Open Journal Systems

Exploring cybercrime history through a typology of computer mediated offences: Applying Islamic principles to promote good and prevent harm

Syed Raza Shah Gilani, Bahaudin Ghulam Mujtaba, Shehla Zahoor, Ali Mohammed AlMatrooshi

Abstract

By the new century, the sheer complexity and number of reported cybercrime incidents had exposed major flaws in the cybersecurity infrastructure of industry giants, as well as governments. For example, there have been numerous attempts to intercept Google’s source code for the purposes of extracting confidential commercial data. National authorities were also slow to respond to the distribution of offensive images or copyrighted materials over the internet. While previous threats were mostly localized to certain computer systems, in particular countries, the emergence of the modern financial system has transformed digital crimes into a transnational phenomenon. In the intervening years, several companies, such as Lloyds in 2015, have been targets of financial hacking operations. The loss associated with cybercrime has been escalating annually, with figures indicating that costs borne by companies had quadrupled between the years of 2013 and 2015. The challenge has become worse in the recent years and artificial intelligence applications can create even more complexity and anxiety for professionals in every workplace. So, this trend of cybercrimes growing rapidly in the era of artificial intelligence is likely to affect developing and transnational economies, as more public and private sector banking institutions conduct their services online. Muslim countries must jointly collaborate, discuss, and link their spiritual principles to guard against, discourage, and prevent cybercrimes. Implications for Islamic nations along with their public and private sector leaders are explored in this manuscript.


Keywords

cybercrime; criminal intend; online fraud; transnational cybercrimes; Islamic principles; data espionage; crackers; hackers

Full Text:

PDF

References

1. Hoeck T. Artificial intelligence is here. Available online: https://lecnews.nova.edu/mass-mail/artificial-intelligence-is-here/ (accessed on 21 December 2023).

2. Mujtaba B, Cavico F. E-commerce and social media policies in the digital age: Legal analysis and recommendations for management. Journal of Entrepreneurship and Business Venturing 2023; 3(1): 119–146. doi: 10.56536/jebv.v3i1.37

3. Westfall A. AI voice-cloning scams are on the rise, here’s how you can protect yourself: Experts say the scams are disturbing but they work. Available online: https://www.foxbusiness.com/technology/ai-voice-cloning-scams-rise-heres-how-protect-yourself (accessed on 18 December 2023).

4. Australian Cyber Security Centre. ACSC Threat Report. Australian Cyber Security Centre; 2016.

5. Payne BK. Defining cybercrime. In: Holt TJ, Bossler AM (editors). The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing; 2020. pp. 3–25.

6. Aggarwal P, Arora P, Ghai R. Review on cyber crime and security. International Journal of Research in Engineering and Applied Sciences 2014; 2(1): 48–51.

7. Buil-Gil D, Miró-Llinares F, Moneva A, et al. Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies 2020; 23(sup1): S47–S59. doi: 10.1080/14616696.2020.1804973

8. Finklea K, Theohary CA. Cybercrime: Conceptual Issues for Congress and US Law Enforcement. Congressional Research Service, Library of Congress; 2015. pp. 214–226.

9. Friend C, Grieve LB, Kavanagh J, Palace M. Fighting cybercrime: A review of the Irish experience. International Journal of Cyber Criminology 2020; 14(2): 383–399. doi: 10.5281/zenodo.4766528

10. Holt TJ. Regulating cybercrime through law enforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science 2018; 679(1): 140–157. doi: 10.1177/0002716218783679

11. Taylor RW, Fritsch E, Liederbach J, et al. Cyber Crime and Cyber Terrorism, 4th ed. Pearson; 2018. 464p.

12. The Law Office of Elliott Kanter. Defending against cybercrime charges in California. Available online: https://www.enkanter.com/article/defending-against-cyber-crime-charges-in-california (accessed on 18 December 2023).

13. U.S. Attorney’s Office. Brooklyn Man pleads guilty and is sentenced for hacking into online accounts of wegmans customers. Available online: https://www.justice.gov/usao-wdny/pr/brooklyn-man-pleads-guilty-and-sentenced-hacking-online-accounts-wegmans-customers (accessed on 18 December 2023).

