<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JAFS</journal-id>
      <journal-title-group>
        <journal-title>Journal of Advanced Forensic Sciences</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2692-5915</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.14302/issn.2692-5915.jafs-20-3204</article-id>
      <article-id pub-id-type="publisher-id">JAFS-20-3204</article-id>
      <article-categories>
        <subj-group>
          <subject>review-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Ashraful</surname>
            <given-names>Mozid</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842477852">1</xref>
          <xref ref-type="aff" rid="idm1842497340">*</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Nelufer</surname>
            <given-names>Yesmen</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842495468">2</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842477852">
        <label>1</label>
        <addr-line>Department of Criminology and Police Science, Mawlana Bhashani Science and Technology University, Santosh, Tangail -1902, Bangladesh</addr-line>
      </aff>
      <aff id="idm1842495468">
        <label>2</label>
        <addr-line>Assistant Professor, Department of Criminology and Police Science, Mawlana Bhashani Science and Technology University, Santosh, Tangail -1902, Bangladesh  </addr-line>
      </aff>
      <aff id="idm1842497340">
        <label>*</label>
        <addr-line>Corresponding author</addr-line>
      </aff>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Suleyman</surname>
            <given-names>Korkut</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842346172">1</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842346172">
        <label>1</label>
        <addr-line>Department of Forest Industrial Engineering, Forestry Faculty, Düzce University, 81620 Düzce, Turkey.</addr-line>
      </aff>
      <author-notes>
        <corresp>Corresponding author: Md. Ashraful Mozid, Department of Criminology and Police Science, Mawlana Bhashani Science and Technology University, Santosh, Tangail 1902, Bangladesh. Email: <email>ashrafulmozid@gmail.com</email></corresp>
        <fn fn-type="conflict" id="idm1842457460">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2020-02-07">
        <day>07</day>
        <month>02</month>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <fpage>1</fpage>
      <lpage>9</lpage>
      <history>
        <date date-type="received">
          <day>14</day>
          <month>09</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>01</month>
          <year>2020</year>
        </date>
        <date date-type="online">
          <day>07</day>
          <month>02</month>
          <year>2020</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2020</copyright-year>
        <copyright-holder>Ashraful Mozid, et al.</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org/jafs/article/1259">This article is available from http://openaccesspub.org/jafs/article/1259</self-uri>
      <abstract>
        <p>Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terrorist activities and explain cybercrime and threats from criminological aspects. This is a descriptive study which is based on secondary data. This study is based on previous researches &amp; studies. this paper discusses the nature of cybercrime in developing countries. It could allow developed countries to understand better the national and international effects of that cyber threats, to determine the conditions of current regional and international agreements, and to help countries create a sound legal framework. And then we notice the impact of cyber threats all over the world. At last, we discuss cybercrime from criminological point of view. Cybercrime is not limited to two neighboring countries and cross-border conflicts; an attempt could be conducted from another world. It is fearful to see cyber wars as the easiest way to carry out sabotaging rather than wars such as cold war, chemical and biological wars, terrorist wars or jihadist attacks. The international legal framework aims by the International Criminal Court to keep offenders accountable for their actions. The government has by far the biggest burden and obstacle in raising knowledge of cybercrime among the people.</p>
      </abstract>
      <kwd-group>
        <kwd>Cybercrime</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="9"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1842339764" sec-type="intro">
      <title>Introduction and Background of the Study</title>
      <p>Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still that was a crime. The fact is that the sophistication of crime in cyber space has grown very rapidly from time to time. If ten                               years ago people committed cybercrime in a much simpler activity known as computer crime, now people committed cybercrime in a much complicated crime such as phishing, carding, probing, stalking, virus attacking and many other illegal activities with unfamiliar                  names <xref ref-type="bibr" rid="ridm1843163148">1</xref><xref ref-type="bibr" rid="ridm1843160484">2</xref><xref ref-type="bibr" rid="ridm1843165380">3</xref>. Cybercrime may include conventional criminal activities such as stealing, fraud, falsification, slander, and mischief, all of which are subject to a country's criminal laws. Computer misuse has also given birth to a range of new age offenses that the special laws introduced to penalize such crimes are combating. For example, Bangladesh describes those offenses which are not protected by the penal code in Tatha O Jogajog Projukty Ain,2006 <xref ref-type="bibr" rid="ridm1843171764">4</xref>. And so it is possible to say that the 1860 Penal Code is insufficient to counter  cybercrime. One of the emerging problems of today's world is combating cyber crime with a global population of up to 7,5 billion and an Internet population of 42 percent. Users also may be puzzled about how cybercrime is classified. While this definition is rather vague, cybercrime refers to illegal actions performed using an online means or directed at a computer-based platform because of the relative area of creativity or lack of a measurable existence. Similar definitions are used for cybercrime identification. It can be broadly defined by the introduction of computer technology as a criminal offense created or made possible. Although it                     seems to be a simple task, it is not easy to define cybercrimes. The difficulty lies in determining clearly what cybercrimes should be treated as. No globally accepted cybercrime concept exists <xref ref-type="bibr" rid="ridm1843177164">5</xref>.</p>
      <p>Girasa (2002:68) provides a slight different definition on cybercrime. Girasa defines cybercrime as a criminal activity in which computer is used as the main component. This definition is indeed similar with the previous definition. The only difference here is the use of computer as the main component, not as the main tool as what Forester and Morison suggested. The word component is not far in its meaning with the word tool. Both mean part of something which is used to help people doing thing. Therefore, the first and second definition is considered not clear enough to define cybercrime <xref ref-type="bibr" rid="ridm1843270060">6</xref>. Tavani defines cybercrime as a criminal activity which is only possible to be done with cyber                     technology in a cyber space. This definition gives  clearer boundaries of cybercrime. Activities such as making computer viruses and spreading them                through internet is definitely a cybercrime, meanwhile pornography through internet is not purely a cybercrime. Based on the definition, it is still possible for people to spread pornography by using other media such as CD or DVD <xref ref-type="bibr" rid="ridm1843020788">7</xref></p>
      <p>Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cyber crime (especially with the Cyber Crime Agreement of the Council of Europe), there still remains a wide gap in the consistency of laws across international borders. The bombing in Times Square in 2010 would be a good example of the extremist use of the internet as a powerful tool. Central to this plot was Faisal Shahzad. Shahzad used public web cameras to conduct reconnaissance of his targets <xref ref-type="bibr" rid="ridm1843017404">8</xref>. In 2005, Younis Tsouli, a London-based Moroccan immigrante imprisoned for distributing bombs and propaganda from al Qaeda, used cybercrime to fund his work. A web of websites and forums of Jihadist propaganda were developed by Tsouli and his associates on servers which Tsouli compromise <xref ref-type="bibr" rid="ridm1843016612">9</xref>.</p>
      <p> For one individual case, ISIL supporters in the United Kingdom have been using social engineering to get pensioners off £ 160,000. The proceeds from this project is believed to be used to finance their journeys to Syria and Iraq to enter and fight ISIL <xref ref-type="bibr" rid="ridm1843022012">10</xref>. U.S. companies spend about $67 billion every year struggling with electronic fraud and malware systems like                    viruses and spyware, according to federal Bureau of Investigation's figures. The Irs, the Justification and National Crime Center also reports a gross $559 million per year for a variety of frauds, including defrauds seeking advance viability in conjunction with substantial returns from the bogus lottery or assets, non-fulfillment of goods or payments, and other opponents. The FC3 also calculates a loss amount of $559 million per month for fraud. The figure has dramatically doubled by an additional $265 million in 2008 each year, as in                   2009 <xref ref-type="bibr" rid="ridm1843001236">11</xref>.</p>
