Angela Marshall
Professor Christopher Young
Strayer University/Information Technology in Crime
March 1, 2015
Overall impact utilizing information technologies in combatting digital crime and digital terrorism. Every day that passes the world is becoming more and more reliant on information technology. Both public and private sectors of technology, banks, public utilities, commercial companies, and even governments use online technology in its daily business. It is easily argued that many of these advancements are beneficial, but what is the cost that is associated with them? As everything begins to use technology then everything becomes a target or victim …show more content…
Difficulty arises when the perpetrator is located in another city, state, or even country than their victim. Laws differing from state to state and nation to nation, make it difficult to control or investigate such crimes. Even when law enforcement agencies are willing to pursue a case across state lines, it may be difficult to obtain assistance from out-of-state agencies when the conduct is limited to harassing e-mail messages and no actual violence has occurred (Rouse, 2000-2015).
Cybercrime is not a city, state, or a country issue, cybercrime is a global issue that touches every person that utilizes the internet around the world. Laws differing from state to state and nation to nation, make it difficult to control or investigate cybercrime. With this being said the most salient solution would to make cybercrime laws the same across the globe. While this may seem challenging and much needed negotiation from government agencies to government agencies globally this will ensure success in working together as a global nation to fight against cybercrime.
U.S. aligning the federal agencies in order to better protect the nation against digital crimes and …show more content…
to use in order to combat digital crime and digital terrorism is to work together in both the private and public sector of information sharing. As long as we continue to try to address a global issue independently the longer it will take to secure our globe of digital crime and terrorism.
References
Privacy/Data Protection Project. (2005, 05 11). Retrieved from University of Miami School of Medicine: http://privacy.med.miami.edu/glossary/xd_ccpa.htm
Rouse, M. (2000-2015). Cyberstalking . Retrieved from TechTarget: http://searchsecurity.techtarget.com/definition/cyberstalking
Secretary, T. W. (2013, 02 13). Executive Order on Improving Critical Infrastructure Cybersecurity. Retrieved from The White House : https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0
Shinder, D. (2011, 01 26). What Makes Cybercrime Laws so Difficult to Enforce. Retrieved from Tech Republic / US: http://www.techrepublic.com/blog/it-security/what-makes-cybercrime-laws-so-difficult-to-enforce/
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Sophisticated Cyber Criminal Organizatios. In R. W. Taylor, E. J. Fritsch, & J. Liederbach, Digital Crime Digital Terrorism (pp. 97-121). Upper Saddle River, New Jersey: Pearson,