14. Kort A. Dar al-Cyber Islam: Women, domestic violence, and the Islamic reformation on the World Wide Web. Journal of Muslim Minority Affairs 2005; 25(3): 363–383. doi: 10.1080/13602000500408393

15. Phillips K, Davidson JC, Farr RR, et al. Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sciences 2022; 2(2): 379–398. doi: 10.3390/forensicsci2020028

16. AlMatrooshi AM, Gilani SR, Mujtaba BG. Assessment of mandatory reporting laws to break the silence of child sexual abuse: A case study in the United Arab Emirates. SN Social Sciences 2021; 1(8): 209. doi: 10.1007/s43545-021-00216-4

17. Lallie HS, Shepherd LA, Nurse JR, et al. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 2021; 105: 102248. doi: 10.1016/j.cose.2021.102248

18. Lusthaus J, Bruce M, Phair N. Mapping the geography of cybercrime: A review of indices of digital offending by country. In: Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); 7–11 September 2020; Genoa, Italy. doi: 10.1109/EuroSPW51379.2020.00066

19. McGuire M, Dowling S. Cyber Crime: A Review of The Evidence: Summary of Key Findings and Implications: Home Office Research Report 75. Home Office; 2013.

20. Monteith S, Bauer M, Alda M, et al. Increasing cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports 2021; 23: 18. doi: 10.1007/s11920-021-01228-w

21. Radoniewicz F. International regulations of cybersecurity. In: Chałubińska-Jentkiewicz K, Radoniewicz F, Zieliński T (editors). Cybersecurity in Poland. Springer; 2022. pp. 165–179. doi: 10.1007/978-3-030-78551-2_5

22. Rani S, Kataria A, Sharma V, et al. Threats and corrective measures for IoT security with observance of cybercrime: A survey. Wireless Communications and Mobile Computing 2021; 2021: 579148. doi: 10.1155/2021/5579148

23. Reep-van den Bergh CMM, Junger M. Victims of cybercrime in Europe: A review of victim surveys. Crime Science 2018; 7(1): 5. doi: 10.1186/s40163-018-0079-3

24. Mujtaba BG. Cybercrimes and safety policies to protect data and organizations. Journal of Crime and Criminal Behavior 2024; in press.

25. Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications 2012; 2(2): 202–209.

26. Gilani SRS, Rehman HU, Khan I. The conceptual analysis of the doctrine of proportionality and, its role in democratic constitutionalism. Journal of Education & Social Research 2021; 4(1): 204–210. doi: 10.36902/sjesr-vol4-iss1-2021(204-210)

27. Mujtaba BG. Operational sustainability and digital leadership for cybercrime prevention. International Journal of Internet and Distributed Systems 2023; 5(2): 19–40. doi: 10.4236/ijids.2023.52002

28. Gilani SR, Khan I, Zahoor S. The historical origins of the proportionality doctrine as a tool of judicial review: A critical analysis. Research Journal of Social Sciences and Economics Review 2021; 2(1): 251–258. doi: 10.36902/rjsser-vol2-iss1-2021(251-258)

29. Mujtaba BG. Ethical implications of employee monitoring: What leaders should consider. Journal of Applied Management and Entrepreneurship 2003; 8(3): 22–47.

30. Gilani SRS. The Significance of the Doctrine of Proportionality in the Context of Militant Democracy to Protect the Freedom of Expression [PhD thesis]. Brunel University London; 2019.

31. Cavico F, Mujtaba B, Lawrence E, Muffler S. Examining the efficacy of the common law tort of intentional infliction of emotional distress and bullying in the context of the employment relationship. Business Ethics and Leadership 2018; 2(2): 14–31. doi: 10.21272/bel.2(2).14-31.2018

32. Buil-Gil D, Miró-Llinares F, Moneva A, et al. Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies 2021; 23(S1): S47–S59. doi: 10.1080/14616696.2020.1804973

33. Aggarwal G. General awareness of cyber crime. Available online: https://www.semanticscholar.org/paper/General-Awareness-on-Cyber-Crime-Aggarwal/040b800a8a68bc1eb48ca8a655294e61e088b4af (accessed on 21 December 2023).

34. Peelen AAE, van de Weijer SGA, van den Berg CJW, Leukfeldt ER. Employment opportunities for applicants with cybercrime records: A field experiment. Social Science Computer Review 2023; 41(5): 1562–1580. doi: 10.1177/08944393221085706


(94 Abstract Views, 64 PDF Downloads)

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Syed Raza Shah Gilani, Bahaudin Ghulam Mujtaba, Shehla Zahoor, Ali Mohammed AlMatrooshi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


This site is licensed under a Creative Commons Attribution 4.0 International License.