Cybercrime: An Empirical Study of its Impact in the Society- A Case Study of Tanzania

Authors

  • J. A. Mshana

DOI:

https://doi.org/10.61538/huria.v19i0.134

Abstract

The aim of the research is to examine the negative impact cybercrimes pose to the society. The concepts of cybercrimes are introduced and different types of cybercrimes are explored as examples of some of the impacts which caused by cybercrimes activities. Results from this study show that, there are many negative impacts which the society suffer from the cybercrimes and why the computer or networking are tools target for the crimes. The discussions are made from the findings and finally the paper addresses different measures which can be taken to combat these cybercrimes so that people still enjoy using the technology rather than stop them to use it.

Author Biography

J. A. Mshana

Assistant Lecturer,  Institute of Judicial Administration Lushoto,  Box 20 Lushoto

References

Black , G. Patrick and Hawk, Kenneth R. (2010) Computer and Internet crimes, San Francisco, California [Online] available from <http://www.fd.org/pdf_ lib/WS2010/WS2010_Computer_Crimes.pdf> [March 29, 2011]

Brett Pladna (2008) The Lack of Attention in the Prevention of Cyber crime and How to Improve it [Online] available from < http://www.infosecwriters. com/text_resources/pdf/BPladna_Cybercrime.pdf> [April 30, 2011]

Chang Su and Thomas J. Holt (2010) Cyber bullying in Chinese Web Forums- An examination of nature and extent, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 672–684 [Online] available from [September 15, 2011]

Chawki, Michael (2005) Cybercrime in France: An Overview [Online] available from<http://www.crime-research.org/articles/cybercrime-in-france-overview /> [February 28, 2011].

Collins, Jason D, Sainato, Vincenzo A. and Khey, David N.(2011) Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors Vol 5 Iss 1, pp 794-810 [Online] available from < http:// www.cybercrimejournal.com/collinsetal2011ijcc.pdf> [February 14, 2012].

Dion, Michael (2010) Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 630–642 [Online] available from <http://www.cybercrimejournal.com/ micheldion2010ijcc.pdf/> [September 14, 2011].

Erbschloe, Michael (2009) Computer and Internet Crime - Research Starters Business, [Online] available from <http://web.ebscohost.com/ehost/pdf viewer/pdfviewer?hid=105andsid=7142dd01-414d-4d45-8e62b10e618961e2%40sessionmgr115andvid=1> [February 16, 2011].

Eric J. Sinrod and William P. Reilly (2000) cybercrimes: a practical approach to the application of federal computer crime laws; Santa Clara university school of law Journal vol16, number 2 [Online] available from < http://www.sinrodlaw. com/CyberCrime.pdf> [April 30, 2011].

Gunter, W., Higgins, G. and Gealt, R. (2010) Pirating Youth: Examining the Correlates of Digital Music Piracy among Adolescents, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 657–671 [Online] available from <http://www.cybercrimejournal.com/whitneyetal2010ijcc.pdf/> [September 14, 2005] .

Heather, Newton (2008) Electronic Law: Research Starters Business [Online] available from <http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?hid= 105andsid=0af3d1fb-4a5b-43b3-9a63-88c64b0d59f9%40sessionmgr114 andvid=1> [March 20, 2011].

Hinduja, Sameer and Schafer, Joseph A. (2009) "US cybercrime units on the world wide web", Policing: An International Journal of Police Strategies and Management, Vol. 32 Iss: 2, pp.278 – 296 Available from < http://www. emeraldinsight.com/journals.htm?issn=1363-951Xandvolume=32andissue= 2andPHPSESSID=9b6iln802cqem26pgpbll0pme0> [February 28, 2011].

Hoepman, Jaap-Henk; Jacobs, Bart (2007); increased security through open Source: Communications of the ACM, Jan2007, Vol. 50 Issue 1, p79-83, 5p [Online] available from <http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid =7a28b26e-60d2-4ee8-a9ff-d0f7f9f6cdef%40sessionmgr104andvid=1andhid =105>[April 30, 2011].

Hu Bill, Mclinish Thomas and Zeng Le (2010) Gambling in Penny Stocks: The Case of Stock Spam E-mails, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 610–629 [Online] available from <http://www.cybercrime journal.com/Huetal2010ijcc.pdf/> [September 15, 2011].

International Federation of Phonographic Industries (2011) IFPI digital music report 2011: Music at the touch of a button: Zurich, Switzerland: IFPI [Online] available from <http://www.ifpi.org/content/library/DMR2011.pdf> [April 15, 2014].

Issac, Biju ; Mohammed, Lawan A (2007) War Driving and WLAN Security Issues

- Attacks, Security Design and Remedies: The Journal of Information Systems Management, Vol. 24 Issue 4, p289-298, 10p, [Online] available from < http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=7andhid= 105andsid=d9b6cd7d-57dd-42f8-89f2-dcf2f83440ea%40sessionmgr110> [April 30, 2011].

