The Changing New Face of the Concept of Crime in the Digital Age: Cyber Crime

The Changing New Face of the Concept of Crime in the Digital Age: Cyber Crime

Arzu Yıldırım
Copyright: © 2023 |Pages: 13
DOI: 10.4018/978-1-6684-6741-1.ch017
(Individual Chapters)
No Current Special Offers


Cybercrime has become one of the most important problems of not only individuals but also countries and institutions. Today, it is known that crimes on this subject have increased with the widespread use of computers, the increase in virtual jobs, and the emergence of working from home. Therefore, the aim of the study is to raise awareness about cybercrime. After the conceptual framework of cybercrime that will be faced by societies that have become a digital society is created, suggestions are developed to combat cybercrime.
Chapter Preview


The inclusion of technology and the internet in the daily lives of individuals can be considered very new when compared to the history of humanity. However, technological developments have progressed at a dizzying pace, and the contributions of technology have succeeded in acquiring an indispensable place in almost every aspect of individuals' lives at the point we have reached today. The fact that many information systems such as computers, mobile phones, tablets, smart goods make the daily lives of individuals significantly easier today, has made them an inseparable part of daily life. The fact that almost everything from the mobile phone alarms that wake them up in the morning to the smart items they use during the day, from their computers to the tablets they read at night, is internet-based, has caused individuals to be completely connected to technology. The fact that technological developments affect the daily lives of individuals so much has also significantly changed the traditional socialization areas of individuals. Previously, socialization took place in the form of face-to-face interaction at homes, workplaces, schools, streets, public transportation vehicles, and places such as cafes. Socializations nowadays, especially the internet and Facebook, Twitter, Instagram etc. With the spread of social media environments, it has left its place to socializations that take place in the cyber world and are not face-to-face in the traditional sense. Today, individuals have become actors not only in the real world, but also in the cyber world with the emergence of the cyber world as a different space from the real world for the interaction of individuals and societies (Yılmaz, 2018: 1).

The use of technology in daily life is no longer a matter of convenience and preference, but has become a necessity. The integration of life with the internet has not only connected people to technology more, but also caused more personal information to take place in this environment. The increasing use of information in the virtual space has brought people to the same level of danger. Similarly, many public institutions and services are in danger, from confidential information in public institutions' databases to power plants, water distribution networks and communication networks. The threat in the cyber field, the abundance of dangers and how big their consequences can be, has become an undeniable reality (Küçükvardar, 2018: 8).

Today, where information is an important asset, it is undesirable for the company's internal and external information to fall into the hands of other people. Security is one of the most important elements that businesses should pay attention to when establishing their information and communication technology infrastructure. Cyber ​​attacks and deficiencies caused by the user can be considered as important topics in the formation of security problems. Researches conducted in recent years show that businesses have high monetary losses as a result of cyber attacks. Various studies are carried out in order to reduce monetary losses and prevent important information from falling into the hands of unwanted persons. Establishing a cyber incident response team and implementing smart verification systems are some of these measures. It is argued that cyber security risks may cause problems for businesses, countries and the global economy in the coming years (Çetin et al., 2015: 224).

Although the possibility of a 3rd World War with artillery, rifles and tanks in the 21st century we live in is very remote, it can be said that cybercrime and cyber attacks will be the most important problem of this century. They have become targets of cyber attacks; national information systems of highly developed countries, private sector, public institutions, banks and large companies. Financial loss was caused by methods such as crashing computer systems, emptying bank accounts, erasing taxes, forgery, fraud and threats. In general, cyber crimes have common features. Reasons for committing such crimes; It is the use of computer systems and technologies, the incomplete and inadequate legal regulations, the very low risk of being caught, and the silence of those who suffer damage (large companies and businesses) due to the fear of losing reputation and prestige (Yılmaz, 2014: 2).

Key Terms in this Chapter

Digital Culture: It is the habits acquired as a result of the innovations brought by the period we live in and the technology taking more place in daily life, it is a way of life.

Digital Age: The use of new technology, tools, and equipment instead of the old method, tools or information describes the highest point of using information and technology.

Technology: It is the tools, methods, and processes as well as the knowledge and manners that people use to make their lives easier.

Cyber Crime: It is a type of crime that is committed by using technological and informatics tools, unlike classical crime types. It covers the total harm to countries, nations, communities, people, institutions, and individuals by exploiting security vulnerabilities by using information systems.

Virtual Environment: They are unreal environments that people use with the help of the internet. We cannot touch and feel virtual environments concretely. It is not possible to create a virtual environment without the internet.

Complete Chapter List

Search this Book: