A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

8 crime in social networks social networks services

Info icon This preview shows pages 58–60. Sign up to view the full content.

View Full Document Right Arrow Icon
and a global harmonization should be developed in a Model Law. 8) Crime in social networks Social networks services are building online communities of individuals that shares common interests or activities, or like to interchange information with friends. The most important global social networking services are Facebook, MySpace and Twitter. Facebook became the largest and fastest growing site in the world from 2006 and has now more than 300 million users. In some countries more than 50% of the population are weekly, and 1/3 daily on Facebook. The term Facebook generation is commonly used as a description of this phenomenon. hindered – partially or totally, temporarily or permanently – to reach the threshold of harm that justifies sanction, administrative or criminal, under their law.“ 20 See Marco Gercke: ITU Global Strategic Report 1.6.2.3, (2008) 21 Marc Goodman: Presentation at the Council of Europe Octopus Interface Conference (March 2009) The most comprehensive study of Virtual Worlds has been done by Director Marc Goodman, IMPACT. 22 See Marco Gercke: ITU Global Strategic Report 1.6.2.4, (2008)
Image of page 58

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
50 Social networks are also used by criminals for crimes such as identity theft and fraudulent activities. Individuals are lured by “friends” to deliver financial and personal information , or to visit fake websites. Instances of sending money to friends in need have also been common. Many ordinary traditional crimes may be carried out through social network ser- vices. Bullying has also caused suicide through MySpace in 2006. Most offences on social networks may be covered by criminal legislation, such as fraud and identity theft. Infor- mation posted on such sites has been used in criminal investigation and presented in court. 9) Crime through “cloud computing” Cloud computing are means to provide remote services over the Internet. Users have no knowledge of, or expertice in, or control over the technology infrastructure in the “cloud” that support them. Cloud computing does not allow users to physically possess the storage of their data, and the user leave the responsibility of data storage and control to the provider. The “cloud” may be the ultimate form of globalization, since it could cover many borders and regions. The users could be offered to select “availability zones” around the world. That may create great concern for investigation and prosecution of criminal acts, and global harmonizing of procedural laws must be concidered. Cloud computing may challenge the traditional jurisdictional solutions for cyber- crime. Problems with regard to multi-jurisdictional crime scenarios, involving countries in more than one region and possibly selected “availability zones” countries. These prob- lems may only be solved through a global Convention or Protocol that includes necessary jurisdictional provisions under international law for serious crimes in cyberspace, whether or not they were possible to prosecute under national law.
Image of page 59
Image of page 60
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern