Exploring cybercrime history through a typology of computer mediated offences: Applying Islamic principles to promote good and prevent harm

  • Syed Raza Shah Gilani Abdul Wali Khan University Mardan
  • Bahaudin Ghulam Mujtaba Huizenga College of Business and Entrepreneurship, Nova Southeastern University
  • Shehla Zahoor Assistant Professor of Law, Shaheed Benazir Bhutto Women University
  • Ali Mohammed AlMatrooshi Dubai Police-General Department of Human Rights, Brunel University of London
Article ID: 321
7069 Views
Keywords: cybercrime, criminal intend, online fraud, transnational cybercrimes, Islamic principles, data espionage, crackers, hackers

Abstract

By the new century, the sheer complexity and number of reported cybercrime incidents had exposed major flaws in the cybersecurity infrastructure of industry giants, as well as governments. For example, there have been numerous attempts to intercept Google’s source code for the purposes of extracting confidential commercial data. National authorities were also slow to respond to the distribution of offensive images or copyrighted materials over the internet. While previous threats were mostly localized to certain computer systems, in particular countries, the emergence of the modern financial system has transformed digital crimes into a transnational phenomenon. In the intervening years, several companies, such as Lloyds in 2015, have been targets of financial hacking operations. The loss associated with cybercrime has been escalating annually, with figures indicating that costs borne by companies had quadrupled between the years of 2013 and 2015. The challenge has become worse in the recent years and artificial intelligence applications can create even more complexity and anxiety for professionals in every workplace. So, this trend of cybercrimes growing rapidly in the era of artificial intelligence is likely to affect developing and transnational economies, as more public and private sector banking institutions conduct their services online. Muslim countries must jointly collaborate, discuss, and link their spiritual principles to guard against, discourage, and prevent cybercrimes. Implications for Islamic nations along with their public and private sector leaders are explored in this manuscript.

References

[1]Hoeck T. Artificial intelligence is here. Available online: https://lecnews.nova.edu/mass-mail/artificial-intelligence-is-here/ (accessed on 21 December 2023).

[2]Mujtaba B, Cavico F. E-commerce and social media policies in the digital age: Legal analysis and recommendations for management. Journal of Entrepreneurship and Business Venturing 2023; 3(1): 119–146. doi: 10.56536/jebv.v3i1.37

[3]Westfall A. AI voice-cloning scams are on the rise, here’s how you can protect yourself: Experts say the scams are disturbing but they work. Available online: https://www.foxbusiness.com/technology/ai-voice-cloning-scams-rise-heres-how-protect-yourself (accessed on 18 December 2023).

[4]Australian Cyber Security Centre. ACSC Threat Report. Australian Cyber Security Centre; 2016.

[5]Payne BK. Defining cybercrime. In: Holt TJ, Bossler AM (editors). The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing; 2020. pp. 3–25.

[6]Aggarwal P, Arora P, Ghai R. Review on cyber crime and security. International Journal of Research in Engineering and Applied Sciences 2014; 2(1): 48–51.

[7]Buil-Gil D, Miró-Llinares F, Moneva A, et al. Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies 2020; 23(sup1): S47–S59. doi: 10.1080/14616696.2020.1804973

[8]Finklea K, Theohary CA. Cybercrime: Conceptual Issues for Congress and US Law Enforcement. Congressional Research Service, Library of Congress; 2015. pp. 214–226.

[9]Friend C, Grieve LB, Kavanagh J, Palace M. Fighting cybercrime: A review of the Irish experience. International Journal of Cyber Criminology 2020; 14(2): 383–399. doi: 10.5281/zenodo.4766528

[10]Holt TJ. Regulating cybercrime through law enforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science 2018; 679(1): 140–157. doi: 10.1177/0002716218783679

[11]Taylor RW, Fritsch E, Liederbach J, et al. Cyber Crime and Cyber Terrorism, 4th ed. Pearson; 2018. 464p.

[12]The Law Office of Elliott Kanter. Defending against cybercrime charges in California. Available online: https://www.enkanter.com/article/defending-against-cyber-crime-charges-in-california (accessed on 18 December 2023).

[13]U.S. Attorney’s Office. Brooklyn Man pleads guilty and is sentenced for hacking into online accounts of wegmans customers. Available online: https://www.justice.gov/usao-wdny/pr/brooklyn-man-pleads-guilty-and-sentenced-hacking-online-accounts-wegmans-customers (accessed on 18 December 2023).

[14]Kort A. Dar al-Cyber Islam: Women, domestic violence, and the Islamic reformation on the World Wide Web. Journal of Muslim Minority Affairs 2005; 25(3): 363–383. doi: 10.1080/13602000500408393

[15]Phillips K, Davidson JC, Farr RR, et al. Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sciences 2022; 2(2): 379–398. doi: 10.3390/forensicsci2020028

[16]AlMatrooshi AM, Gilani SR, Mujtaba BG. Assessment of mandatory reporting laws to break the silence of child sexual abuse: A case study in the United Arab Emirates. SN Social Sciences 2021; 1(8): 209. doi: 10.1007/s43545-021-00216-4

[17]Lallie HS, Shepherd LA, Nurse JR, et al. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 2021; 105: 102248. doi: 10.1016/j.cose.2021.102248

[18]Lusthaus J, Bruce M, Phair N. Mapping the geography of cybercrime: A review of indices of digital offending by country. In: Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); 7–11 September 2020; Genoa, Italy. doi: 10.1109/EuroSPW51379.2020.00066

[19]McGuire M, Dowling S. Cyber Crime: A Review of The Evidence: Summary of Key Findings and Implications: Home Office Research Report 75. Home Office; 2013.

[20]Monteith S, Bauer M, Alda M, et al. Increasing cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports 2021; 23: 18. doi: 10.1007/s11920-021-01228-w

[21]Radoniewicz F. International regulations of cybersecurity. In: Chałubińska-Jentkiewicz K, Radoniewicz F, Zieliński T (editors). Cybersecurity in Poland. Springer; 2022. pp. 165–179. doi: 10.1007/978-3-030-78551-2_5

[22]Rani S, Kataria A, Sharma V, et al. Threats and corrective measures for IoT security with observance of cybercrime: A survey. Wireless Communications and Mobile Computing 2021; 2021: 579148. doi: 10.1155/2021/5579148

[23]Reep-van den Bergh CMM, Junger M. Victims of cybercrime in Europe: A review of victim surveys. Crime Science 2018; 7(1): 5. doi: 10.1186/s40163-018-0079-3

[24]Mujtaba BG. Cybercrimes and safety policies to protect data and organizations. Journal of Crime and Criminal Behavior 2024; in press.

[25]Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications 2012; 2(2): 202–209.

[26]Gilani SRS, Rehman HU, Khan I. The conceptual analysis of the doctrine of proportionality and, its role in democratic constitutionalism. Journal of Education & Social Research 2021; 4(1): 204–210. doi: 10.36902/sjesr-vol4-iss1-2021(204-210)

[27]Mujtaba BG. Operational sustainability and digital leadership for cybercrime prevention. International Journal of Internet and Distributed Systems 2023; 5(2): 19–40. doi: 10.4236/ijids.2023.52002

[28]Gilani SR, Khan I, Zahoor S. The historical origins of the proportionality doctrine as a tool of judicial review: A critical analysis. Research Journal of Social Sciences and Economics Review 2021; 2(1): 251–258. doi: 10.36902/rjsser-vol2-iss1-2021(251-258)

[29]Mujtaba BG. Ethical implications of employee monitoring: What leaders should consider. Journal of Applied Management and Entrepreneurship 2003; 8(3): 22–47.

[30]Gilani SRS. The Significance of the Doctrine of Proportionality in the Context of Militant Democracy to Protect the Freedom of Expression [PhD thesis]. Brunel University London; 2019.

[31]Cavico F, Mujtaba B, Lawrence E, Muffler S. Examining the efficacy of the common law tort of intentional infliction of emotional distress and bullying in the context of the employment relationship. Business Ethics and Leadership 2018; 2(2): 14–31. doi: 10.21272/bel.2(2).14-31.2018

[32]Buil-Gil D, Miró-Llinares F, Moneva A, et al. Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies 2021; 23(S1): S47–S59. doi: 10.1080/14616696.2020.1804973

[33]Aggarwal G. General awareness of cyber crime. Available online: https://www.semanticscholar.org/paper/General-Awareness-on-Cyber-Crime-Aggarwal/040b800a8a68bc1eb48ca8a655294e61e088b4af (accessed on 21 December 2023).

[34]Peelen AAE, van de Weijer SGA, van den Berg CJW, Leukfeldt ER. Employment opportunities for applicants with cybercrime records: A field experiment. Social Science Computer Review 2023; 41(5): 1562–1580. doi: 10.1177/08944393221085706

Published
2023-12-26
How to Cite
Gilani, S. R. S., Mujtaba, B. G., Zahoor, S., & AlMatrooshi, A. M. (2023). Exploring cybercrime history through a typology of computer mediated offences: Applying Islamic principles to promote good and prevent harm. Computing and Artificial Intelligence, 1(1), 321. https://doi.org/10.59400/cai.v1i1.321
Section
Article