Abstract
This study investigates cyber crimes, and its impact on teenagers which has become a significant phenomenon within the last two decades. People become victims of fraud, defamation or harassment online everyday in all four corners of the world. This research focuses its attention specifically on the impact on teenagers who are active Internet users. A cross sectional interviews were conducted with School teachers, students and parents in order to collect data. The analysis of data and information whether the teenagers are more likely to be exposed to cyber crimes than older age groups and delves into what kinds of risk factors are associated with the exposure to cyber crime among teenagers. In fact, an exclusive research was conducted to find out relevant materials for the project from relevant books, newspaper articles, magazines, journals and websites for identifying issues, data processing and analysis. It also collected data of relevant cases occurred in United Kingdom, India and Sri Lanka in the recent past. The results show that teenagers are more likely to be victims of cyber crimes even when other factors were adjusted for. These findings highlight the significance of understanding both psychological risk factors, patterns of risky online behavior and draw the attention of law makers to impose strict regulations to fight against cyber crimes specifically against teenagers. To put into its context the objective of the report is based on the findings in this research analytically discuss the solutions for the contemporary issues.
1. Introduction
With the rapidly developing advanced technology, cyber crime is very familiar among almost all the people. Apparently there is no dissimilarity between conventional crimes and cyber crimes yet the only disparity being the mode in which the crime is committed. However, cyber crimes as well as conventional crimes include the behaviour whether act which leads to breach the rules of law in a society. Cyber crime can be defined as illegal activity committed on internet which harm the other individual or by large the society with the help of a computer and World Wide Web. There is no doubt with the advancement of networked technologies have paved the way for committing criminal activities in the internet and due to different factors, culprits are easily escaped without punishment. Individuals who are victimized are clueless even to lodge a complain – where to complain or what to complain. More cyber crime victims are among teenagers or other age group is irrelevant in broad perspective yet in this research attention is focused specially on the teenager victimization.
2. Enemy of Teenagers
Even though Internet has opened up wide gates for knowledge and information, it has now become the most dangerous enemy of teenagers and parents who have teenage children. Internet users are exploited with unlawful activities and this is the reason advanced ethnology is compared to a coin that is most beneficial thing also has two sides. Nevertheless it is stated that the advanced technology has made man’s life easier, faster and safe it has its own issues.
3. Defining Cyber Crimes
Various cyber crimes which are rampant in contemporary world can be defined as follows;
· Dissemination of obscene material
· Unlawful access over computer systems
· Nuisance via e-mails
· Illegal control over computer systems
· Intellectual Property crimes
· Internet time thefts
· Keeping unauthorized information
· Credit Card frauds
· Cyber terrorism
· Distribution of pirated software
· Pornography
· Indecent exposure
· Sending out virus
· Financial crimes
· Sale of illegal articles
· Online gambling
· Forgery
4. Recent Incidents
Cyber crimes have been increasing rapidly during the past few years at an alarming rate having an impact on teenagers. A number of internet related threats have been recorded during the past few years. The persons who indulge in these crimes have no borders and boundaries and culprits use different programs to access other peoples computers to gain financial data, usernames and passwords. Development of the computer technology is providing ample opportunities to the people whose motive is not purely genuine, criminals or criminal organizations to exploit people specially teenagers and commit crimes. This scenario has brought the cyber crimes to the global limelight.
5. International Corporation to fight against Cyber Crimes
Attorney General of United States of America, Eric Holder emphasizing that no nation or government can combat cyber crimes alone, had urged international cooperation in developing a global move towards to fight against variety of Internet and technology support crimes. This statement displays the widespread disillusionment over the cyber crimes and leaders of the world have realized that the whip is not cracked hard enough, chances are that the perpetrators of these crimes will continue their work unhindered and unconcerned.
