• How it works

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

5 Dissertation Topics on Cyber Crime

Published by Owen Ingram at January 9th, 2023 , Revised On August 15, 2023

Introduction

Any crime that is conducted using a computer and a network is known as cybercrime. Cybercrimes can target individuals in their personal capacity by targeting their property, the person himself, harming their mental health, and can even cause damage to governments.

Everyone using a computer and the internet can fall victim to cybercrime; however, understanding these crimes’ nature and how these are conducted can help people keep themselves safe and avoid falling victim.

Networks have weak spots, thus identifying those that can help you in determining possible attack points. This will eventually enable you to keep yourself safe from cybercrimes. Keeping your personal information safe at all times is critically important.

Never give out your passwords or any other personal information openly on any forum. This is one of the most effective ways of avoiding falling victim to cybercrime.

Being a pressing issue, cybercrime is continuously explored as to how it is conducted, what its types are, how it can be detected, how people can stay safe, etc. Here are five dissertation topics on cybercrime that will help gain an in-depth understanding of the issue.

These topics have been developed by PhD-qualified writers of our team , so you can trust to use these topics for drafting your dissertation.

You may also want to start your dissertation by requesting  a brief research proposal  from our writers on any of these topics, which includes an  introduction  to the topic,  research question , aim and objectives ,  literature review  along with the proposed  methodology  of research to be conducted.  Let us know  if you need any help in getting started.

Check our  dissertation examples to get an idea of  how to structure your dissertation .

Review the full list of dissertation topics for 2022 here.

5 Dissertation Topics on Cyber Crime 2022

Topic 1: is cybercrime a threat to banking sector in developing countries a case study of banking sector in pakistan.

Research Aim: This study aims to analyze the impact of cybercrime on the banking sector in developing countries. It will identify the possible threats faced by the banking sector due to increasing cybercrimes. These threats are related to the information security of the banks in developing countries. This research will be using Pakistan as a case study to find the threats posed by cybercrime to fragile banking. And after identifying the threats, the study will try to recommend possible solutions to ensure information security.

Topic 2: Impact of Cybercrime on E-Governance. Is cybercrime affecting the Confidentiality of Government Data?

Research Aim:  This research aims to find the impact of cybercrime on modern-day governance systems or e-governance. It will identify the possible hindrances caused by cybercrime in implementing effective e-governance. This research will also investigate the impact of cybercrime on the confidentiality of government data. And after investigating the impact of cybercrime on the confidentiality of government data, this research will recommend the modern-day practices used to maintain the security of the information.

Topic 3: Is Information Safe Today? A survey to find the impact of cybercrime on the information security of the businesses

Research Aim: This study aims to find the impact of cybercrime on the information security of modern-day businesses. It will be a survey-based study to find out the problems faced by modern-day businesses due to cybercrime. These problems include confidential information leakage, which can benefit the competitors in the market. And another major problem is data stealing. This study will identify all these problems. And it will also recommend modern-day solutions to increase the security of the information.

Topic 4: A Socio-Technological Examination of Cybercrime and Information Security in Nigeria

Research Aim: This current research intends to determine Nigerian society’s vulnerabilities to cybercrime and exploitation and the global information infrastructure in general. It also aims to determine the informal, social, and technical drivers of Nigerian cybercrime and cybersecurity. To examine Nigerian law enforcement agencies and cybersecurity stakeholders’ efforts to combat cybercrime and guarantee cybersecurity. This analysis provides an opportunity for legislators, policymakers, and law enforcement agencies can utilize the law to establish legally valid definitions of cybercrime and information security from sociological and technological points of view

Topic 5: Impact of Cyber laws on Information Security. A Cross-Country Analysis

Research Aim: This study aims to analyse the impact of cyber laws on information security. This study is a cross-country analysis that will find the effectiveness of cyber laws across countries. It will see how over time, the introduction of cyber laws has affected information security after the find out the relationship between cyber laws and information security. This research will identify the most effective cyber laws in the countries under study. And after identifying the best laws among the countries under study. This study will recommend the best laws from individual countries or a set of laws from different countries.

Covid-19 Cyber Crime Research Topics

Topic 1: cybercrimes and coronavirus pandemic.

Research Aim: This study will focus on the increased cybercrimes during the coronavirus pandemic and the effective ways to overcome them.

Topic 2: Cybersecurity and COVID-19

Research Aim: This study will focus on the role of cybersecurity in minimizing cybercrimes during the crisis of the pandemic.

Topic 3: Cyber threats can harm industries

Research Aim: This study will address the growing cyber threats during COVID-19, where remote work has been adopted to combat the pandemic. It’ll highlight the threats, their harmful effect, and their solution.

Cyber Crime Research Topics 2021

Topic 1: importance of password security.

Research Aim: This research aims to identify the importance of Password security in safe computing.

Topic 2: Phishing scams

Research Aim: This research aims to highlight phishing scams issues and suggest various tips to avoid such scams.

Topic 3: Mobile protection

Research Aim: This research aims to highlight mobile security threats and suggest possible ways to protect mobile phones from hackers.

Topic 4: How to ensure safe computing?

Research Aim: This research will focus on types of hackings, scams and suggests possible ways to ensure safe computing

Topic 5: Cybercrime Dissertation Topics – The Evolution of Cyber Crime and the Attacks that Led to the Formation of Cyber Crime Policies

Research Aim: This dissertation will focus on the history of how this crime came into existence. The thesis’s main focus will be on understanding cybercrime, how it is being conducted worldwide, and what has led to an increase in these types of attacks.

The thesis will also discuss the initial attacks due to which cybercrime policies came into place. All policies will be discussed as to how they help curb cybercrimes and the extent to which they have been successful in reducing them.

Finally, the thesis will suggest if any new policies must be developed. What aspects need to be focused on, are there any new areas that need attention, or do the existing policies need to be revised?

Topic 6: Cybercrime Dissertation Topics – Cyber Crime: How it Impacts Young Adults

Research Aim: Cybercrime can have a great impact on the younger generation. Young adults use the internet more than any other age group, which is why they are the first victims of cybercrime. This dissertation will explore how cybercrime affects the younger generation and how it causes problems for them.

Issues such as health, specifically mental health, will be discussed to understand the many problems caused by cybercrime. Many individuals from the younger generation have attempted suicide after falling victim to cybercrime.

This research study will discuss all such effects of cybercrime, including cyberbullying (a form of cybercrime). The study will also present ways as to how they can avoid falling victim to cybercrime.

How Can ResearchProspect Help?

ResearchProspect writers can send several custom topic ideas to your email address. Once you have chosen a topic that suits your needs and interests, you can order for our dissertation outline service which will include a brief introduction to the topic, research questions , literature review , methodology , expected results , and conclusion . The dissertation outline will enable you to review the quality of our work before placing the order for our full dissertation writing service !

Topic 7: Cybercrime Dissertation Topics – Investigating Various Approaches and Ways to Detect Cyber Crime

Research Aim: Cybercrime, one of the most secret crimes, is spread all over the world. The number of cybercrimes worldwide is on the rise. Thus, every individual using a computer and connected to a network must be aware of the different types of cybercrimes.

Before discussing the different ways to detect cybercrime, this dissertation study will briefly discuss the many cybercrime types. Essentially, the research will focus on various ways through which each form of cybercrime can be detected.

Different forms of cybercrimes can be detected differently. For instance, data theft can be determined by asking for a password or other sensitive information through a call or an email. The research will then conclude how people can identify different forms of cybercrime and not fall victim to any of them.

Topic 8: Cybercrime Dissertation Topics – Evaluating Existing Cyber Crime Policies: Do They Suffice in Today’s World?

Research Aim: Cybercrime, being a major cause of concern throughout the world, is controlled and curbed by different policies in place. These policies are designed to make sure that cybercrime is reduced and gradually eliminated from society. However, with the increased numbers, the need for a policy change or amendment seems inevitable.