      <p>As a poor country like Bangladesh face this problem seriously. Recently this problem is increasing rapidly. Although various steps are taken by the government to stop this crime, they cannot become successful. The subject matter of the study is to explain how criminals helps\ increases cyber crime. Now cyber crime has become a crucial problem in Bangladesh. It is increasing day by day. Though this is a serious problem in Bangladesh, there are a few people on this topic.                     So, it is essential to work on Cybercrime. It will                 help us to know about the causes of cybercrime in Bangladesh <xref ref-type="bibr" rid="ridm1843006852">12</xref>. The Police Headquarters have confirmed that from 2012 to June 2017, there were 1417 cases brought under the Cyber Security Act 2006. In 748 these incidents, the police brought complaints and issued final reports for 179. Of these 19 cases, 48 in 2013, 149 in 2014, 303 in 2015, 546 in 2016 and 352 in 2017 were filed by June 2012, 19 were filed in 2012. According to the Police Criminal Investigation Centre (CID), various police departments are focused on cybercrime. Moreover, CID alone has a forensic laboratory to help detect or prosecute these crimes. When it opened in 2013, the unit registered 25 complaints. Then it rose to more than 70 in 2014. In 2015, there were 217 complaints, in 2016 there were 575 and until July there were more than 600. The                     bulk of the alleged victims were women. The                   counter-terrorism and transnational crime (CTTC) cybercrime unit stated that they have received over 500 complaints since the unit was launched, including cases filed after 150 inquiries. Another 55 cases were under investigation <xref ref-type="bibr" rid="ridm1843005988">13</xref>. There are several theories in the area of criminology which attempt to explain why some people have deviated, while others refrain from it. While these ideas were originally intended to describe crimes in the "real world," they can still be used in the field of cybercrime. These include theory of social learning, poor self-control theory, general pressure theory, concept of anger, daily task theory, and theory of avoidance of crime. In this article, elements of these hypotheses are explored in order to determine the best explains cybercrime. According to a study performed by Shirley McGuire (McGuire,1997:47) a specialist in psychology of the University of San Francisco, the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire said that the motives of teens are often unclear to adults. In the region of San Diego, she carried out an open project and asked about 4,800 graduates <xref ref-type="bibr" rid="ridm1843004908">14</xref>. At the American Psychological Association Convention her findings were discussed.</p>
      <p>38% of teenagers were involved in software piracy;</p>
      <p>18% of all children who have admitted that they are accessing and using the data stored on other personal computers or websites</p>
      <p>13% of all respondents said that device or data file changes have been made.</p>
      <p>The study revealed that just 1 in 10 hackers wished to do some damage or earn money. Many youth carry out illicit machine excitement acts to get excited. Now, many cyber policemen worry more about Orkut as many fake profiles are generated and therefore contribute to crime <xref ref-type="bibr" rid="ridm1843004908">14</xref>.</p>
      <p>To investigate the actions of cyber criminals, Kshetri (2005) uses psychology, culture, international relations and warfare. He notes that the various kind of network attacks vary from countries worldwide in terms of regulative, legal and cognitive validity. Symbolic significance and criticality, the digital value degree and defense defense weakness are part of the cyber criminal's selection criteria for the target networkThe most serious risks to information protection have been identified by Riem (Anthony Riem, 2001:37) not outside criminals wanting entry but by employees, consultants and contractors working within the organization <xref ref-type="bibr" rid="ridm1842993492">15</xref>.</p>
      <p>Freda Adler(1991:79) said that, technology criminals creates their own forms of crime by using computer as an instrument of crime tool to commit attacks on the information: such as thefts of information thefts of services and even traditional crimes such as child pornography, confidence schemes and illegal gambling <xref ref-type="bibr" rid="ridm1842993492">15</xref></p>
      <p>N.V.paranjape (2008-09:141) expressed that, Intellectual property crimes and also indicated on blackmailing based on information gained from computerized files such as personal history, sexual preferences, financial data, medical information and so on.</p>