6. Fight Against Cyber Crimes in UK
The British government has introduced new programs to fight against cyber crimes which are Cyber Crime Reduction Partnership (CCRP). The program will provide a new forum in which U.K. law enforcement officials, the computer industry officials and other officials can regularly get together to plan against cyber crimes effectively. Home Office Security Minister James Brokenshire had stated at a cyber security briefing hosted by the British Computer Society, the Chartered Institute for IT. He states as follows;
“‘For too long the public’s perception of cyber crimes has been a lone bedroom hacker stealing money ,” said Brokenshire, “but the reality is that cyber criminals are organized and global, with a new breed of criminals selling ‘off-the-shelf’ software to aid gangs in exploiting the public.”
Therefore, the partnership led by Brokenshire and Minister David Willetts, under him the country’s Universities and Science department and their focus will be to assist “ensure police and other law enforcement agencies can stay one step ahead of online criminals.” As per Brokenshire, the CCRP will soon be joined by several extra initiatives, a Cyber Security Information Sharing Partnership to share information between industry and government, a National Computer Emergency Team and a National Cyber Crime Unit within the NCA (National Crime Agency). As per Minister Brokenshire, the objective of this multitude of cyber security method is to deepen the country’s ability to fight against cyber crimes. “By better awareness and action from the public and industry and through continuing to work closely with our international associates, we can deliver a lasting and transformative impact on those criminals that seek to use the economy to damage the U.K. and its interests.”
7. In Sri Lanka
In Sri Lanka Internet Crime Complaint Centre (IC3) has been instituted at Police Headquarters with the collaboration of Criminal Investigation Department & Information Technology Division to receive and investigate criminal complaints in the rapidly expanding arena of cyber crimes in Sri Lanka such as lottery scams, internet auction frauds, Passive Residual Income scams, Sending counterfeit checks, Work at home scams, Multi Level marketing and Pyramid schemes, Property Investment Schemes etc.
Specially some teenagers who are unemployed in Sri Lanka fall prey to scams such as Work-at-home and business opportunity scams for which often wide publicity is given over the television channels, internet as well as in newspapers. Some teenagers who are studying, think they can earn extra income by participating in these schemes in order to ease the burden of their parents. After the would be applicant applies, they are asked for money up front to make payment for resources and, after paying, they hear nothing back. Another scam is, people are asked to invest in a business that has no chances of success, get rich scheme and websites, “make money in your spare time” schemes etc.. They deceive people saying it is easy once they get their free book or CD and learn their secrets. These websites are themselves scams, claiming to offer teenagers a good deal, when at best, their products are worthless, they have no real secrets at all and they cheat the teenagers and make their coppers expand fraudulently.
8. Origin of Cyber Crimes
Cyber Crimes were originated with the dependence on computers and increased with the advancement of technology in modern way of living. Everything is being run on computers at this age and intermittently cyber crimes also growing phenomena.
9. Financial Crimes
Financial crimes are included in cyber crimes and this can be defined as cheating, credit card frauds and money laundering etc.. Posting information on auction websites and bulletin boards and with e-mail communication illegal items are transacted via internet. There are thousands of websites which offer online gambling. It is believed that many of such websites are actually in money laundering. Cyber crimes included, piracy of software, infringement of copyright , violations of trademarks, computer codes theft etc., and they are categorized as intellectual property crimes.
10. Recent Incident
In a recent incident occurred in USA a teenager had made millions of dollars by circulating malicious information about a company. Nasty messages were spread by sending emails supposedly by reputed news agencies. Value of shares of the company came down drastically and affected thousands of shareholders, it is reported. Even after the truth was known, value of the shares did not return back to the earlier level. This is a clear example of what a damage can be done by an individual who has ulterior motive with a computer and internet access.
11. Forgery
Using sophisticated computers counterfeit currency notes, postage and other documents can be forged and this is also a crime in serious nature against the governments.
12. Counterfeit Certificates
Another scam is it is advertised in websites and also via emails Educational institutions are offering Degrees, Diplomas and other educational certificates for money. Today this has become a lucrative business selling authentic looking bogus certificates.
