Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes.Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyberwarfare.Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography, and child grooming.There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones".A variety of internet scams, many based on phishing and social engineering, target consumers and businesses.Government officials and information technology security specialists have documented a significant increase in Internet problems and server scans since early 2001.
Unlike crimes using the computer as a tool, these crimes require the technical knowledge of the perpetrators.Cyberterrorism in general can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983).As such, a simple propaganda piece in the Internet that there will be bomb attacks during the holidays can be considered cyberterrorism.There is no argument as to if cyber bullying is good or bad. I believe parents should fully acknowledge what websites their children are visiting and what they are posting.
Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
As such, as technology evolves, so too does the nature of the crime.