Kalning, K. (2007, May). Game piracy runs rampart on the Internet. MSNBC [Online] available from <http://www.nbcnews.com/id/18665162 > [April 15, 2014].

Kumar, V. S (2008) cyber crime prevention, detection [Online] available from <http://www.cidap.gov.in/documents/Cyber%20Crime.pdf> [February 17, 2011].

Kunz, Michael and Wilson, Patrick (2004) Computer Crime and Computer Fraud, University of Maryland Department of Criminology and Criminal Justice [Online] available from <http://www.montgomerycountymd.gov/content/ CJCC/pdf/computer_crime_study.pdf> [March 29, 2011].

Marion, Nancy E. (2010) The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation,, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 699–712 [Online] available from<http://www.cybercrime journal.com/marion2010ijcc.pdf/> [September 15, 2005].

Martellozzo, Elena., Nehring, Daniel and Taylor, Helen (2010) Online child sexual abuse by female offenders- An Exploratory study, International Journal of Cyber criminology Vol 4 Iss 1and2, pp 592–609 [Online] available from <http://www.cybercrimejournal.com/elenaetal2010ijcc.pdf/> [September 15, 2005].

Moore Robert, Tarun Naga and Lee Tina (2010) Examining factors that influence a

Youth’s potential to become a Victim of Online Harassment, International Journal of Cyber criminology Vol 4 Iss 1and2, p 685–698 [Online] available from <http://www.cybercrimejournal.com/mooreetal2010ijcc.pdf/> [September 15, 2011].

Newton, Heather (2008). Electronic Law -- Research Starters Business, p1-1, 19p [Online] available from <http://web.ebscohost.com/ehost/pdfviewer/pdf viewer?hid=105andsid=0af3d1fb-4a5b-43b3-9a63-88c64b0d59f9%40 sessionmgr114andvid=1> [May 2, 2011].

Ngo, Fawn T. and Paternoster, Raymond (2011) Cybercrime Victimization: An examination of Individual and Situational level factors Vol 5 Iss 1 p 773–793 [Online] available from < http://www.cybercrimejournal.com/ngo2011ijcc. pdf>[February 15, 2012].

Oates, Brad (2001) Cyber crime: how technology makes it easy and what to do about it: Journal of Information Systems Management, Summer2001, Vol. 18 Issue 3, p92, 5p [Online] available from <http://web.ebscohost.com/ehost/ pdfviewer/pdfviewer?hid=105andsid=40ff76e7-2b95-403c-a5e6-cca8db 255632%40sessionmgr114andvid=1> [February 18, 2011].

Saban, Kenneth A.; McGivern, Elaine; Saykiewicz, Jan Napolean (2002); A critical look at the impact of cybercrime on consumer behaviour: Journal of Marketing Theory and Practice, Vol. 10 Issue 2, p29, 9p [Online] available from < http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=e59a071fc629-476c-97e0-283aa772d4d2%40sessionmgr112andvid=1andhid=105> [April 30, 2011].

Siwek, S. (2007) The true cost of sound recording piracy to the U.S. economy. [Online] available from <http://www.ipi.org/docLib/20120515_Sound RecordingPiracy.pdf> [April 15, 2014].

Siwek, S. (2006). The true cost of movie picture piracy to the U.S. economy [Online] available from <http://www.ipi.org/docLib/20120117_CostOf Piracy.pdf > [April 15, 2014].

Sonya Liew Yee Aun (2005); an introduction to cyber crimes: Malaysian Perspectives [Online] available from <http://www.maele.net/articles/ekom 2005/Paper/Sonya%20Liew%20%20UK.pdf> [April 30, 2011].

Wall, David S. (2008) Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers and Technology; Vol. 22 Issue 1/2, p45-63, 19p [Online] available from < http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=d9b6cd7d-57dd42f8-89f2-dcf2f83440ea%40sessionmgr110andvid=5andhid=105> [April 30, 2011].

Wall, David S. (2005) The Internet as a conduit for criminal activity, In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78-94) Thousand Oaks, CA: Sage..

Washington.edu (2006) History & Impact of Hacking: Final Paper [Online] available from < http://courses.cs.washington.edu/courses/csep590/06au/ projects /hacking.pdf> [April 15, 2014].

Wienclaw, Ruth A. (2008) Internet Security -- Research Starters Business [Online] available from < http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?hid=

andsid=56be29d8-2da9-4ecd-9429-c3b87bbdd88a%40sessionmgr114and vid =1> [February 15, 2011].

Yu, Szde (2011) Email spam and the CAN-SPAM Act: A qualitative analysis Vol 5 Iss 1 pg 715-735 [Online] available from < http://www.cybercrimejournal.

com /Yu2011ijcc.pdf> [February 15, 2012].

Downloads

Published

2015-02-19