13. Defamatory Information
A person can publish defamatory information about someone on a website or sending thousands of e-mails against another person. It may be done purposely to take revenge from a person or just for a laugh. When the truth is come to light it has caused immense damage to the person concerned and this can also be defined as a cyber crime of serious nature and sometimes person who is doing this type of crimes do not understand the seriousness of the crime.
14. Involvement of Teenagers
It is a known truth that teenagers these days knows lot about computers and these teenagers also commit cyber crimes even without realizing the gravity of the situation they create with their work. It seems really difficult to believe but it is true that most amateur hackers and cyber criminals are teenagers. To them, who have just begun to learn and understand it is a pride to have hacked into a website to boast about the act with friends to be smart among them. These teenagers also may be committing cyber crimes without really knowing what they are doing.
15. Sabotage
Disgruntled worker can do harm to their employer by committing computer related crimes which can bring the company computer system to a standstill. Due to computerization, business organizations storing all their information in computers. Rival company hackers can steal industrial secrets and confidential data.
16. Confidential Data
It is easier to steal national secrets from military computers and as a result a national security might be at risk. Thousands of pages written or typed document can be saved a in a CD or in a USB pen and also can be transmitted via e-mail. As a result it is very difficult for companies or other organizations to protect their confidential data. One treacherous employee can send them to anywhere for money or other privileges or to take revenge via e-mail. No longer with security guards these organization cannot protect their trade secrets and more sophisticated methods are required to be introduced as smart as the fraudsters.
17. United Effort
It is a human error that most people do not understand the security implications of a simple guessable password and a Cyber criminal can do an immense damage with it. Each year numerous individuals including teenagers become victims of cyber crimes and many cases are not complained, reported or recorded. European countries are still not reached to consensus on laws necessary to tackle the issue. The problem is to a certain extent the real cyber crimes are unknown and person who victimized bear the damage personally. However, in the recent past lot of progress has been made in addressing these issues. Most of the people have realized the necessity of a united effort to tackle crimes over the internet.
18. Wage war against Cyber Crimes
United Kingdom has opened a Cyber Crime Center to wage war against shocking number of attacks and project follows an European Union plan which emphasize companies to disclose hacked data potentially damaging reputation of companies and reduction of share prices. This program will merge data from the Government communication headquarters , the Police and various companies. The objective behind this program is to coordinate and take prompt action to cyber attacks in United Kingdom. Cyber Security Information Partnership will contribute data among government and companies to collect more complete picture of the attacks being carried out.
19. Incident
In an another Cyber Crime Unit of London Police got the information from the National Child Exploitation Coordination Centre that uploading child pornography to a website over the past year. Search warrant was executed and through investigation identified two child victims. After the investigations Crime Unit charged a 25 years old man for production and possession of child pornography. However, charges could not be proven due to lack of strict regulations.
20. Covering the Identity
Online committing crimes allows a person to cover his or her identity and location has resulted the spread of cyber crimes speedily. It also can target a person directly through emails, viruses or hacking into computers. Victim can feel facing a powerful but invisible attacker and powerless to defend himself or herself even though the person may be a computer literate.
21. Cyber Bullying
Cyber bullying is a way of doing lasting harm and victims are mostly teenagers. Apparently cyber bullying is a serious problem among teens and awareness about this crime among adults are not much. Teenagers as well as adults should be aware of cyber bullying and it can be helpful to eradicate this crime.
· Pilfering to a person’s account and sending disastrous messages
· Pretending someone else online and hurting another.
· Sending threats to email inbox of a person
· Spreading rumours over the internet.
· Sending messages of threats to social networking sites.
· Taking unpleasant picture of a person and sending them to others.
· Taking pictures of a person and disfiguring it and sending it to others.
· Disseminating sexually indicative pictures or messages about a person
This is extremely disastrous specially to teenagers and it can cause anxiety and even victimized person can commit suicide. Once a information or picture is disseminated in the internet it cannot be removed or reversed. People who are doing these things sometime do them to take revenge from the other person or sometimes as a joke but they do not realize the consequences and even the person who did it cannot reverse it later. People who are engaged in this type of bullying face legal action and in the event the work is on sexual nature or involved with sex can that person may be registered as a sex offender. People who carry out this type of things think they do it in a fake name and they will not get caught, yet there are many ways to track them.
