Cybersecurity is an emerging challenge in the world because the cyberspace is prone to attacks by cybercriminals. The internet must be regulated to control the flow of information. The unregulated computer network has the potential to compromise legal systems, erode community values, and stifle activity on the World Wide Web. Crimes of global repercussions are committed through the virtual world. The freedom in the cyberspace perpetuates terrorism, child pornography, and human trafficking. The rate of unlawful activities can be controlled through the formulation of regulations, implementation of crime prevention strategies, information technology security training and awareness, and stipulation of criminal justice policies.
What might be some of your thoughts on Lessing’s framework?
The internet is dynamic, and it is evolving each day because cyberspace is characterized by architecture. Anyone can access the virtual world, making it difficult to control the World Wide Web. Young children can access pornographic information because there are constraints that prevent them from entering a porn shop in the real world. However, in cyberspace, it is can be challenging to identify young children and an adult internet user. Hence, it is difficult for the government to regulate the internet based on architecture.
What might he mean as he gives us his views on Law, Norms, the Market, and Code?
Lessing (2009) explains that to protect the internet, action should be taken to uphold the values of the society. He describes laws that safeguard the natural world and cyberspace. Architecture can be used as a regulator in the World Wide Web. Developmental regulation involves password requirements to gain access to sites. Such measures protect minors from accessing the information that is not meant for young children. Lessing explains that the marketplace could regulate cyberspace through the price of the products available to internet users. The market restricts access to those people willing to pay. The government can set laws that control the information and content available on the internet. Legal action should be taken to those who break the stipulated rules. Norms govern how people conduct themselves while individuals should practice etiquette. Regulating the content on the internet controls the behavior of individuals and governments.
How do we get people to get serious about IT security and its risks to societal ethics, crime, privacy, disinformation, critical infrastructures, etc.?
People should be aware of the risks associated with the use of information technology. Individuals using the computer network are at high risk of being victims of cybercrime. Many persons are not aware of the perils associated with the use of cyberspace. Hence, security education, awareness, and training are the main approaches to giving the public information on different threats related to the use of the internet. The strategies help in building knowledge in individuals on the functionality of the virtual world. Everyone should be trained on data safety and how to protect themselves in cyberspace. Information security training and awareness increase organizational resistance to cyber-attacks and decrease safety breaches.
How would you describe a successful hypothetical future career role in IT Security Crime Prevention as it relates to Criminal Justice?
Career roles in IT security crime prevention and criminal justice are becoming marketable jobs worldwide. Future successful criminal preventions specialists should have the ability to analyze misconduct statistics, deliver safety programs to the public, educate others on crime prevention strategies, discourage teenagers from engaging in criminal activities, and develop the plan of preventing illegal activities. Future crime prevention specialists should work closely with the police departments in formulating safe security systems and policies that help in combating crime.
Explain the difference between Target Hardening practices and those intended to increase guardianship, and give two (2) examples of specific actions that would be taken in each approach. How might Target Hardening interlace with Situational Crime Prevention?
Crime prevention strategies need to be implemented to control the risk of criminality. Targeting hardening is one of the approaches to criminal activity reduction. It involves restricting access to the property. Examples of target hardening include the installation of security doors and deadbolts. Guardianship is a situation whereby the employees, the employers, and other members of the public watch over properties. An example of guardianship is the installation of surveillance cameras in the business premises (“Criminal theory,” 2018). Target hardening and guardianship can be used together in crime prevention. The surveillance cameras can expose the criminals and alert the security staff in an organization while the security doors can prevent the criminals from escaping when caught in unlawful acts.
Describe in sufficient basic detail, three criminal justice practices or policies that have inconclusive evidence of effectiveness.
Many criminal justice policies lack evidence regarding their effectiveness in punishing offenders. The first policy is the reduction of crime through capital punishment. The plan fails to provide proof of the efficacy of capital punishment on homicides since it does not show whether it increases or reduces murder rates. The second policy is the three-strike laws. The rule stipulates harsh punishment on offenders to reduce their potential involvement in criminal activities. The rules have not provided any evidence that they reduce the crime rate. The third policy is gun control, which provides strict punishment for gun-related criminal activities. The penalties include a longer prison sentence for firearm crime and the banning of ownership. There is insufficient evidence that shows the effectiveness of gun policies since gun-related violence is still on the rise. The gun laws are ineffective since many criminals are not legal gun holders (Elliott & Fagan 2017). Criminal policies are set by the government to reduce crime rates, but the effectiveness of the systems on criminals depends on the degree of punishment.
References
Criminological Theory and Loss Prevention. (2018, October 23). Retrieved from https://losspreventionmedia.com/criminological-theory-loss-prevention/
Elliott, D. S., & Fagan, A. A. (2017). The prevention of crime. Chichester, West Sussex: Wiley Blackwell.
Lessig, L. (2009). Code: And other laws of cyberspace. ReadHowYouWant.com Ltd.