      <p>This research helps to find out how cyber crime become a new threat to security and cyber criminals enhances cyber crime. And it may be expected that the research findings will describe the perfect scenario of cyber crime which is caused due to many problems. The research has a great socioeconomic and policy value as well as in the practical application <xref ref-type="bibr" rid="ridm1842997092">16</xref>.</p>
      <sec id="idm1842357772">
        <title>Objective of the Study</title>
        <p>The main objectives of this study are-</p>
        <p>To explore the nature of cybercrime in developing countries.</p>
        <p>To find out the cyber threats for terrorist activities</p>
        <p>To explain cyber crime and threats from                   criminological aspect</p>
      </sec>
    </sec>
    <sec id="idm1842357412" sec-type="methods">
      <title>Methodology</title>
      <p>Methodology is a set of step to perform a particular task. Methodology involves with the                   sources of data, analytical review, findings and recommendation. This is a descriptive study which is based on secondary data. This study is based on previous researches &amp; studies. Data has been collected from journals, articles, books, reports, newspapers, publications and some authentic websites. All     information are collected according to research objectives.</p>
      <sec id="idm1842358132">
        <title>Findings</title>
        <p>Findings of the study describes according to their objectives. At first, this paper discuss about the nature of cyber crime in developing countries. It could allow developed countries to understand better the national and international effects of that cyber threats, to determine the conditions of current regional and international agreements, and to help countries create a sound legal framework. And then we notice the impact of cyber threats all over the world. At last we discuss about the cyber crime in criminological point of view. </p>
      </sec>
      <sec id="idm1842356836">
        <title>The Nature of Cybercrime in Developing Countries</title>
        <p>The quick digitalization has taken place in developing countries such as Botswana, Bangladesh, Kenya, Mozambique, Myanmar, Rwanda, and Tanzania.  In Asia the rapid growth in internet use, including 10 times or more access increases in China, Indonesia and India since 2002, has also been associated with significant cybercrime increases. The majority of                  the UN Sustainable Development Goals now include digitalization. International organizations and donor countries continually utilize digital technology as their development goals–social, political and economic. In the background of the Budapest Convention of 2001, the law-enforcement reaction is quickly analyzed throughout Asia. They describe the nature of cybercrime, and equate the laws and regulations in Asian countries with the terms of the Convention. It covers the' beard' or the material and the illegal products such as botnets. While issues arise around cloud computing, social media, wireless / smart phone apps, and other developments in digital technologies, the difficulties of creating successful cross-border cyber criminal’s surveillance in Asia also are dealt with <xref ref-type="bibr" rid="ridm1842993924">17</xref></p>
        <p>As most cybercrimes are transnational, disparity in legislation and regulations across the country's frontiers renders collaboration in cross-border       cybercrimes particularly difficult for governments. As Katyal (2003:180) pointed out, it is increasingly difficult for many countries to extend their national legislation to practices that are considered offensive or detrimental to local taste or community. The world's Internet users in March 2011 were projected to be 2,95 billion (Miniwatts Marketing Group, 2011). Throughout Asia and the Pacific area (i.e. Asia and Oceania) among all Internet users, 45 percent are based. In the Asian and Pacific world, China is home to nearly half of internet users <xref ref-type="bibr" rid="ridm1842982524">18</xref>. India is the second largest, currently 100 million Internet user, led by China, Korea (South Korea) and the Philippines. Countries like Japan, South Korea, Taiwan, Singapore, Australia and New Zealand have over 70% of their total internet users online, while fewer than 10% of the people are involved in developing countries such as India, Pakistan, Sri Lanka, Bangladesh and Nepal. The finding of strategies to respond and solutions to cybercrime threats, especially for developing countries, is a major challenge. A comprehensive anti-cybercrime strategy generally contains technical protection measures, as well as legal instruments <xref ref-type="bibr" rid="ridm1842980652">19</xref>. Developing countries will implement protection measures into the Internet roll out from the outset, as while the                    expense of the Internet services may initially increase, the long-term benefits in mitigating cybercrime costs and disruption are substantial and far exceed any potential spending on technological protection measures and network protections <xref ref-type="bibr" rid="ridm1842978924">20</xref>. Nevertheless, because of their lower standards of security and safety, the risks associated with the weaker legislation may impact developing countries more significantly (ITU Anti-Spam Legislation Survey 2005, "p. 5). Customers and businesses must not only be covered by conventional firms, but also by online companies or Internet companies. Failure to secure the internet may contribute to significant problems in developing countries fostering the development and inclusion of e-business in online services. For both advanced countries and developing countries, the implementation of strategic initiatives to support cyber security and effective anti-crime regulation is important. Developing countries have to put their counter-cybercrime policies in line from the start with international standards (Spam Issue in Developing Countries 2005, page 4).</p>
        <p>Developing countries such as Bangladesh lack sufficient natural resources and try to achieve economic development by using the ICT sector. Throughout recent years, a growing number of countries have explored ICT resources, established guiding principles and developed a national ICT plan as part of the overall National Development Strategy. In particular, ICT has been a key player. ICTs are the main drivers of socio-economic development for Bangladesh (Clause 1.3 of the National Information and Communication Technology (ICT) Policy October, 2002). Experts from IT say nearly 90% of cybercrimes remain unreported. The condition is deteriorating every day for Bangladesh. Bangladesh reports the most recent cyberattacks and crimes:</p>
        <p>1. Blackmailing girl by capturing their nude photographs and video on the sly and threatening to expose publicly. Such incidents are caused frequently by their boyfriends and others.</p>
        <p>2. There have been various Community platforms used by girls and boys to share telephone numbers for sharing secret video or even nude images, and so on.</p>
        <p>3. Hacking in the website of Bangladesh Computer Society, which took place after a few days of a 3                 day-long ‘Regional Seminar on Cyber Crime’ in Dhaka (www.cnewsvoice.com).</p>
        <p>4. E-mail threatening the current Prime Minister Sheikh Hasina from a cybercafe (www.thedailystar.net).</p>
        <p>5. Hacking into the Internet account of Barisal DC office in 2003 AD, the incident was revealed after the DC office received a heavily bloated Internet bill and lodged a complaint with the Bangladesh Tar and Telephone Board (BTTB) <sup>The Daily Star</sup><sup> Sunday</sup><sup> July 13</sup><sup> 2003</sup></p>
        <p>6. Hacking took place in the website of Bangladesh Rapid Action Battalion (RAB) in 2008, during the access to www.rab.gov.bd, the website read: "Hacked by Shahee_Mirza.” (www.thedailystar.net).</p>
        <p>7. Hacking the mail of BRAC Bangladesh.</p>
        <p>8. Stealing the transaction report of Dhaka Stock Exchange through hacking.</p>
        <p>Once the internet was established, the founding fathers of the internet had little idea that the internet was also misused for crime. Nonetheless, it's happening all over the world, loosely and mostly. The problem now is whether such offenses can be dealt with using traditional or exceptional approaches.</p>
      </sec>
      <sec id="idm1842361948">
        <title>Cyber Threats for Terrorist Activities</title>
        <p>In the 90ies, a discussion focused on network based attacks on critical infrastructure ("cyber terrorism"), such as the use of information technology and transport and energy supply in armed conflicts, took the form of "cyberwar" network use by terrorist organisations. The use of computer technology as well as cyber-dependent violence has become more common challenges from terrorist groups. The notion that terrorists might result in a massive death loss, global economic mess or destruction of the world through piracy of critical infrastructure networks caught public imagination. national imagination. Cyber terror acts are known to be a potential target for air traffic control facilities, nuclear power plants, electricity grids, schools and equity markets. The notion is not simply to create a new generation of cyber terrorism, but to strengthen the capacity to conduct a destructive cyber-attack, for example by Islamic State, Al-Qaeda or a certain known terror organization. “In today’s world”, according to former US President Barack Obama, “acts of terror could come not only from a few extremists in suicide vests but from a few key strokes on the computer—a weapon of mass disruption.” What we do know, on the other hand, is that terrorist organization’s use the internet on a daily basis for a range of activities including propaganda, recruitment and communication. Islamic State has shown particular prowess in using social media to inspire vulnerable individuals around                     the world to join its cause. These uses of technology                   by terrorist groups pose major challenges and                      should remain the focus of cyber security efforts                          in counter-terrorism <xref ref-type="bibr" rid="ridm1842974676">21</xref>. Network protection        vulnerabilities have been demonstrated clearly by the proliferation of viruses and botnet assaults. Successful militant internet attempts are probable, but the significance of risks is hard to assess (Terrorist Capabilities for Cyberattack, 2007, page 13). Typically, the style of terrorist activity which characterized the beginning of the 21st century was planned to prepare high-mortality incidents, to attain radical groups ' targets and both the power of the attackers and the weakness of the fired population. Such attacks often attract lawmakers ' attention to and goad acts that could be used to boost the group's credibility and recruit new members for radical causes. The social and political success of such efforts in post-9/11 environment has only increased the trend (The Future of Terror, Crime, and Militancy, page 239 <italic>etseq</italic><italic>). </italic>Everything shifted after the bombings on September 11, which contributed to the beginning of an extensive discourse on the use of ICTs for attackers. Saying that the perpetrators were using the Internet to plan the assault encouraged everything debate (http://www.aci.net/kalliste/electric.htm.). While the assaults were not cyber-attacks, the Web played a role in the planning of the 9/11 assault as the party who did not perpetrate a web-based attack. Different ways terrorist organizations use the Internet have been found in this context (CNN, News, 04.08.2004) <xref ref-type="bibr" rid="ridm1842975828">22</xref> Today, it is known that terrorists use ICTs and the Internet for:</p>
        <p>Propaganda</p>
        <p>Information gathering</p>
        <p>Preparation of real-world attacks</p>
        <p>Publication of training material</p>
        <p>Communication</p>
        <p>Terrorist financing</p>
        <p>Attacks against critical infrastructures</p>
        <p>Many terrorist organizations depend on                 third-party financial resources. Following the 9/11 attacks, tracking this financial transaction has become one of the main ways of combating terrorism. The reality that financial means required to conduct attacks are not inherently high is one of the main problems in this regard (CRS Report for Congress, Terrorist Financing: The 9/11 Commission Recommendation,  page 4). Web services can be used in many forms to fund terrorism. Terrorist organizations may use electronic payment systems to make donations online (Terrorists, propaganda and the Internet, Aslib Proceedings, Vol. 53, No. 7 (2001), page 253). You can use websites to publish information about donations such as which bank accounts for transactions should be used. The Hezbollah Tahrir organization, which publishes bank account data for potential donors, was an example of this approach. (<italic>Weimann</italic>in USIP Report, How Terrorists use the Internet, 2004, page 7).  The Irish Republican Army (IRA) was one of the first terrorist organizations, which collected donations through credit cards. Another approach is to donate credit card online (Terrorist Use the Internet and Fighting Back,   Information and Security, 2006, page 4) <xref ref-type="bibr" rid="ridm1842973740">23</xref>. All methods involve finding and monitoring financial transactions using the information published.               Anonymous electronic payment systems are therefore likely to become increasingly popular. The fact that cyber warfare is an evolving danger must be mitigated. The population of digital devices is growing rapidly, rendering them the first-line susceptible to a                    cyber-attack. A prerequisite assumption therefore is that our own enemies have to reassess cyber-attack on a regular basis over time because of the emergent existence of the digital economy, technology               technologies, and skills (The Future of Terror, Crime, and Militancy, 2001, page 42).</p>
      </sec>
      <sec id="idm1842282364">
        <title>Cybercrime and Threats from Criminological Aspects</title>