This means that the existing policies need to be reworked or revised, or abandoned completely, and new policies should be formed. This dissertation will investigate both these options and emphasize whether policies should be revised or new policies should be formed.

If new policies should be formed, the research will explain how these should be shaped, and if they need to be revised, then which aspects need to be considered for amendments will be the main focus of the dissertation. A detailed analysis will be presented to make an informed decision.

Topic 9: Cybercrime Dissertation Topics – Understanding the Different Types of Cyber Crime

Research Aim: Cybercrime, undoubtedly, is one of the most deadly forms of crime. Without causing physical harm, the crime causes the victim to attempt suicide or suffer from mental diseases such as anxiety, depression, etc.

This research will focus on the different types of cybercrimes that impact people in today’s world. This research will highlight almost all cybercrime forms while emphasising the most common forms such as cyberbullying, hacking, data theft, child pornography, etc.

In-depth research will be conducted through surveys and by using numbers and percentages of cybercrime from credible resources such as government websites, etc.

This will help understand the various forms of cybercrime, how widespread the crime is, and how many people are impacted by cybercrime throughout the world.

Important Notes:

As a cybercrime student looking to get good grades, it is essential to develop new ideas and experiment with existing cybercrime theories – i.e., to add value and interest to your research topic.

The field of cybercrime is vast and interrelated to so many other academic disciplines like Facebook , Instagram , Cryptocurrency , Twitter , civil engineering , facial recognition , construction ,  project management , engineering management , healthcare , finance and accounting , artificial intelligence , tourism , physiotherapy , sociology , management , and project management , graphic design , and nursing . That is why it is imperative to create a project management dissertation topic that is articular, sound, and actually solves a practical problem that may be rampant in the field.

We can’t stress how important it is to develop a logical research topic based on your entire research. There are several significant downfalls to getting your topic wrong; your supervisor may not be interested in working on it, the topic has no academic creditability, the research may not make logical sense, and there is a possibility that the study is not viable.

This impacts your time and efforts in writing your dissertation as you may end up in the cycle of rejection at the initial stage of the dissertation. That is why we recommend reviewing existing research to develop a topic, taking advice from your supervisor, and even asking for help in this particular stage of your dissertation.

Keeping our advice in mind while developing a research topic will allow you to pick one of the best cyber crime dissertation topics that fulfil your requirement of writing a research paper and add to the body of knowledge.

Therefore, it is recommended that when finalizing your dissertation topic, you read recently published literature to identify gaps in the research that you may help fill.

Remember- dissertation topics need to be unique, solve an identified problem, be logical, and be practically implemented. Please look at some of our sample cybercrime dissertation topics to get an idea for your own dissertation.

How to Structure your Cyber Crime Dissertation

A well-structured dissertation can help students to achieve a high overall academic grade.

  • A Title Page
  • Acknowledgements
  • Declaration
  • Abstract: A summary of the research completed
  • Table of Contents
  • Introduction : This chapter includes the project rationale, research background, key research aims and objectives, and the research problems. An outline of the structure of a dissertation can also be added to this chapter.
  • Literature Review : This chapter presents relevant theories and frameworks by analysing published and unpublished literature available on the chosen research topic to address research questions . The purpose is to highlight and discuss the selected research area’s relative weaknesses and strengths whilst identifying any research gaps. Break down the topic, and key terms that can positively impact your dissertation and your tutor.
  • Methodology : The data collection and analysis methods and techniques employed by the researcher are presented in the Methodology chapter which usually includes research design , research philosophy, research limitations, code of conduct, ethical consideration, data collection methods, and data analysis strategy .
  • Findings and Analysis : Findings of the research are analysed in detail under the Findings and Analysis chapter. All key findings/results are outlined in this chapter without interpreting the data or drawing any conclusions. It can be useful to include graphs, charts, and tables in this chapter to identify meaningful trends and relationships.
  • Discussion and Conclusion : The researcher presents his interpretation of the results in this chapter, and states whether the research hypothesis has been verified or not. An essential aspect of this section of the paper is to draw a linkage between the results and evidence from the literature. Recommendations with regards to implications of the findings and directions for the future may also be provided. Finally, a summary of the overall research, along with final judgments, opinions, and comments, must be included in the form of suggestions for improvement.
  • References : This should be completed following your University’s requirements
  • Bibliography
  • Appendices : Any additional information, diagrams, and graphs used to complete the dissertation but not part of the dissertation should be included in the Appendices chapter. Essentially, the purpose is to expand the information/data.

About ResearchProspect Ltd

ResearchProspect is the world’s best academic writing service that provides help with Dissertation Proposal Writing , PhD Proposal Writing , Dissertation Writing , Dissertation Editing, and Improvement .

Our team of writers is highly qualified. They are experts in their respective fields. They have been working in the industry for a long, thus are aware of the issues and the trends of the industry they are working in.

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find dissertation topics on cyber crime.

To find dissertation topics on cybercrime:

  • Study recent cyber threats and attacks.
  • Analyze legal and ethical aspects.
  • Explore technological advancements.
  • Investigate prevention measures.
  • Consider international perspectives.
  • Select a focused area of interest for in-depth research.

You May Also Like

When you choose business management as your field of study, you are undoubtedly not a typical student. A degree in business administration is intended for those wishing to start their own business or expand an existing one.

Physiotherapy is a healthcare profession that deals with movement disorders of the body arising from different conditions. Physiotherapy focuses on performing practices that reduce physical ailments.

Need interesting and manageable medicine and nursing dissertation topics or titles? Here are the trending medicine and nursing dissertation titles so you can choose the most suitable one.

USEFUL LINKS

LEARNING RESOURCES

DMCA.com Protection Status

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works
  • Short Contribution
  • Open access
  • Published: 12 May 2020

Further rejection of the cybercrime hypothesis

  • Graham Farrell   ORCID: orcid.org/0000-0002-3987-8457 1 &
  • Daniel Birks 1  

Crime Science volume  9 , Article number:  4 ( 2020 ) Cite this article

8497 Accesses

7 Altmetric

Metrics details

We recently rejected the hypothesis that increases in cybercrime may have caused the international crime drop. Critics subsequently argued that offenders switched from physical crime to cybercrime in recent years, and that lifestyle changes due to ‘leisure IT’ may have caused the international crime drop. Here we explain how the critics misrepresented our argument and do not appear to introduce anything new.

  • Cybercrime hypothesis

We recently rejected the cybercrime hypothesis as an explanation for the international crime drop (Farrell and Birks 2018 ). For the sake of clarity, here we reiterate this hypothesis—which we derived from the work of varying scholars quoted in our original manuscript (Farrell and Birks 2018 : p1). By our definition, the cybercrime hypothesis remains a matter of substitution—such that, as offenders expend their finite resources to exploit increasing cybercrime opportunities, they necessarily must devote less resources to those associated with traditional crimes—and thus an increase in cybercrime causes a reduction in traditional crime.

In considering this cybercrime hypothesis, we offered argument and evidence to conclude that physical crime such as burglary and car theft did not decline because offenders shifted to online crimes. Our principal supposition was that the spread of the Internet occurred too late to account for the major declines in crime experienced across high income countries. We supplemented this with the argument that while some crimes such as fraud may have adopted online modus operandi in more recent years, this would be years after the start of the major crime declines.

Our work was subsequently criticized. The criticism relating to cybercrime was that some crimes, such as fraud, may have adopted online modus operandi in recent years (Miro-Linares and Moneva 2019 , hereafter M&M). This seems to be the same argument that we made. We wrote “A more plausible scenario is adaptive switching for cyber-assisted crime such as fraud—if offenders recognized the opportunity and acquired the resources and skills. However … this would still occur too late to account for the decline in physical crimes. ” (Farrell and Birks 2018 : 2, emphasis added).

Our critics show that online banking fraud in the UK increased from 2007 while check fraud declined, from which they infer substitution by offenders who preferred online crime for whatever reason. There are other plausible explanations for both trends. A general decline in check use would reduce the number of opportunities for check fraud, for example. Moreover, there seems to be no evidence in our critics’ data indicating the proposed substitution effect. Perhaps more importantly for present purposes, if some substitution did occur 15 years or so after physical crime’s decline, this would support our original thesis.

We could stop here. In our view, the remainder of our critics’ paper does not really relate to the cybercrime hypothesis. Nevertheless, we will consider some of the issues below.

Lifestyles revisited

In rejecting the cybercrime hypothesis, we observed that changes to the lifestyles of victims and offenders may warrant consideration, but would be a distinct hypothesis. We wrote that “It is plausible that the Internet has changed lifestyles and culture—keeping potential offenders and victims indoors thereby reducing their involvement with contact crime and increasing guardianship of property.” (Farrell and Birks 2018 : 3). A decade ago, one of us suggested a “changing lifestyles and routine activities hypothesis”, asking “Have the work and leisure routines of individuals changed in ways that could significantly affect crime patterns? This could include house ownership [and] technological change that leads to new fashions and lifestyle changes … Felson (1998) suggested routine activity-based explanations [for the crime decline] but otherwise the theory seems to have been largely overlooked.” (Farrell et al. 2010 : 30). The possibility that crime declined because men spend more time at home and in domestic tasks, that deindustrialization is causing the labor force to move indoors, and that the internet causes more socializing at home, has been previously mooted (Alper et al. 2013 ), while switching from crime to computer gaming remains an un-evidenced conjecture (e.g. Griffiths and Sutton 2013 ). A review of crime drop explanations noted that “it is conceivable that the Internet has induced lifestyle changes for both potential offenders and potential victims (with consequent impacts on guardianship if everyone stayed home more) that have had a subsequent consolidation effect significantly after the crime drop began .” (Farrell et al. 2014 : 457, emphasis added). Such conjectures posit non-criminal changes to lifestyles as causal.

We refer here to the lifestyle hypothesis for consistency with Hindelang et al. ( 1978 ) and past practice in crime drop research. Note that lifestyle changes have occurred before and after the internet became popular. Note that since the internet has become popular, lifestyles have also changed due to other factors besides the internet. Note that some or none of this lifestyle change might have affected offending and crime rates.

The reason for revisiting the lifestyle hypothesis here is that our critic’s second main point appears to be to propose much the same thing while offering no additional evidence (there is a reference to a paper showing lifestyle change occurring well after the onset of the falls in crime). Using the term ‘cyberspace hypothesis’ they suggest lifestyle changes due to ‘leisure IT’ such as pre-internet computer gaming may have reduced physical crime rates. But this is not original, as shown above. Further, we think they misuse the term ‘cyberspace’, which usually refers to internet-related issues, particularly communication over computer networks. They give it an unconventional definition that includes pre-internet ‘leisure IT’ (but, we note, the term is used elsewhere in their study as including internet-related activities). It could be argued that the choice of a term so similar to ‘cybercrime’, but assigning it a definition that involves an unusual and unclear usage, blurs definitional lines and introduces ambiguity.

Let us consider the lifestyle hypothesis further. Fifteen crime drop hypotheses were reviewed by Farrell ( 2013 ). Hypotheses were considered mostly because they had been the subject of previous empirical study. The reason that the lifestyle hypothesis was not among them, despite the author having discussed it previously (as shown above), was because there did not appear to be peer-reviewed supporting evidence. To our knowledge, that situation has not changed. Footnote 1 Let us consider the lifestyle hypothesis further using the ‘tests’ proposed in the 2013 and 2014 studies. The lifestyle hypothesis seems likely to fail the ‘varying trajectories test’ because lifestyle change seems unlikely to account for, say, how burglary appears to have fallen a decade or more in advance of violence in the United States. It also appears to fail the ‘phone theft test’, because it seems inconsistent with the increase in phone theft that occurred while other physical crimes were decreasing. In addition, lifestyle changes seem unlikely to explain key data signatures identified to date such as the decline in forced but not unforced entries to households as burglary declined (Tilley et al. 2015 ). Overall, then, while we are confident that non-criminal lifestyle changes occurred both before and in parallel with the rise of the internet, we suspect there is good reason that nobody has, to our knowledge, offered evidence showing they caused the international crime drop. We emphasize that showing lifestyles have changed, and even showing some correlation with crime trends, is a long way from demonstrating a causal connection.

Multi-causality, crime opportunities, and mechanisms

Our critics refer dismissively to a ‘so-called crime drop’. The crime drop provides the setting for their study, so this seems curiously self-contradictory. It also suggests they may not have considered previous discussions of variation in the crime drop and use of the term (e.g. that of Farrell et al. 2014 ).

Elsewhere M&M move to overtly criticize the security hypothesis by asserting that crime drop explanations should be multi-causal. It is our contention that the plausibility of an explanation should be determined not by a count of the number of hypotheses but by good theory and evidence. For example, the theory of evolution by natural selection is not inadequate because, by some definitions, it might be interpreted as lacking multi-causality. Likewise, the Big Bang explanation of the universe's formation is not usually viewed as inadequate on the basis that it may lack multi-causality. Perhaps it is also relevant to the present argument that a single term and theory can encapsulate multiple mechanisms and sub-hypotheses. With respect to the security hypothesis, different vehicle security devices trigger different mechanisms from each other and from anti-burglary devices, for example. That is, different security devices work in different ways in different contexts for different types of crime, following the reasoning of Pawson and Tilley ( 1997 ). Multiple other factors are involved: If door and windows locks reduced burglary, for instance, was this due to their increased prevalence, greater uniform coverage of access points (not just the front door), greater routine usage (windows no longer left open), secure defaults for modern locks, or the increased robustness of modern frames, panes, and security fittings (Farrell 2020 )? These measures may have reduced offending through at least two causal mechanisms: by physically thwarting access, or by deterring offenders who observe the presence of credible security and choose not to offend (Thompson et al. 2018 ). With respect to the crime drop, an avalanche of security measures, introduced in many different areas of life, has been suggested to be responsible (Clarke 2016 ). Further, the debut crime hypothesis and keystone crime hypothesis, which were proposed alongside the security hypothesis by Farrell et al. ( 2011 ), operate as related but distinct hypotheses. There is some preliminary evidence in support of these hypotheses which suggest that violence fell as a knock-on outcome of declining property crime (Farrell et al. 2018 ), and significant potential for further research. So when M&M imply that the security hypothesis is mono-causal, we suggest they are mistaken. Of course, it is still possible that other factors also played a role in the crime drop, but this seems increasingly unlikely in the face of evidence supporting the security hypothesis, and largely refuting other hypotheses, that has emerged in recent years.

More generally, in places, our critics’ work appears confused. Three prominent examples should illustrate. First, they make the “critical observation” that

“the impact of cybercrime on the physical crime drop is not necessarily associated with a shift in the activity of certain criminals but, rather, with a shift in criminal opportunities from physical space to cyberspace … [which] … has resulted in a new area of criminal opportunity in cyberspace that has affected opportunities in physical space.” (p. 3, emphasis added)

This seems to suggest that a crime opportunity is a physical entity that bounces around like a pinball. We suggest that a crime opportunity is any situation in which the perceived benefits outweigh the perceived costs of a criminal act. Second, they report that

“we are not claiming that the same individual who once stole bicycles now commits phishing (we ignore this, most likely that particular individual will not do so), but we do suggest that individuals who once found opportunities to steal bicycles now are finding more opportunities to commit fraud over the Internet through their daily activities (e.g., fraudulently offering bicycles that will never be sold to the buyer). Therefore, the point we are trying to make is not that people’s skills have changed, but that global opportunities have.” (p. 3)

This appears to argue that offenders who switch from physical crime to cybercrime do so without using different skills (‘not that people’s skills have changed’). If this interpretation is correct, it is hard to see how that could be

A possible alternative interpretation of the two examples so far is the following: The crime drop and rising cybercrime are independent trends caused by broad changes to crime opportunity structures . Again, though, this is our argument, and we took the italicized clause of the preceding sentence from the concluding paragraph of Farrell and Birks ( 2018 ).

Third, our critics report that “The mechanism [by which offenders substitute cybercrime for physical crime] is clearly evident: there are more opportunities in one place and fewer opportunities in another.” The straightforward problem here is that this does not specify a mechanism by which one change may have caused the other.

The argument and evidence collated here suggests that our critics misrepresented our argument and do not appear to offer anything new. It is not without some reluctance that we reply here, feeling obliged to do so, in the hope of avoiding further misunderstanding.

Availability of data and materials

Not applicable.

Despite that, Farrell et al. ( 2014 ) included ‘the internet’ as a crime drop hypothesis in order to clarify its implausibility, while Farrell and Birks ( 2018 ) responded to mounting speculation about cybercrime.

Alper, M., L. A. Addington and J. Lynch. (2013). ‘Time use and victimization risk: Another look at the crime drop’, presented to the American Society of Criminology 2013, Atlanta, 21 November 2013. (Originally listed as ‘Americans use of time and the crime decline: Have changes in daily activities made us safer?’).

Clarke, R. V. (2016). Criminology and the fundamental attribution error. Criminologist, 41 (3), 1–7.

Google Scholar  

Farrell, G. (2013). Five tests for a theory of the crime drop. Crime Science, 2 (5), 1–8.

Farrell, G. (2013). Why did burglary decline in the United States? Evidence relating to the security hypothesis. Security Journal . https://doi.org/10.31219/osf.io/c78wz .

Article   Google Scholar  

Farrell, G., & Birks, D. (2018). Did cybercrime cause the crime drop? Crime Science, 7 (8), 1–4.

Farrell, G., Tilley, N., & Tseloni, A. (2014). Why the crime drop? Crime and Justice, 43, 421–490.

Farrell, G., Tilley, N., Tseloni, A., & Mailley, J. (2010). Explaining and sustaining the crime drop: Exploring the role of opportunity-related theories. Crime Prevention and Community Safety, 12, 24–41.

Farrell, G., Tseloni, A., & Chenevoy, N. (2018). Did violence fall after property crime? In G. Farrell & A. Sidebottom (Eds.), Realistic evaluation for crime science: Essays in honour of Nick Tilley (pp. 141–155). London: Taylor and Francis.

Chapter   Google Scholar  

Farrell, G., Tseloni, A., Mailley, J., & Tilley, N. (2011). The crime drop and the security hypothesis. Journal of Research in Crime and Delinquency, 48 (2), 147–175.

Griffiths, M. D., & Sutton, M. (2013). Proposing the game substitution hypothesis: Exploring the possible causal relationship between excessive adolescent video game playing, social networking and crime reduction. Education and Health, 31 (1), 17–21.

Hindelang, M. J., Gottfredson, M. R., & Garafalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimisation . Cambridge, Mass: Ballinger.

Miro-Linares, F., & Moneva, A. (2019). What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks ‘Did cybercrime cause the crime drop?’. Crime Science, 8 (12), 1–5.

Pawson, R., & Tilley, N. (1997). Realistic evaluation . London: Sage.

Thompson, R., Tseloni, A., Tilley, N., Farrell, G., & Pease, K. (2018). Which security devices reduce burglary? In A. Tseloni, R. Thompson, & N. Tilley (Eds.), Reducing Burglary (pp. 75–103). London: Springer.

Tilley, N., Farrell, G., & Clarke, R. V. (2015). Target suitability and the crime drop. In M. Andresen & G. Farrell (Eds.), Routine activities and the criminal act (pp. 59–76). London: Palgrave Macmillan.

Download references

Acknowledgements

No applicable.

The first author acknowledges the contribution of Grants RES-000-22-2386, ES/K003771/1, ES/K003771/2 and ES/L014971/1 from the Economic and Social Research Council.

Author information

Authors and affiliations.

School of Law, University of Leeds, Leeds, LS2 9JT, UK

Graham Farrell & Daniel Birks

You can also search for this author in PubMed   Google Scholar

Contributions

Both authors contributed analysis and writing. Both authors read and approved the final manuscript.

Corresponding author

Correspondence to Graham Farrell .

Ethics declarations

Ethics approval and consent to participate, consent for publication, competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ . The Creative Commons Public Domain Dedication waiver ( http://creativecommons.org/publicdomain/zero/1.0/ ) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Cite this article.

Farrell, G., Birks, D. Further rejection of the cybercrime hypothesis. Crime Sci 9 , 4 (2020). https://doi.org/10.1186/s40163-020-00113-w

Download citation

Received : 04 December 2019

Accepted : 01 May 2020

Published : 12 May 2020

DOI : https://doi.org/10.1186/s40163-020-00113-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Crime decline
  • Lifestyle hypothesis
  • Security hypothesis

Crime Science

ISSN: 2193-7680

thesis on cyber crime

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Behavioral and Community Sciences > Criminology > Theses and Dissertations

Criminology Theses and Dissertations

Theses/dissertations from 2023 2023.

Efficacy of Online Social Movements for Sparking Change: The Case of the Missing Murdered and Indigenous Women Movement (#MMIW) , Kacy A. Bleeker

An Examination of Racial Disparities in Arrest Across Florida Counties, 1998-2018: A Test of the Racial Threat and Political Representation Hypotheses , Xavier D. Burch

The Invisible Victims of Commercial Sexual Exploitation: Boys and Their Barriers to Access to Services , Amanda L. Connella

Damned & Damned: Examining Vexatious Litigation and the Vexatious Litigant Statute in Florida Courts , Sarah L. Harper

The Contributions of Mental Health Issues, Traumatic Brain Injury, and Adverse Childhood Experiences to Recidivism Among Rural Jail Incarcerees , Lauren N. Miley

Assessing the Relationship Between True Crime Documentary and Podcast Consumption, Fear of Crime, and Protective Behaviors , Lauren A. Tremblay

Police Officers’ Perceptions of Gunshot Detection Technology , Courtney L. Weber

Theses/Dissertations from 2022 2022

A Macro Social Examination of the Relationship Between Disabilities and Crime Using Neighborhood and County Level Data , Natasha A. Baloch

Racial Differences in Perceptions of Sanction Severity , Sarah L. Franklin

Juvenile Homicide Offenders: A Life-Course Perspective , Norair Khachatryan

Exploring the Effectiveness of a Life-Skills Program in a Florida Prison Through a Social Bond and General Strain Theory Perspective , Danielle M. Thomas

Theses/Dissertations from 2021 2021

Clean Water for All: Examining Safe Drinking Water Act Violations of Water Systems and Community Characteristics , Junghwan Bae

Morality and Offender Decision-Making: Testing the Empirical Relationship and Examining Methodological Implications , Jacquelyn Burckley

The Ring of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness to Participate in Online Deviance , Cassandra E. Dodge

A Macro Analysis of Illegal Hunting and Fishing Across Texas Counties: Using an Economic Structural Approach , Leo J. Genco Jr.

