Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Jiow, a research scholar at the National University of Singapore, penned the article “Cyber Crime in Singapore: An Analysis of Regulation based on Lessig’s four Modalities of Constraint”. It was published in the International Journal of Cyber Criminology in 2013. The author has a Doctor of Philosophy Candidate, Communications and New Media. Besides, he started the cyber wellness initiative in Singapore, and he has written many journals on cybercrime.
His article deals with cybercrime in Singapore and the various modalities of fighting the issue. The author has put together valuable findings and arguments on cybercrime that targets members of the public who utilize the cyberspace. He gives the internet penetration rate in Singapore and points out that the country ranks among the highest places in terms of cybercrime. The author intends to discuss the methods used to deter cybercrime and access their effectiveness.
The significant cybercrime perpetrators in Singapore are the youths who are techno-savvy, and about 80% of the whole population has been the victim of cybercrime. The crime rates threaten the country’s social fabric, and therefore, it is essential to deal with the rising cybercrime incidents. The journal looks at the four modalities used to deter cybercrime.
The government uses law in fighting cybercrime such as legislation on territorial jurisdiction and collaborating with other countries in the fight. The other method is architecture or the affordability of technology. People can afford the internet, and accessibility is effortless.
Moreover, technological advancement makes it is straightforward to access materials on the cyberspace such as files. The market in the cyberspace has changed dynamics because people can buy movies or music cheaply compared to purchase physical copies. The other one is social norms that help to regulate people’s behavior in the cyberspace. The journal offers a significant approach to the reason why everyone needs to change how to utilize cyberspace and communication.
On the other hand, the information in the article relates to the book in various ways. They both break down the challenges of internet use about cybercrime. Jiow’s journal outlines how people commit cybercrime, just as the book does with high tech cyber crimes (Knetzger & Muraski, 2008).). The great use of the internet in Singapore makes most users vulnerable to cyber crimes such as hacking and seeks to educate people to understand cybercrime and the various ways for its prevention.
Similarly, the book addresses cybercrime and its increment among internet users and advises on how to avoid becoming victims. Jiow’s main interest is to eradicate cybercrime by highlighting the causes of cybercrime and the means to educate the users. Above all, both articles highlight various challenges in the attempt to regulate users’ behaviors in cyberspace.
The information in the journal relates to the text because it talks about the multiple ways that can be used to contain cybercrime and shows the challenges of each approach. Moreover, the article and the text relate because they seek to educate potential victims about cyberspace wellness.
The strengths of the article are evident because the author has authority in the subject of cybercrime as depicted by his extensive knowledge and skills significant for embracing the intricacies of the ever-changing cyberspace. He also takes time to illustrate the complexities of cybercrime through a systematic process. It is evident in the crucial subtopics and chapters that he breaks down impeccably.
In his assessment on Singapore’s Cyber Crime Scene, he breaks down the intricacies of hacking in the most prevalent nation, Singapore. He delves into theories and practices of cybercrime in a way that helps the reader improve their understanding of hacking by evaluating modern transformations in lifestyles, demographic factors, traditions and practices in Singapore (Jiow, 2013).
The article passes the message to its audience well as it starts from basics to complex issues in cybercrime. Furthermore, the author defines words making it easy for a reader to understand and follow the article.
On the contrary, the article fails to address crucial aspects of cybercrime. For instance, the author fails to highlight the financial intricacies of managing cybercrime in developed and developing nations. The author does not elaborate in detail about the function of the police in managing cybercrime. The police function is to enforce the law, and since the cybercrime falls under illegal activities, the role of the police needs to be given a priority when assessing cybercrime.
It is also evident that the author attempts to make use of secondary sources in identifying the causes and effects of cybercrime in Singapore. This is a limiting factor, considering that the author indicates that it is challenging to obtain valid data of cybercrime on the web. This shows that valuable data lacks in the research and somehow decreases the objectivity of the study. However, it gives crucial information on the deterrent of cybercrime.
References
Jiow, H. (2013). Cyber Crime in Singapore: An Analysis of Regulation based on Lessig’s four Modalities of Constraint. International Journal of Cyber Criminology, 35 (7), 7-14.
Knetzger, M. & Muraski, J. (2008). Investigating High Tech Crime. California: Pearson
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.