22. Teenage Girls and Cyber Bullying
Most of the teenagers do not tell their parents when this type of harassment happens and only a few has been reported to law enforcement. It is also reported that teenage girls are more likely to be involved in cyber bullying. A teenage girl’s face is taken and merged with a nude body of another female and disseminating and this is a crime of very serious nature. Victim can prove her innocence to people who are familiar with the internet and not to others.
23. Online Gambling
People have only begun to understand the seriousness of the problem of recent growth in gambling among teenagers all over the world. The gambling industry is expanding with the continuous rise with the help of internet. More gambling opportunities are available today than ever before and this has become a serious menace in the society today even though most people are not aware of it. In the past to do gambling a person has to go to a casino club or location maintained for this purpose. At least such places are paying taxes to the government and teenagers are fearful to visit such places as anybody sees that person will be branded as a gambler. Now anybody can do gambling leisurely at home what is required is a computer, internet access and a credit card. Authorities must realize the seriousness of the gambling problem via internet and its specific impact on teenagers in the society and drastic measures are necessary to address the gambling problem in an effective manner.
24. Drug Trafficking
It is stated that drug traffickers are more and more taking the advantage of the internet technology to sell their drugs and expanding sales of drugs. This is also an area which affect the teenagers in indirect way and another problem of serious nature at contemporary times.
25. Responsibility of the Society
Everybody has a duty in the fight against cyber crimes to be alert and protect their computers and report to the relevant authorities immediately such incidents and if the law enforcement taking strict and prompt action this type of harassment to people can be avoided or reduced substantially.
26. Safe Internet
The impact and influence of the internet on teenagers over the past years have been immense and according to statistics in networked society has expanded in the range of information available to individuals and change the manner in which communicate with each other and however, negative side is the involvement of criminals. The potential of the internet to make it easy for criminal activities is matter of grave concern. In order to access information and communicate with others the internet has created a naval and speedy way and it has contributed to boost of business and commerce all over the world. It is the responsibility of governments and authorities of all countries to protect it from unscrupulous elements such as criminals and fraudsters and make it a safe place especially for teenagers.
27. Victim Support in UK
When a cyber attack took place best option for a teenager is to talk to “Victim support” in UK free of charge. Victim support is an independent charity for victims of cyber crimes in England and Wales. It has trained volunteers to offer services and work closely with the police and judicial systems. Most victims of cyber crimes need to talk to someone about the incident and these volunteers are trained to listen and understand and give useful information in order to deal with the situation.
28. Cyber Crime Expenses in UK
Researchers and Cyber intelligence experts state that online internet criminal markets are providing incredibly sophisticated tools for the purpose of cyber attacks to cyber criminals and they are having tools such as Zeus and SpyEye .The average expenses of cyber crimes for 38 companies in the United Kingdom is £ 2.1 millions per year according to a study.
29. Threat Report of GFI
GFI software security firm had issued a threat report and in it states that cyber criminals were targeting Skype, Facebook and Windows utilizing manifold black hole exploits in October 2012. A large amount of Black hole exploits were found by researchers pretending as Windows licenses, face book accounts verifications emails , voicemail notification of Skype and also spam messages.
30. Underground Cyber Crime Market
In 2012 month of November a hacker offered a zero day exploit for US$ 700 and it was possible for attack to use a cross site scripting (XSS) in order to steal cookies and accounts hijacking. This hacker was identified as “The Hell” created a video to utilize in Darkode a underground cyber crime market.
31. Buying and Selling Credit Card Data
Six people in United Kingdom and twelve persons in United States of America were arrested in FBI- led sting operation in June 2012 and detected 24 credit cards data sting . These cyber criminals were from 13 countries. This was possible after an investigation by the FBI and tracked people who are buying and selling credit card data through a false online website.