Self-Protection in Cyberspace: Assessing the Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, and Victimization , C. Jordan Howell

Racial Threat Theory: A Test of the Economic Threat Hypothesis , Carl L. Reeds

Online Perceptions of Panamanian Prisons and Incarcerated persons: An analysis of YouTube user comments , Mahaleth J. Sotelo

Theses/Dissertations from 2020 2020

Toxic Colonialism and Green Victimization of Native Americans: An Examination of the Genocidal Impacts of Uranium Mining , Averi R. Fegadel

Cross-National Incarceration Rates as Behavior of Law , Christopher J. Marier

The Effects of Perceived Motivations and Mental Distress on the Likelihood of Reporting and Engaging in Self-Protective Measures Among Victims of Stalking , Daniela Oramas Mora

Mental Health and In-Prison Experiences: Examining Socioeconomic and Sex Differences in the Effect of Mental Illness on Institutional Misconduct and Disciplinary Segregation , Rachel E. Severson

Theses/Dissertations from 2019 2019

Dating Application Facilitated Victimization: An Examination of Lifestyle-Routine Activities, Self-Control, and Self-Efficacy , Vanessa Centelles

Social Constructionism and Cultivation Theory in Development of the Juvenile “Super-Predator” , Elizabeth R. Jackson-Cruz

Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space , Jennifer A. Leili

Sexual Assault and Robbery Disclosure: An Examination of Black’s Theory of the Behavior of Law , Caitlyn N. Muniz

Mass Shootings and Gun Sales: A Study on the Influence of Red and Blue Power , Maria Jose Rozo Osuna

A Multi-dimensional Macrolevel Study of Drug Enforcement Strategies, Heroin Prices, and Heroin Consumption Rates , Alexander G. Toth

Theses/Dissertations from 2018 2018

The Impact of a Religious/Spiritual Turning Point on Desistance: A Lifecourse Assessment of Racial/Ethnic Differences , Rhissa Briones Robinson

Political Decisions on Police Expenditures: Examining the Potential Relationship Between Political Structure, Police Expenditures and the Volume of Crime Across US States , Xavier D. Burch

Identifying the Personal and Perceived Organizational Characteristics Associated with Job Satisfaction Among Juvenile Probation Staff , Julie M. Krupa

The Role of Organizational Justice in Predicting Attitudes Toward Body-Worn Cameras in Police Officers , Nathaniel L. Lawshe

Yet Another Ferguson Effect: An Exploratory Content Analysis of News Stories on Police Brutality and Deadly Force Before and After the Killing of Michael Brown , Carl Root

The Role of Race/Ethnicity and Risk Assessment on Juvenile Case Outcomes , Tayler N. Shreve

Theses/Dissertations from 2017 2017

Intimate Partner Violence and the Capacity and Desire for Self-Control , Krista Taralynne Brewer

School Shootings in the United States from 1997 to 2012: A Content Analysis of Media Coverage , Victoria N. Iannuzzi

Chronic Runaway Youth: A Gender-Based Analysis , Michelle N. Jeanis

A Test of Wikström’s Situational Action Theory Using Self-Report Data on Intimate Partner Violence , Lauren Nicole Miley

An Exploratory Study of Macro-Social Correlates of Online Property Crime , Hyojong Song

Female Incarceration and Prison Social Order: An Examination of Gender Differences in Prison Misconduct and In-Prison Punishments , Elisa L. Toman

Adverse Childhood Experiences and Their Role as Mitigators for Youthful and Non-Youthful Offenders in Capital Sentencing Cases , Jessica R. Trapassi

Theses/Dissertations from 2016 2016

Disinhibition, Violence Exposure, and Delinquency: A Test of How Self-Control Affects the Impact of Exposure to Violence , Wyatt Brown

The Guilty But Mentally Ill Verdict: Assessing the Impact of Informing Jurors of Verdict Consequences , Erin Elizabeth Cotrone

The Relationship between Psychopathic Personality Traits and Lying , Jason A. Dobrow

Delving into the Heart of Victimization Risk: Examining the Interactive Relationship between Demographic Factors and Context , Amy Sheena Eggers

A Power Conflict Approach to Animal Cruelty: Examining How Economic Power Influences the Creation of Animal Cruelty Laws , Leonard J. Genco

The Role of Gender in Self-Control and Intimate Partner Violence , Laura Marie Gulledge

The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System , Christian Jordan-Michael Howell

Tactics of Sexual Control and Negative Health Outcomes , Anna Elizabeth Kleppe

The Applicability of Criminology to Terrorism Studies: An Exploratory Study of ISIS Supporters in the United States , Amanda Marie Sharp Parker

The Path to Violent Behavior: The Harmful Aftermath of Childhood Trauma , Nicholas Michael Perez

The Effects of Racial Bias on Perceptions of Intimate Partner Violence Scenarios , Batya Yisraela Rubenstein

Theses/Dissertations from 2015 2015

Reel or Reality? The Portrayal of Prostitution in Major Motion Pictures , Raleigh Blasdell

Psychopathy and Perception of Vulnerability , Barbara Joyce Dinkins

Effect of Empathy on Death Penalty Support in Relation to the Racial Divide and Gender Gap , Brian Godcharles

Exploring the Interactive Effects of Social Learning Theory and Psychopathy on Serious Juvenile Delinquency , Brandy Barenna Henderson

Tampa Electric Company's Big Bend Utility Plant in Hillsborough County, Florida: A Case Study , Lynne M. Hodalski-Champagne

Thirty Year Follow-Up of Juvenile Homicide Offenders , Norair Khachatryan

Organized Crime in Insurance Fraud: An Empirical Analysis of Staged Automobile Accident Rings , Chris Longino

The Role of Social Support in the Disclosure and Recovery Process of Rape Victims , Jessica Nicole Mitchell

Evaluating the Social Control of Banking Crimes: An Examination of Anti-Money Laundering Deficiencies and Industry Success , Erin M. Mulligan

Elite Deviance, Organized Crime, and Homicide: A Cross-National Quantitative Analysis , Carol L.s. Trent

An Evaluation of the Utah First District Mental Health Court: Gauging the Efficacy of Diverting Offenders Suffering With Serious Mental Illness , Stephen Guy VanGeem

Rape, Race, and Capital Punishment in North Carolina: A Qualitative Approach to Examining an Enduring Cultural Legacy , Douglas Wholl

Theses/Dissertations from 2014 2014

The Tattoo: A Mark of Subversion, Deviance, or Mainstream Self-Expression? , Jocelyn Camacho

Juvenile and Adult Involvement in Double Parricide and Familicide in the U.S.: An Empirical Analysis of 20 Years of Data , Averi Rebekah Fegadel

Predicting Successful Drug Court Graduation: Exploring Demographic and Psychosocial Factors among Medication-Assisted Drug Court Treatment Clients , Autumn Michelle Frei

Experimentally Evaluating Statistical Patterns of Offending Typology For Burglary: A Replication Study , Lance Edwin Gilmore

Developmental Trajectories of Physical Aggression and Nonaggressive Rule-Breaking among At-risk Males and Females during Late Childhood and Early Adolescence , Eugena Givens

Predicting Fear of Crime using a Multilevel and Multi-Model Approach: A Study in Hillsborough County , Jonathan Maskaly

Public Knowledge and Sentiments about Elite Deviance , Cedric Michel

The Influence of Community Context on Social Control: A Multi-Level Examination of the Relationship between Race/Ethnicity, Drug Offending, and Juvenile Court Outcomes , Jennifer Peck

Theses/Dissertations from 2013 2013

Assessing the Relationship Between Hotspots of Lead and Hotspots of Crime , Kimberly L. Barrett

A Life-Course Approach to Sexual Offending: Examining the Continuity of Juvenile Sexual Offending into Adulthood and Subsequent Patterns of Recidivism , Maude Beaudry-Cyr

Examining the link between self-control and misconduct in a multi-agency sample of police supervisors: A test of two theories , Christopher Matthew Donner

The Impact of Hyperfemininity on Explicit and Implicit Blame Assignment and Police Reporting of Alcohol Facilitated Rape in a Sample of College Women , Sarah Ehlke

