensure security. This may include installing mobile trackers that help locate stolen or lost cell phones. Access control can be used to minimize the risk of unauthorized access to physical assets and information systems such as computers. For a crime to occur in a location, the person committing the crime must be present in that particular location providing access. It is therefore important to prevent offenders from accessing it in the first place. For example, staff at the Botswana High Court are expected to use electronic cards to access their offices. Indeed, the computers they use contain sensitive files on legal cases. This prevents unauthorized access as well as data theft. Access control may also include the use of visible detection devices that detect unauthorized entry into a location. Crime Mapping Due to the advancement of technology and the emergence of digital society, crime mapping has become common in crime design. According to Ratcliffe (2004), crime mapping is the process of using a geographic information system (GIS) to carry out.