32. Web application attack report by FireHost
Analysis of 15 million cyber attacks in the end of 2012 discovered that Cross site scripting (XSS ) was the top menace to web applications, websites and data bases. Further attack are directory traversals, SQL injections (SQLi) and cross site request forgery ( CSRF ) as per web application attack report by FireHost.
33. AT&T
Telecommunications Company AT& T states that (APTs) advanced persistent threats are real and companies are taking them critically. In 2012 Telecomminucation company had set up an IT security team for researching APTs and to find out how to defend against APTs.
34. Stealing Passwords
Over 450 000 passwords were stolen from one of the sites as a result a yahoo user sued the web portal company on the ground of negligence.
35. Nasa
Another remarkable incident is loss of a laptop containing personal data of more than ten thousand employees as well as contractors of Nasa the US space agency . This is recorded as latest data breaches involving laptops at Nasa.
36. Cyber Security Risk Report of HP
Cyber criminals are targeting web applications as per a Cyber Security Risks report issued by Hewlett Packard or well known as HP and this was reported in May 2012. This report further discloses cyber attacks on web applications were approximately 15 million in the year 2010 and in 2012 it is approximately 50 million and this is a sharp increase. As people are browsing the internet on daily basis they do not realize safety and security is not like earlier days. Actually internet criminals and scammers have become subtle and tricky and therefore scams and fraud are rampant and all must be alert specially including teenagers.
37. Statistics of Cyber Crimes
Backgroundcheck.org recently published statistics in relations with cyber crimes.
A. Complaints increased from 100,000 per year approximately to 300,000 per year from 2005 to 2009
B. It exceeds US$ 300 million a year loss value of complaints.
38. Complaint statistics
· Spam 8.6%
· FBI related scams 13.2%
· Identity Theft 14.4%
· Advance fee fraud 9.1%
· Miscellaneous fraud 9.8%
Males have become victims 25% more than females
39. Origin of Cyber crimes
§ 10.4% United Kingdom
§ 65.9% United States of America
§ China 3.1%
40. Cyber Crime Report – 2011
Cyber crime report issued by Norton for 2011 state that 431 million people worldwide are victims of internet crimes. US$ 114 billion is the total cost of those crimes. However, the statement is precise, it lacks complete date and scope of internet related crimes. The report primarily depend on business and voluntary self report incidents without verifying and it is necessary to find out the impact of cyber crimes on the individuals specially teenagers. In examining statistical data on cyber crimes special attention should be paid to what those statistics is not disclosing.
41. Second Annual cost of Crime study report
Study report OF Information Security Policy Research Centre based in USA and in this report states that cyber crimes amplified by 56% and companies cost average of US$ 6 million per year. This report has been prepared surveying 50 businesses in USA. Questionnaires had been sent to companies and data collected and report has been compiled. However, fact should be considered that companies are reluctant to give exact details as it may loss confidence of consumers or they can be held responsible or accountable by the shareholders. So these data cannot be 100% accurate and cannot be trusted as accurate. Cyber criminals have sophisticated tools to do major damages and in this report there is no special attention has been focussed on the impact of teenagers of cyber crimes.
42. Statistics
Statistics published by the UK Government in 2011 cost of cyber crime in UK economy is £ 27 billion per year and however, real cost may be much more than that.
· Business – 21 billion
· Government 2.2 billion
· Citizens 3.1 billion
In this there is no percentage of teenagers involved but included under citizens. Most of organizations, citizens as well as teenagers are reluctant to admit that they had been the victims for fear of damaging their good name or reputation of the organization. This is a major problem in tackling the issue and also it had made difficult to prepare accurate estimates of cyber crimes.
43. Incidents of Cyber crimes
I. Major cyber intrusion had occurred involving the Defense Research and Development of Canada a research agency of Department of National Defense Finance and the Treasury Board in January 2011 and the intrusion force them to disconnect from the internet.