Rurality and Intimate Partner Homicide: Exploring the Relationship between Place, Social Structure, and Femicide in North Carolina , Amelia Kirkland

Self-Control, Attitudinal Beliefs, and White-Collar Crime Intentions , Melissa Anne Lugo

Zero Tolerance for Marginal Populations: Examining Neoliberal Social Controls in American Schools , Brian Gregory Sellers

State-Corporate Crime in the Democratic Republic of Congo , Veronica Jane Winters

Theses/Dissertations from 2012 2012

The Walls Are Closing In: Comparing Property Crime Victimization Risk In Gated And Non-Gated Communities , Nicholas Branic

What Propels Sexual Homicide Offenders? Testing an Integrated Theory of Social Learning and Routine Activities Theories , Heng Choon Chan

A Deadly Way of Doing Business: A Case Study of Corporate Crime in the Coal Mining Industry , Charles Nickolas Stickeler

Deconstructing the "Power and Control Motive": Developing and Assessing the Measurability of Internal Power , Shelly Marie Wagers

Theses/Dissertations from 2011 2011

Assessing racial differences in offending trajectories: A life-course view of the race-crime relationship , Michael S. Caudy

Mental Health Courts Effectiveness in Reducing Recidivism and Improving Clinical Outcomes: A Meta-Analysis , Brittany Cross

General Strain Theory and Juvenile Delinquency: A Cross-Cultural Study , Wen-Hsu Lin

General Strain Theory, Race, and Delinquency , Jennifer Peck

Developmental Trajectories of Self-Control: Assessing the Stability Hypothesis , James Vance Ray

Explaining the "Female Victim Effect" in Capital Sentencing Decisions: A Case for Sex-Specific Models of Capital Sentencing Research , Tara N. Richards

A Multilevel Model of Police Corruption: Anomie, Decoupling, and Moral Disengagement , Ruth Zschoche

Theses/Dissertations from 2010 2010

The Emotional Guardianship of Foreign-Born and Native-Born Hispanic Youth and Its Effect on Violent Victimization , Amy Sheena Eggers

The Influence of Narcissism and Self-Control on Reactive Aggression , Melissa L. Harrison

Is There an "Innocent Female Victim" Effect in Capital Punishment Sentencing? , Amelia Lane Kirkland

An Analysis of the Influence of Sampling Methods on Estimation of Drug Use Prevalence and Patterns Among Arrestees in the United States: Implications for Research and Policy , Janine Kremling

A Pathway to Child Sex Trafficking in Prostitution: The Impact of Strain and Risk-Inflating Responses , Joan A. Reid

Victimization Among Individuals With Low Self-Control: Effects on Fear Versus Perceived Risk of Crime , Casey Williams

Theses/Dissertations from 2009 2009

Domestic Violence Within Law Enforcement Families: The Link Between Traditional Police Subculture and Domestic Violence Among Police , Lindsey Blumenstein

Rape Attitudes and Beliefs: A Replication Study , Rhissa Emily Briones

Reel Images: Representations of Adult Male Prisons by the Film Industry , Melissa E. Fenwick

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Maharaja Agrasen University
  • Maharaja Agrasen School of Law

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

CYBER CRIMES: A CASE STUDY OF LEGISLATION IN PAKISTAN IN THE LIGHT OF OTHER JURISDICTIONS

Profile image of Mahboob  Usman

This thesis appraise that cyber legislation has become a constant dilemma of Pakistan. Cyber crimes cause a great loss to national and international business community. Every day more and more digital crimes are being committed, while causing billions of dollar loss to corporations and individuals. Existing legislation does not cope with the advancement of technology. In most of the cases courts fail to find significant proof or suitable legislation to punish the criminals, eventually offenders are released. Extreme demand is emerging from Pakistani society to protect them from cyber crimes and to punish the offenders. So far, Pakistan does not have sufficient legislation to deal with such offenders. First chapter of this research will be based on general concepts of cyber crimes, such as definition, origin of the internet and evolution of it, kinds, jurisdiction issue, cyber crimes in developing and developed countries. Second chapter will be based on role of Pakistan and International community in the cyber world, further the forensic science will also be discussed in this chapter. In third chapter, the legislation of U.S will be compared with Pakistani legislation and at the end of this chapter findings will be given. On the basis of previous chapters recommendations will be given in chapter four. Electronic crimes can only be stopped if existing laws are amended and new legislation is introduced. Therefore, it is important to bring existing legislation conformity with International standards to enable law enforcement agencies to tackle different kind of criminals and bring them before the competent court of justice for punishments.

Related Papers

Marwah Obaid , Muhammad Amir

The growth of internet in Pakistan is exceptional; it reached to the heights of popularity for an ever changing medium of information and communication in a major conservative society. This brings freedom of expression, communication and information across the country which struggled to provide free speech and information access to its people. The internet penetration is increasing very rapidly; it is very important to observe the impact of it on the society; especially when the government is constantly trying to formulate the regulation for controlling the cyber space. A well regulated cyber space leads to the expansion of information technology services speedily. This paper focuses on the prevailing development of governance policies for cyber space and defies among the agencies and information technology venders. Moreover, the case study of national bank of Pakistan and other cyber crime survey shows that a lot of law making is needed in order to reduce the chances of cyber crime.

thesis on cyber crime

Pakistan’s Multidisciplinary Journal for Arts & Science

shaharyar sabiri

The study discussed the cyber laws in Pakistan and how these laws are preventing cybercrimes and how much these laws are up to date along with this the study also studied the legality of pirated softwares in Pakistan and internationally. Two research objectives were focused about the pirated softwares and the cyber laws of Pakistan. The study was a systematic review in which 25 articles from journals along with PECA 2016, electronic transition ordinance 2002 and cyber laws dragged in 2007 were reviewed to know the legality of pirated softwares and how these pirated softwares were treated around the globe. Concluded that there was made of laws related to cyber-crimes and up to date technologies in order to cope with the cyber-crimes that were conducted by the use of these modern devices so that the cybercriminals could be arrested and can be punished. All this should be done in order to protect the identity and privacy of the people who are using these technologies. The study concluded that there is a requirement for new laws which are up to date so that these laws can protect the country and its people and their online life so that their privacy and identity cannot be stolen.

SSRN Electronic Journal

Sabahat Akhtar 435-FSL/LLMIL/S21

Assessing the Cybercrime Legislation in Pakistan: a Comparative Study of European Union and Pakistani Cybercrime Laws 63 Pages Posted: 6 Sep 2023 Sabahat Akhtar International Islamic University Date Written: August 29, 2023 Abstract Background: With the recent development in the field of information technology, people are able to communicate in a more efficient way in cyberspace. As this efficient way of communication is used by almost everyone in this era so the interactions and the reasons for these interactions are also increased. In a normal society, disputes arise due to which laws are framed similarly in cyberspace as well these disputes are in large numbers across the world and these need well-framed laws. From this perspective, it is obvious that with the passage of time, the need for laws and proper enforcement mechanisms becomes necessary. For this purpose, the EU has made a number of cybercrime legal frameworks. Method: The research work is aimed at focusing on a comparative study of the cyber Crimes legislation in the European Union and Pakistan. The doctrinal method of research is used to critically analyze the cybercrime laws of the EU and Pakistan. This method is used in legal research to examine laws. The research design for this work is of comparative nature. This research work analyzes the EU legislation which is related to cybersecurity. It mentions all the relevant EU regulations. The second part of this study discusses the kinds of crimes which are committed in cyberspace. The third part of this research work focuses on cybercrimes in Pakistan. It focuses on the relevant cybercrime laws in Pakistan. It also comparatively analyzes the EU cybercrime laws and Pakistani cybercrime laws. It mentions a number of cases in this regard from both regions. Conclusion: It can be observed that there is a presence of lacunas in the smooth delivery of Cyber security in Pakistan as compared to the EU and there are some suggestions for pragmatic solutions to the matter regarding cybersecurity issues faced by Pakistan. This research work has helped in observing the loopholes in the Pakistani legal system. It has observed the ways in which changes in Pakistani legal framework related to cyber laws can be made so that it is in accordance with modern needs of cybersecurity. Systematic review and analysis of this data aims to highlight that updated legislation plays an important role in countering cybercrimes and that legislation should be strengthened, enhanced, and made up to mark the rapid advancement of technology in order to address the rising number of cybercrimes. It concludes that there is a need for more refined and precise cybercrime laws in Pakistan along with the need of staying updated with the changing needs of the time Keywords: Cybercrime laws, Pakistan, UK, Cybersecurity, EU Legislation

