1. Establishing the context INTRODUCTION The advances of digital technology and the intertwined connections between computing and communications have set in motion many changes affecting the way we live. From 2000 to 2008, the Internet has expanded at an average annual rate of 290 percent on a global level, and currently an estimated 1.4 billion people are connected to the Internet, which is close to 25 percent of the world’s population. The technology has advanced so fast and has become more and more user friendly; at the same time, people around the world have become more and more sophisticated in the use of technology. These inclinations have also created unparalleled opportunities for cyber criminals; criminal behaviors that were not imaginable a few years ago have become daily occurrences today. Digital technologies today make available to ordinary citizens tools which have the power and capability to inflict considerable damage. As never before, and at insignificant cost, criminals can cause calamitous harm to individuals, companies, and governments from places unheard of. The new advancement in technology, both hard and soft, is creating new opportunities for cyber criminals; and though, in principle, the same crimes considered illegal off-line are equally illegal in cyber space, online crimes take different forms in regard to the nature of the offender and the proof of crime. In order to create a control mechanism over cyber space and some form of deterrent for cyber criminals, a number of countries around the world have reformed their existing laws and...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.