II. It was reported in March 2011 hackers entered computer networks of French Government in finding data on upcoming meeting of G-20
III. As per South Korean Government information hackers had entered into its defense networks to steal data on American made Global Hawkunmanned aircraft .
IV. Spain’s National Police Technological investigation Brigade with Europol and Interpol dismantled ring of cyber criminals accountable for Police Virus which affected Microsoft, Apple, Facebook and Twitter.
V. Twitter published an article on 1st February 2011 regarding information on how the social network had fallen victim to attack to gain access to data of some 250,000 users of Twitter. After two weeks Face book also acknowledged that their system had been targeted by attack. After several days Apple announced it had also been targeted and finally Microsoft also acknowledged attack. This shows the challenge before authorities.
44. Coordination
The European Commission commenced the European Cyber Crime Center to assist member countries against cyber criminals in January 2011. Also in the same month FBI issued information of an inquiry started in the year 2010 and disturbed cyber criminals who had since 2005 infected million of computers. This process was significant because it carried out with security forces of several countries. Police of UK, Switzerland, Finland, Germany, Holland, Romania and Moldavia supported in this exercise to FBI it is reported.
45.Responsibility of Protecting data
It is necessary to alert the internet users specially teenagers the significance of protecting data in computers. Sony computer Entertainment of UK Division was ordered to make the payment of £ 250,000 for the theft of data in 2011 as lack of measures that company had achieved in order to protect customer data. This has drawn attention of all internet users that it is their responsibility to protect data in computers.
46. Research Report of NIH – US
Teenagers who are targeted of cyber bullying are at greater risk of depression according to survey conducted by researchers of National Institute of Health in United States. Physical violence, verbal taunts are traditional forms of bullying while cyber bullying involves aggressive behaviour communicated over a computer and cyber victims may not identify their harasser as a result victims are more depressed according to the research.
47. UK Approach on Cyber Crimes
Government of United Kingdom has introduced legislations to tackle the issue of cyber crimes allowing Police to track IP addresses of computers. It is expected to protect the people who are using internet and assist the investigation of cyber crimes. Earlier Police had no powers to investigate on IP addresses of individuals. However, these IP addresses are sometimes shared among several people. As such, to know the exact individual who sent an email or involved person in any other internet usage Police should know who used the certain IP address at a given time. UK Government believes giving powers to Police, law enforcement and intelligence agencies to get these data will assist to defend the public as well as to safeguard national security. This new approach came after Communications Data bill was vetoed.
48. Sri Lanka approach on Cyber Crimes
Computer crime Act has been passed in Parliament of Sri Lanka and as per the Act obtaining unauthorized access to a computer or network , hacking and modifications offences under national security, dealing and interception of data unauthorized disclosure of information are offences defined under the Act. Provisions of investigations shall be carried out and dealt with provisions of the Code of Criminal Procedure Act No. 19 of 1979 or Computer Crime Act ( S.15). The Act states experts are called upon to assist the police officers if the necessity arises.
49. Suggestions and solutions
In the above paragraphs cyber crimes were discussed in details while focusing attention on key issues analyzing the approaches in order to tackle the issues in United Kingdom and Sri Lanka as well as taking into consideration prevailing laws in United Kingdom and Sri Lanka. In this exercise reference were made to websites, articles from journals and newspapers, books, law reports etc and following suggestions can be made in order to eradicate cyber crimes and make internet a safe place for the benefit of general public. Internet security is a shared responsibility and everybody in the society has a role to play and Cyber Security awareness programs must be organized regularly and following areas must be emphasized on such programs.
a. In order to block all unwanted messages it is necessary to turn on spam blocker.
b. Each computer must be protected with a powerful antivirus software and making sure that regularly update the software
c. Once a week scanning the computer to locate and remove malware, viruses , spyware in computer
d. Firewall protection feature which prevents hackers getting into the computer system and always necessary to keep it turned on.
e. Utilization of Encryption software which garbles data to anyone who hack into the system
f. Not to post confidential information such as name, account numbers , addresses, photographs in websites.
g. Do shopping only on secure website with url starts with http and/or a Trusted website.
h. Avoid posting credit card numbers in websites.
i. Do not fall Frey to any scams such as foreign lotteries, phony sweepstakes and similar methods to get personal information of internet users.
j. Teenager’s online activity should be thoroughly monitored.
k. It is better to have parental control software which limits the websites user can gain access
In boarder perspective following suggestions are made to eradicate cyber crimes.
