Singapore’s Cyber Crime Scene Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Jiow, a research scholar at the National University of Singapore, penned the article “Cyber Crime in Singapore: An Analysis of Regulation based on Lessig’s four Modalities of Constraint”. It was published in the International Journal of Cyber Criminology in 2013. The author has a Doctor of Philosophy Candidate, Communications and New Media. Besides, he started the cyber wellness initiative in Singapore, and he has written many journals on cybercrime.

His article deals with cybercrime in Singapore and the various modalities of fighting the issue. The author has put together valuable findings and arguments on cybercrime that targets members of the public who utilize the cyberspace. He gives the internet penetration rate in Singapore and points out that the country ranks among the highest places in terms of cybercrime. The author intends to discuss the methods used to deter cybercrime and access their effectiveness.

The significant cybercrime perpetrators in Singapore are the youths who are techno-savvy, and about 80% of the whole population has been the victim of cybercrime. The crime rates threaten the country’s social fabric, and therefore, it is essential to deal with the rising cybercrime incidents. The journal looks at the four modalities used to deter cybercrime.

The government uses law in fighting cybercrime such as legislation on territorial jurisdiction and collaborating with other countries in the fight. The other method is architecture or the affordability of technology. People can afford the internet, and accessibility is effortless.

Moreover, technological advancement makes it is straightforward to access materials on the cyberspace such as files. The market in the cyberspace has changed dynamics because people can buy movies or music cheaply compared to purchase physical copies. The other one is social norms that help to regulate people’s behavior in the cyberspace. The journal offers a significant approach to the reason why everyone needs to change how to utilize cyberspace and communication.

On the other hand, the information in the article relates to the book in various ways. They both break down the challenges of internet use about cybercrime. Jiow’s journal outlines how people commit cybercrime, just as the book does with high tech cyber crimes (Knetzger & Muraski, 2008).). The great use of the internet in Singapore makes most users vulnerable to cyber crimes such as hacking and seeks to educate people to understand cybercrime and the various ways for its prevention.

Similarly, the book addresses cybercrime and its increment among internet users and advises on how to avoid becoming victims. Jiow’s main interest is to eradicate cybercrime by highlighting the causes of cybercrime and the means to educate the users. Above all, both articles highlight various challenges in the attempt to regulate users’ behaviors in cyberspace.

The information in the journal relates to the text because it talks about the multiple ways that can be used to contain cybercrime and shows the challenges of each approach. Moreover, the article and the text relate because they seek to educate potential victims about cyberspace wellness.

The strengths of the article are evident because the author has authority in the subject of cybercrime as depicted by his extensive knowledge and skills significant for embracing the intricacies of the ever-changing cyberspace. He also takes time to illustrate the complexities of cybercrime through a systematic process. It is evident in the crucial subtopics and chapters that he breaks down impeccably.

In his assessment on Singapore’s Cyber Crime Scene, he breaks down the intricacies of hacking in the most prevalent nation, Singapore. He delves into theories and practices of cybercrime in a way that helps the reader improve their understanding of hacking by evaluating modern transformations in lifestyles, demographic factors, traditions and practices in Singapore (Jiow, 2013).

The article passes the message to its audience well as it starts from basics to complex issues in cybercrime. Furthermore, the author defines words making it easy for a reader to understand and follow the article.

On the contrary, the article fails to address crucial aspects of cybercrime. For instance, the author fails to highlight the financial intricacies of managing cybercrime in developed and developing nations. The author does not elaborate in detail about the function of the police in managing cybercrime. The police function is to enforce the law, and since the cybercrime falls under illegal activities, the role of the police needs to be given a priority when assessing cybercrime.

It is also evident that the author attempts to make use of secondary sources in identifying the causes and effects of cybercrime in Singapore. This is a limiting factor, considering that the author indicates that it is challenging to obtain valid data of cybercrime on the web. This shows that valuable data lacks in the research and somehow decreases the objectivity of the study. However, it gives crucial information on the deterrent of cybercrime.

References

Jiow, H. (2013). Cyber Crime in Singapore: An Analysis of Regulation based on Lessig’s four Modalities of Constraint. International Journal of Cyber Criminology, 35 (7), 7-14.

Knetzger, M. & Muraski, J. (2008). Investigating High Tech Crime. California: Pearson

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, May 8). Singapore's Cyber Crime Scene. https://ivypanda.com/essays/cybercrime-in-singapore/

Work Cited

"Singapore's Cyber Crime Scene." IvyPanda, 8 May 2020, ivypanda.com/essays/cybercrime-in-singapore/.

References

IvyPanda. (2020) 'Singapore's Cyber Crime Scene'. 8 May.

References

IvyPanda. 2020. "Singapore's Cyber Crime Scene." May 8, 2020. https://ivypanda.com/essays/cybercrime-in-singapore/.

1. IvyPanda. "Singapore's Cyber Crime Scene." May 8, 2020. https://ivypanda.com/essays/cybercrime-in-singapore/.


Bibliography


IvyPanda. "Singapore's Cyber Crime Scene." May 8, 2020. https://ivypanda.com/essays/cybercrime-in-singapore/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1