IT Security and Computer Crime in UAE

Introduction

Information technology security and computer crime are becoming an increasingly important topic as computers become more readily available. Despite the major positive contribution resulting from advances in information technology, some people are using the computers for unlawful activities. As a result, cybercrime has become a hot topic in the recent past considering that offenders of these crimes find a detachment from the victim (Santanam, Sethumadhavan & Virendra, 2011). Computer crime has therefore been a global concern for internet accessibility is on a tremendous rise. The increased globalization experienced in the modern society is motivating people to learn more about computing and other programs. However, as more people become knowledgeable in the computing field, the higher the risks of using this new intelligence to commit computer crimes.

Most people have stopped using computers as information tools. Instead, computers are being used to spread pornography, money laundering, phishing, illegal duplication and transfer of information among other white-collar crimes. Increased cases of cyber crime are not good for the world (Cohen, 2012). Many of these crimes have adverse effects on the jobs, community, and our lives. It is on this premise that the world is very proactive in ensuring computer security is guaranteed. In this chapter, we will discuss the issue of information technology and cyber security and its effects on the UAE population and the rest of the world.

Back ground information

UAE has made tremendous steps as far as information technology is concerned. It is, however, imperative noting that the country is ranked among the top ten countries that are vulnerable to hackers and other cyber criminals. As a result, the country has put stringent measures to deal with this menace that has adverse effects on the population. Perpetrators of this crime should face stern punishments that include life imprisonments and heavy fines depending on the seriousness and severity of the cybercrime (Easttom & Taylor, 2011). It is, however, prudent noting that most people in UAE are not aware of the prevalence of these crimes and the necessary precautions. Nevertheless, the state has been proactive in sensitizing the citizens on the impacts of cybercrime and warning them being victims of the crime.

UAE is the first country in the Middle East to have strict anti-cybercrime rules and regulations. The introduction of these laws has been escalated to the recent increasing levels of cybercrime in the country. The use of internet and information technology in the country has been at its peak and is ranked first among the Middle East countries. The government has put laws that criminalize the use of internet and the computers for any other use apart as an information tool. The latest rules have also defined the different types of cyber crimes such as breach of privacy, publishing illegal content, money laundering and inciting terrorism among other types of crimes. It is also wise noting that UAE understands the importance of collaborating with other countries to deal with the escalating cases of cyber crimes.

Impacts of cyber crime to the society

Increased cases of cyber crime have adverse impacts on the society of UAE and the world. For instance, cyber bullying is one of the major impacts that the society faces in the modern world. It is a fast growing trend in all parts of the world including UAE. Increased internet accessibility has put the society at the mercy of cyber bullies who can get to them anytime. Although it does not amount to a physical assault, victims of cyber bullying suffer immense psychological torture at the hands of these bullies (Santanam, Sethumadhavan & Virendra, 2011). Most teenagers, especially in UAE and other parts of the world, have fallen victims of this escalating trend. Most fraudulent people have used the internet for blackmail and sending humiliating messages through wireless and web-connected devices. It is classified worse than one-on-one bullying since perpetrators can conceal their identity with the help of technological advances. Cyberstalking is another form of bullying where criminals harass other persons thus causing fear, injury or death to reasonable persons (Cohen, 2012).   In essence, cyber crimes in the form of bullying have immensely disturbed the peace of the society.

The society moral and cultural values have also been influenced by the increasing cases of cyber crime. For instance, it has been difficult to filter objectionable content that is freely available online. As a result, some cyber criminals have taken this advantage to distribute objectionable contents such as pornography o the society. Most of these pornographic sites are freely available online and at times it gets to the people below 18 years. It is very bad to introduce the young generation to sex industry at such an early age (Seese, 2008). The cyber criminals have eroded he essential cultural values of the society by selling pornographic pictures and videos through the internet. Although pornography is not a major issue in UAE, some countries such as the Great Britain and the United States have been adversely affected by cyber pornography.

