Cyber Criminals: A Psychological Study
Abstract
As we nurture our self with special knowledge and special talent in society, along with that power, comes accountability to use it for the good of that society Now again the hairline between good & bad is blurred. 'Online Ethics'are the decent values one should follow while working on the net. Unethical tasks through Net may cause a big blunder for the society Present Era having the outburst of net users, out of which there are few uncanny brains, who are not considered to work for the sake of society or for themselves rather they feel delighted by harming others. Although not having a face-to- face contact but still there may be lots of means to harm others through net. Apart from various known cybercrimes few of the unethical tasks, which may harm others, are Emotional Threatening, Identity Theft & Pedophiles etc. Online ethics in the extensive logic can be understood as that branch of applied ethics, which crams and evaluates such social and ethical impacts of Information Technology This paper is based on study which helps in understanding the behavioral perspectives of cyber criminals. This paper deals with the various aspects of confrontation of online ethics & the efficacy of cyber law to bring in notice of online users about their online ethical responsibilities.Ethics refers to a restraint dealing with what is good or bad. Although the two words can be differentiated by looking roughly but looking in the depth & then finding a difference is really a turbulent task. The online unethical task is not for all time a crime. There is an inherent connection between our way of thinking, awareness and the morals we do posses. The reason behind all online unethical tricks may possibly be that we have implemented lots of technical gizmos around us but don't know the standard approach of operating it. This paper uncovers the hairline among the conventional crimes & the Techno-lntellectual Crimes and also tries to get into the depth of reason behind the psyche of a cyber offender. Our Target audiences are Parents, Educators and children.
It is not practical to assume that only children are prone to be affected by poor habits. Although the poor habits can start at any age but yes, its true that because of lack of maturity and knowledge poor habits may target children first because a mature person can differentiate between ethical and unethical sides of behavior up to some extent whereas for the kids we as parents and teachers are responsible for teaching them ethical values and making them aware of the facts that the friendly technology may cause disasters for the society if used wrongly.
Living in a society is governed by some norms of social behavior accepted by all. Although living in a real society and in an e-society is entirely different as in real society we know our boundaries and the socially accepted behavior whereas in e-society boundaries are blurred and we are not aware of the fact that the things we are doing are accepted by the e-society or not.
Computer crime is different from usual crime, it is easy to commit, but tricky to detect and even fiarder to prove. Computer ethics is a brancli of realistic philosophy, which deals with how computing professional should formulate judgments about professional and social conduct.
With the gigantic expansion of the Internet, privacy concerns as well as anxieties about computing expertise such as spy ware and web browser cookies have caused to define ethical behavior in technology.
Downloads
Published
Issue
Section
License
It is herein agreed that:
1.I/We will not publish above said contribution anywhere else without the prior written permission of the publisher unless it has been changed substantially.
2.I/ We declare and warrant that the shared contribution is original, excerpts for such excerpts from copyrighted works as may be included with the permission of the copyright holder and author thereof, that it contains no libelous statements, and does not infringe on any copyright, trademark, patent, statutory right, proprietary right of others. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
3.The author also warrants that he/ she has the right to enter into this agreement, the research paper/ book review/ articlecontains no libelous or unlawful statements, contains no instructions that may cause harm or injury and does not violate the copyright or trademark, or infringes on the right or the privacy or others; and that all statements in the article asserted as facts are either true or are based upon reasonable research.
4.I/ We agree to indemnify the Editors of IMR against all claims and expenses arising from any breach of warranty from me/us in this agreement.