Contemporary Challenges of Digital World and Cyber Crime and Management Solutions in the light of Cyber Crime Bill 2016 of Pakistan and Islamic Management Perspective

Rabia Aamir , Dr. Umer Riaz Abbasi

A computer and a network are all that is needed for any criminal activity of cybercrime. A vigorous cybercrime legislation has, therefore, become a necessity in today’s digital age. Many nation-states take great measures to draft the inclusive laws regarding this legislation. The government of Pakistan is also working hard to amend the present laws which pursue to make sure the regulation with regards to the cyber security. Digital technology has many advantages but also has a dark side. Unfortunately, its dark side is paid much heed to which does not sit well with any code of ethics. The existence of Islam in the cyber world has created an opportunity for dialogue besides forming a new method of learning for mental and physical health The Electronic Transactions Ordinance ETO 2002 in the Islamic Republic of Pakistan forbade the illegitimate and unauthorized accessibility towards the information. It preceded the declaration of Prevention of Electronic Crimes Act PECA 2016. The Act lays down the laws for cyber- terrorist crimes which are conducted with the intent of committing terrorism. The penalty for this offense is based on the 14-year term of custody or a charge of Rs 5 million, which makes up to US $47,450. Understanding the Islamic perspective in this regard can be helpful for the betterment of the lives. Islam strictly forbids a spread of fake news through news sourcing which has increasingly become rampant in today’s cyber world which can lead towards malpractices. Thus, this research aims at sharing all the contemporary challenges with regards to the cybercrimes and possible solutions in the light of constitution in Pakistan.

Babar Saeed

The term 'Information Technology' evolved in the 1970s and if we consider a medium or large company providing goods or services, its information technology department will be responsible for storing, protecting, processing, retrieving and transmitting the information. Information Technology (IT) is a wide and varied sector, and is represented in some form in almost all the industries. It is a blend of computers and communication technology where IT professionals perform variety of duties, ranging from development and installation of applications to designing complex computer networks and databases. Although, the term 'Information Technology' is becoming more familiar to the common man some people still wonder, what is information technology? As a concept, it has evolved from the basic usage of computers, internet and processing of information in any industry. In Pakistan use of internet is growing rapidly day by day. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. It is very much obvious that there are two sides to a coin; Internet also has its own advantages and disadvantages. One of the major disadvantages is Cyber-crime or misuse of Information and Technology– illegal activity committed on the internet. The internet, along with its advantages, which has made the world into a ‘Global Village’ in return, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spam, software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise. In this study we would give suggestions and means with which effective enforcement of Cyber Laws in Pakistan would be implemented.

Kamran Adil

Dr. Ghulam Muhammad Kundi

mohankumar.m kumar

Each crime has its effect particularly on society, country, and the world to the immense degree. By th observation of cybercrime and its wonder, it is uncovered that like previous violations it has severely influenced social existence of people. To comprehend the impact of cybercrime, it is important to consider the effect of two things PC innovation and Web on individuals as cybercrime is most likely starting out of these. This article depicts the distinctions of the Indian point of view and Europe viewpoint in Digital Crimes.

International Journal of Information and Electronics Engineering

Hossein Taji

Journal of Information Engineering and Applications

RELATED PAPERS

Horacio Saggion

Value in Health

Eyal Solnik

Guillermo Ezquiaga

Artery Research

Felipe Inserra

Journal of Developing Drugs

Alborz Omidian

Advances in Meteorology

Ezekiel Makama

Revista Científica Hermes - FIPEN

rozana petani

To Maega : Jurnal Pengabdian Masyarakat

Nugraha Rasyid

Integrative Medicine Research

Phytotherapy Research

Anais do I Congresso Norte e Nordeste da Sociedade Brasileira de Cirurgia Oncológica

wesley lopes

Eurosurveillance

Mireia Carrasco

Clinical Chemistry and Laboratory Medicine

Nihal Salmayenli

Journal of Applied Oral Science

Alexandre Susin

Journal of Biological Chemistry

Elise LAMBERT

Irwan Gumilar

Educação e Pesquisa

Terciane Angela Luchese

IV Jornadas de Jóvenes Investigadores

maria torre

Harmonia: Journal of Arts Research and Education

juan abdulla ibrahim

Paulina Iwaniak

The Journal of Pathology: Clinical Research

American Journal of Theoretical and Applied Statistics

Abubakar Yusuf

See More Documents Like This

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Cyber Crime Essay for Students and Children

500+ words essay on cyber crime.

Cyber Crime Essay – Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer.

Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime.

Cyber Crime Essay

Types of Cyber Crime

Speaking in a broadway we can say that Cyber Crime are categorized into four major types. These are Financial, Privacy, Hacking, and Cyber Terrorism.

The financial crime they steal the money of user or account holders. Likewise, they also stole data of companies which can lead to financial crimes. Also, transactions are heavily risked because of them. Every year hackers stole lakhs and crores of rupees of businessmen and government.

Privacy crime includes stealing your private data which you do not want to share with the world. Moreover, due to it, the people suffer a lot and some even commit suicide because of their data’s misuse.

In, hacking they intentional deface a website to cause damage or loss to the public or owner. Apart from that, they destroy or make changes in the existing websites to diminish its value.

Modern-day terrorism has grown way beyond what it was 10-20 years ago. But cyber terrorism is not just related to terrorists or terrorist organizations. But to threat some person or property to the level of creating fear is also Cyber Terrorism.

Get the huge list of more than 500 Essay Topics and Ideas

Cyber Crime in India

Web world or cyberspace is a massive community of millions and billions of users and websites. Also, people access it for different uses like shopping, movies, music, video games, transactions, and e-commerce, etc.

thesis on cyber crime

In this Age of Technology and easy access to the internet, anyone can easily reach it. Because of this fast pace growth from the previous decade. Besides, the internet has opened a world of information on which anyone can connect.

Due to, this the rate of crime especially the rate of Cyber Crime has increased much fold. Moreover, the rate of circulation of data is also increased much fold due to the higher speed of internet. Above all, due to all these issues, the Cybersecurity has become a major concern for society.

Laws related to Cyber Crimes

To stop the spread of Cyber Crime and to safeguard the interest of people the government has made several laws related to Cyber Crimes. Also, these laws serve as protection against Cyber Crime. Apart from that, the government has also introduced cyber cells in police stations to counter the problem of Cyber Crime as fast as they can.

Ways of stopping Cyber Crime

Cyber Crime is not something which we cannot deal with our self. Likewise, with little use of our common sense and logic, we can stop Cyber Crimes from happening.

To conclude, we can say that Cyber Crime is a dangerous offense to someone’s privacy or any material. Also, we can avoid Cyber Crime by following some basic logical things and using our common sense. Above all, Cyber Crime is a violation of not only law but of human rights too.