The society has also been affected immensely regarding finances. It is evident that economic losses emerging from the cyber crimes have been on a tremendous rise. Money laundering and robbery of money through credit cards have resulted in enormous loss of money to the victims of cyber crimes. Most of the information of UAE citizens is stored electronically, and they are at risk of being compromised by cyber criminals (Easttom & Taylor, 2011). Criminals have been able to copy and steal this information over telecommunication lines thus leading to massive losses. Most people in the country have also embraced the internet to do online shopping, communication, banking and paying off bills thus making them vulnerable to cyber criminals. Governments and international stakeholders have also spent a substantial amount of time and resources in research to counter the increasing cases of crimes. As the cases of cyber crime increases and technological advances continue, most, federal governments continue losing substantial amount from their economies.  For instance, the FBI report of 2013 claimed that the economy of United States lost over $525.5 million to computer criminals. This has also been the case in UAE where most businesses in the country have also lost a substantial amount of money to such crimes.

Ethical issues

Increased cases of cyber crime have come along with several ethical considerations. Ethics is concerned with distinguishing the wrong and the right and also the bad from the good. As aforementioned, cyber crimes are illegal activities from computer users with the help of information technology. It is. Therefore, prudent understanding the ethical issues those computer professionals should embrace as they perform their daily duties. Computer systems should have adequate security features to ensure that the information stored is protected from unauthorized manipulation, distribution and or deletion (Reyes, 2007). Computer security is an important ethical consideration, and they should ensure all valuable information is accorded utmost protection. However, most of the cyber crimes experienced in the modern society are a result of a violation of the computer security.

One of the major ethical issues involved in cyber crime is identity theft that has been on the rise. This is a form of criminal activity where criminals use the Internet to steal personal information from other users. Most criminals get this information through hacking and, as a result, people end up losing essential information to unauthorized people (Santanam, Sethumadhavan & Virendra, 2011). Hackers are highly skilled computer users who use their computer knowledge to make others suffer. It is, however, wise to note that some hacking is done by some security professionals with good intention. Such kind of hacking has no ethical issues. Nevertheless, distinguishing between the two types of hacking has been the greatest social challenge of computer security.

Another ethical issue related to computer security and information technology is the issue of intellectual property rights. This is both an ethical and economic concern especially in the modern dynamic and complex world. Some people incur heavy costs in the first production, but cyber crime has made it easy to reproduce and distribute such contents.  Information technology has made it difficult to safeguard online content as compared to physical property. Additionally, the individuals’ privacy is also endangered by the increased advances in information security. Information technology has enabled easier data mining and matching thus putting people’s security at stake. In essence, the major ethical issues in information technology and computer security are internet use and the privacy of persons.

Conclusion

Cyber crime is real and a global issue that has affected businesses, individuals and even governments in UAE and other parts of the world. It is, therefore, prudent that every person should be proactive to deal with the menace.  The rate at which cyber crime is increasing has made cyber security a shared responsibility where each one of us has a role in making information technology safer and more resilient (Cohen, 2012). Although there have been defense structures that the government of UAE has put in place, there is still a lot to be done. It is imperative that the UAE government must interact with other federal states to fight the vice. It is also prudent to have increased campaign to sensitize the public to the existence of such crimes and importance of protecting one’s information (Reyes, 2007). Ethical issues surrounding this topic should also be adequately addressed especially in matters pertaining individuals privacy that has been put at stake by the modern information systems.

 

References

Cohen, E. (2012). Issues in informing science and information technology. Santa Rosa (California): Informing Science Press.

Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, Mass.: Course Technology PTR/Cengage Learning.

Reyes, A. (2007). Cyber crime investigations. Rockland, MA: Syngress Pub.

Santanam, R., Sethumadhavan, M., & Virendra, M. (2011). Cyber security, cyber crime and cyber forensics. Hershey, PA: Information Science Reference.

Seese, D. (2008). Handbook on Information Technology in Finance. Dordrecht: Springer-Verlag.

 

Do you need an Original High Quality Academic Custom Essay?