Uploaded by Zain Siddiqui


The subjective nature of ethical principles makes them a spectrum of ever evolving ideas
needing to be dealt with uniquely. With technology taking over the world and making it easier
for humans to perform it has concurrently made it easy for them to commit crimes as well. This
intersection of crime and technology is called “cybercrime”.
Technology not only facilitates the existence of cybercrimes but makes it easy for the criminals
to get away without being caught as well. These crimes can target anyone, from individuals to
corporations to states. Thus, these assorted and serious possibilities of victims have caught
attention of every powerful actor in governance and lawmaking.
Theft and illegal surveillance are among the common types of cybercrimes and both state and
non-state actors can commit them. In addition, copyright infringement and pornography are
also the common. The serious aptitude of these crimes has caused a stricter defense against
them in the law.
Crimes where computer is used as a weapon are classified as one among three types of
cybercrimes by the law in the USA. The second type construes as crimes where computer is
used as an accessory to the crime. In this type the criminal gets access to the crime with the
help of computer. So, breach of privacy and using computer obtained data would be an
example of this type. Direct attack to a computer with the intention of harming the computer
itself is the third type of cybercrimes.
Cybercrimes not only destroy the victims but have the potential to influence the behaviors and
active choices of individuals as well. Pornography for instance, can impact young children. It
intimidates them to participate in illegal sexual activities.
Violation of intellectual and artistic property has also become easy through computers. People
can now not only replicate and reproduce works of these people after they are introduced into
the world but while they are in the making as well, making it impossible to categorize it as
actual theft.
Cybercrimes have been committed to steal finances from accounts by simply presenting false
information into the database. If a person can identify the weakness in a system, they can easily
get access to it and misuse the data. This process is called hacking.
Prevention of cybercrimes is not impossible. System security programs are installed to protect
computers. Firewalls and encryptions are of great significance for preventing data from being
obtained illegally.
Modern technology has proven itself to be exceptionally important as it not only improves our
life but has structurally revolutionized the world. But with this unprecedented control over the
world we have lost control over the technology and therefore gaining back the control is vital.
This can be done by taking protective measures and enforcement of laws that address
cybercrimes. If we can manage to gain control over the technology, we would be able to take
the best out of it without the fear of its harms.