{ “@context”: “https://schema.org”, “@type”: “FAQPage”, “mainEntity”: [{ “@type”: “Question”, “name”: “What is the main cause of Cyber Crime?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “The greed for quick money and the desire to get famous quickly are the two main reasons of Cyber Crime. Also, most of the targets of Cyber Crime banks, businessman, financial firms, etc.” } }, { “@type”: “Question”, “name”: “What is the punishment of Cyber Crime in India?”, “acceptedAnswer”: { “@type”: “Answer”, “text”:”If the person is found guilty then there are several punishments based on the level of crime. A simple crime can cost you a fine while a bigger crime can lead you to jail.”} }] }

Customize your course in 30 seconds

Which class are you in.

tutor

  • Travelling Essay
  • Picnic Essay
  • Our Country Essay
  • My Parents Essay
  • Essay on Favourite Personality
  • Essay on Memorable Day of My Life
  • Essay on Knowledge is Power
  • Essay on Gurpurab
  • Essay on My Favourite Season
  • Essay on Types of Sports

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Download the App

Google Play

IMAGES

  1. Cyber Crime Essay

    thesis on cyber crime

  2. Paper Presentation on Cyber Crime

    thesis on cyber crime

  3. Apa Itu Cyber Crime

    thesis on cyber crime

  4. E crime thesis Cyber Crime and its several types

    thesis on cyber crime

  5. Cyber Crime Essay

    thesis on cyber crime

  6. E crime thesis Cyber Crime and its several types

    thesis on cyber crime

COMMENTS

  1. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on society. To best frame my research, I will include recent cyber events and examine the

  2. Introduction: new directions in cybercrime research

    Dr. Tamar Berenblum is the research director of the The Federmann Cyber Security Center - Cyber Law Program, Faculty of Law, the Hebrew University of Jerusalem, Israel, and the co-chair of the European Society of Criminology (ESC) Working Group on Cybercrime. Tamar is also a Post-Doc Research Fellow at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), Netherlands ...

  3. 5 Dissertation Topics on Cyber Crime

    Topic 5: Cybercrime Dissertation Topics - The Evolution of Cyber Crime and the Attacks that Led to the Formation of Cyber Crime Policies. Research Aim: This dissertation will focus on the history of how this crime came into existence. The thesis's main focus will be on understanding cybercrime, how it is being conducted worldwide, and what ...

  4. Research Trends in Cybercrime and Cybersecurity: A Review Based on Web

    This is because research is needed to understand how the larger criminal justice system responds to cyber-crime at all levels (Holt & Bossler, 2014). More importantly, true interdisciplinary research in cybercrime and cybersecurity is needed through close collaboration between computational and social scientists.

  5. Cybercrime threat intelligence: A systematic multi-vocal literature

    Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex machine- and deep-learning investigations as well as similar threat intelligence and engineering activities over multiple analysis levels (i.e., surface, deep ...

  6. A Qualitative Research on the Impact and Challenges of Cybercrimes

    Thesis. Full-text available. Mar 2022; ... Cyber Crime is an important and valuable illegal activity nowadays. Initially internet and email are treated as the main tools of crime; however, over ...

  7. (PDF) Investigating Cybercrime

    In this PhD thesis, I hope to provide more insight into the workings of cyber- ... target cyber crimes: crimes in which the computer is the target of the . offense. (2) tool cybercrimes: crimes in ...

  8. Further rejection of the cybercrime hypothesis

    We recently rejected the cybercrime hypothesis as an explanation for the international crime drop (Farrell and Birks 2018).For the sake of clarity, here we reiterate this hypothesis—which we derived from the work of varying scholars quoted in our original manuscript (Farrell and Birks 2018: p1).By our definition, the cybercrime hypothesis remains a matter of substitution—such that, as ...

  9. Cyber crime and telecommunications law

    Imhof, Robert, "Cyber crime and telecommunications law" (2010). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact

  10. Criminology Theses and Dissertations

    Theses/Dissertations from 2013. Assessing the Relationship Between Hotspots of Lead and Hotspots of Crime, Kimberly L. Barrett. A Life-Course Approach to Sexual Offending: Examining the Continuity of Juvenile Sexual Offending into Adulthood and Subsequent Patterns of Recidivism, Maude Beaudry-Cyr.

  11. Cybercrime: An Investigation of the Attitudes and Environmental Factors

    Willing to Participate in Online Crime, Masters Dissertation, Technological University Dublin. This Dissertation is brought to you for free and open access by the School of Computer Sciences at ARROW@TU Dublin. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@TU Dublin.

  12. Dissertations / Theses: 'Cyber crimes'

    In this thesis, I take an empirical and systematic approach towards assessing the global cyber and biological threat. The first part of the thesis focuses on cyber crime. I examine international variation in cyber crime infrastructure hosting and cyber crime exposure. I also empirically test hypotheses about factors behind such variation.

  13. (PDF) Cyber-Crimes and their Impacts: A Review

    Cyber-Crimes and their Impacts: A Review. January 2012. Authors: Hemraj Saini. DIT University. Yerra Shankar Rao. National Institute of Science & Technology. T.C.Panda. In the current era of ...

  14. ROLE AND IMPACT OF DIGITAL FORENSICS IN CYBER CRIME ...

    It is described as a crime done on the Internet, through the Internet, or the use of the Internet. Phishing, credit card frauds, bank robberies, illegal downloading, industrial espionage, child ...

  15. PDF Emily Ngo Fall 2020

    A Thesis Presented to the Faculty of Anna Maria College ... cyber-attacks such as phishing, malware, and ransomware are indeed common. These basic attacks can damage a computer and at times a person's finance. However, with social media, the ... crimes such as online harassment and cyberbullying, there is a distinctive feature that allows ...

  16. (PDF) "Hacking: A critical study in emerging Cyber Crime in Nepal

    Cyber crime as a term that encompasses 'any proscribed conduct perpetrated through the use of, or against, digital technologies.' 15 The Encyclopedia Britannica defines cyber crime as 'any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property ...

  17. The Cyber Crime and Internet and Internet Sexual Exploitation of Children

    The Cyber Crime and Internet and Internet Sexual Exploitation of Children Dickson A. Abimbola-Akinola Governors State University Follow this and additional works at:https://opus.govst.edu/theses ... This Thesis is brought to you for free and open access by the Student Theses at OPUS Open Portal to University Scholarship. It has been accepted for

  18. Shodhganga@INFLIBNET: Prevention of Cyber Crimes in India A Comparative

    Cyber-crimes are the latest entrants in the long list of various types of crimes which are continuously bothering the mankind. newlineThe need for Cyber law came into existence due to the crimes which are done by the people virtually which have no boundaries and may affect any country across the globe. Thus, there is a dire need of such law ...

  19. (PDF) Cybercrime Awareness among Students at a Teacher ...

    First, the result shows that the respondents' cybersecurity awareness was significantly influenced by cyber-crime victimization, fields of study, and protection measures. Second, the current study ...

  20. (Pdf) Cyber Crimes: a Case Study of Legislation in Pakistan in The

    Cyber crimes cause a great loss to national and international business community. Every day more and more digital crimes are being committed, while causing. This thesis appraise that cyber legislation has become a constant dilemma of Pakistan. Cyber crimes cause a great loss to national and international business community.

  21. (PDF) Cyber-Crime Prevention Methodology

    The prime focus of our paper is to give emphasis on various frauds and cybercrime happenings in India as well as different types of cyber-crimes along with possible probable solutions. MITM attack ...

  22. Cyber Crime Essay for Students and Children

    500+ Words Essay on Cyber Crime. Cyber Crime Essay - Everybody thinks that only stealing someone's private data is Cyber Crime. But in defining terms we can say that 'Cyber Crime refers to the use of an electronic device (computer, laptop, etc.) for stealing someone's data or trying to harm them using a computer.

  23. (PDF) Analysis of cyber-crime effects on the banking ...

    Analysis of cyber-crime effects on the banking sector using the balance score card: a survey of literature June 2020 Journal of Financial Crime Vol. 27(3):945-958