The Evolution of Cybercrime LawManal AlSaif, Michael MarksMPTM663- Cyber Threats and VulnerabilitiesMPTM660- IT Security Compliance/Forensic AnalysisSpring 20141.0 Infrastructure and ServicesOne of the rapidly evolving areas of cybercrime development technical infrastructure is the Internet (Yang, 2007). The public is increasingly trending towards digitalisation and information and communication technologies are currently omnipresent. Nowadays we increasingly see devices integrated into computer technology, this can be relied on the high demand for Internet and computing connectivity (BBC NEWS, 2005). Furthermore, a huge number of modern services are based on the use of information and communication technologies, such as: transport infrastructure, military services and logistics, and electricity supply (Bohn, Coroama, Langheinrich, Mattern and Rohs, 2004). The increasing availability of wireless communications technologies, combined with the abundance of $200 computer systems, is poised to positively influence the number of Internet and technology users in developing countries. However, a change is needed in the development of new technologies, in order to target developing countries, instead of focusing on the demands of Western countries. The expected impact is greater than implementing basic IT infrastructure. The creation, availability and use of network-based services are all examples of the development that information and communication technologies can initiate (Shaping Europe's Future Through ICT, 2006). Remote and rural areas can benefit greatly from the existence of e-government applications, as they represent an accessible and dynamic channel for providing services. Yet, in the middle of the document, the definitions of computer crime (United Nations, 2000). Strictly speaking, computer crime (cyber crime) is any event linked to illicit behavior carried out through electronic processes, which aim at the security of computer systems and the data processed by them. Furthermore, in the broad spectrum, computer crimes concern crimes committed using a computer system or network. An example of this is the illegal possession, offering or circulation of information through a computer system or network (Kumar, 2009).2.1 Typology of Cybercrime Establishing a typology or classification system for cybercrime is quite challenging , due to the wide range of crimes covered by cybercrime (Gordon & Ford, 2006). Furthermore, according to the approach of the Cybercrime Convention (Sofaer AD, 2001), crimes can be classified into four different categories:
tags