1) Necessity has arisen to establish a association of all governments in the world such as United Nations to fight against the cyber crimes as this cannot be implemented by one country and need an united effort.
2) Cyber criminals can make attacks from all over the world catching them and therefore requires the coordination of all people in all countries.
3) To catch cyber criminals it is necessary to develop new technologies constantly and this should be a continuous process.
4) Governments should establish teams of professionals in the field to track down internet criminals.
5) Public must be given a easy to use complaint system in order to complain promptly when an incident occurs.
6) Specially people must be trained in the police or law enforcement to act on an incident of cyber attack.
7) Cyber Crimes Units must be established with the experts in the computer field to get assistance when requires.
8) Universities and colleges should conduct degrees in the field like cyber crimes in order to fill the gap of experienced professional in the field.
9) Meetings must be organized regularly with government officials, administrators and Information technology Managers of companies and organizations to protect their systems.
10) Public must be educated reporting cyber crimes and then they are not only helping to combat internet crimes such as any other crime.
11) Severe punishment and fines must be introduced by the governments to eradicate cyber crimes.
12)It is necessary to improve the practice of sharing of information in and between companies and industry sectors.
Conclusion
In this era of globalization Cyber Crime is a word all are familiar with and heard about. Any violation of law or act forbidden by law can be defined as a crime. Since from a long time man is associated with crime and criminality. Cyber crime is a new category of crimes came into existence with the advancement of science and technology. There are different strategies practices and laws to fight with crimes in different countries. Those are depend on the environment, background and nature of the offence etc. It can be concluded and emphasized that in order to eradicate cyber crimes and specifically to safeguard teenagers from cyber related crimes it is vital a united effort.
References
I. Catching cyber criminals – Viewed on 4th June 2013 – http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/catching.html
II. Computer Crime – Viewed on 6th June 2013 – https://en.wikipedia.org/wiki/Computer_crime
III. Csonka P. (2000) Internet Crime; the Draft council of Europe convention on cyber-crime: A response to the challenge of crime in the age of the internet? Computer Law & Security Report Vol.16 no.5.
IV. Defending Against Cyber Criminals – Viewed on 5th June 2013 https://www.dhs.gov/defending-against-cybercriminals
V. FBI – Cyber Crime – Viewed on 6th June 2013 http://www.fbi.gov/about-us/investigate/cyber
VI. Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. ISBN 978-1-60960-830-9
VII. How to prevent Cyber Crime – Viewed on 6th June 2013 http://www.ehow.com/how_4967690_prevent-cyber-crime.html
VIII. Paul Taylor. Hackers: Crime in the Digital Sublime (November 3, 1999 ed.). Routledge; 1 edition. p. 200. ISBN 0-415-18072-4
IX. Queen introduces Government plans to tackle cyber crime – Viewed on 4th June 2013 -http://www.itpro.co.uk/security/19783/queen-introduces-government-plans-tackle-cyber-crime
X. Sri Lanka Computer Crime and Investigation – Viewed on 4th June 2013 – http://www.saptha.com/blog/random/sri-lanka-computer-crime-and-criminal-procedure/
XI. Sri Lanka Police, Internet Crime Complaint Center – Viewed on 6th June 2013 – http://www.police.lk/index.php/component/content/article/45/402-internet-crime-complaint-centre
XII. Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010, pp. 91
XIII. UK Government announces Cyber crime Reduction partnership – Vihttp://www.computerweekly.com/news/2240179629/UK-government-announces-Cyber-Crime-Reduction-Partnershipewed on 7th June 2013