        <p>Cyber-reality is extremely paradoxical from a criminological perspective. Deviancy and violation of "normal" practices and values is part of all phases of cyber-space development. Professional innovation has achieved primary importance among hackers only because the idea of exclusivity, anonymity and copyright transcended their community. Cyberspace transparency has always been culturally determined and an intrinsic feature of the hacker culture. Cyber crime is committed electronically, and is often not clearly linked to any geographical position, unlike conventional crime committed in one geographical location. A concerted global solution to the cybercrime issue is therefore required. This is mainly because there are a number of problems that hinder effective cybercrime reduction. The weaknesses in technology, law and cyber criminology present some of the major issues (<italic> </italic><ext-link xlink:href="http://london.northumbria.ac.uk/why-northumbria/meet-our-faculty/professor-hamid-jahankhani/" ext-link-type="uri">Professor Hamid Jahankhani</ext-link><italic>,2003:13).</italic></p>
        <p>Most criminal viewpoints describe criminality on the physical, economic and environmental aspects, and see crime as happening in a single geographical  location <xref ref-type="bibr" rid="ridm1842971076">24</xref>. The description of crime allowed crime to be identified and ultimately adapted for the specific target group for crime prevention, monitoring and calculating approaches. This function, however, cannot be conducted. As a consequence, it is virtually impossible to identify areas of identifiable offenses that cause cybercrimes. In addition, this makes the criminal viewpoint worthless on the grounds of spatial variations (Brvar, 1982:92). Criminology thus encourages the motives of offenders to be identified by examining the social traits and position of perpetrators, which helps explain whether crimes committed by individuals with particular characteristics are widespread (Computer Crime: A Criminological Overview,2001:35). But in the case of cybercrimes the association of widespread acceptance of conventional crime with social exclusion and criminality can not be valid and cyber criminals, like traditional criminal perceptions, are quite' atypical.' There are therefore no useful explanations for cybercrimes from the current perspectives of criminology which connect marginalization and social exclusion to crime. Unless the causes are known, effective measures to combat cybercrime can difficultly be implemented by law enforcement agencies and the government (Levi, S. 1984). Hackers: Heroes of the Computer Revolution).</p>
      </sec>
      <sec id="idm1842281572">
        <title>Self-Control and Space Transition Theory</title>
        <p>K. Jaishankar has   developed a theory called ‘Space Transition Theory’in order to explain the causation of crimes in the cyberspace. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cybercrimes (Jaishankar 2008). He published this theory as a chapter in a book titled “Crimes of the Internet” edited by Frank Schmalleger&amp; Michael Pittaro, published by Prentice Hall (2008: 283-301). "Space Transition Theory" is an interpretation of the essence of people's behavior in physically and on a cyberspace which demonstrates their conformity and non-conformity (Jaishankar 2008). Space transition involves the movement of persons from one space to another (e.g., from physical space to cyberspace and vice versa). Theory of space transfer suggests that when they shift from place to room, people act differently. The concept is nowadays, as is probably the most widely discussed in cyber crimeology, a significant scientific principle in criminal literature. This hypothesis discusses the creation of cyberspace as a new venue for criminality and describes the origin of cyberspace crimes (Jaishankar, 2008). The advancement of the concept of space transfer played a key role in the creation of cybercrime hypotheses. Because it came at a time when no other social scientist was able to explain as clearly as Jaishankar the overarching trend of cybercrime.</p>
      </sec>
      <sec id="idm1842280564">
        <title>Propositions of Space Transition Theory</title>
        <p>1. Persons, with repressed criminal behavior (in the physical space) have a propensity to commit crime in cyberspace, which, otherwise they would not commit in physical space, due to their status and position.</p>
        <p>2. Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in the cyberspace provides the offenders the choice to commit cybercrime.</p>
        <p>3. Criminal behavior of offenders in cyberspace is likely to be imported to Physical space which, in physical space may be exported to cyberspace as well.</p>
        <p>4. Intermittent ventures of offenders in to the cyberspace and the dynamic spatiotemporal nature of cyberspace provide the chance to escape.</p>
        <p>5. (a) Strangers are likely to unite together in  cyberspace to commit crime in the physical space. (b) Associates of physical space are likely to unite to commit crime in cyberspace.</p>
        <p>6. Persons from closed society are more likely to commit crimes in cyberspace than persons from open society.</p>
        <p>7. The conflict of Norms and Values of Physical Space with the Norms and Values of cyberspace may lead to cybercrimes.</p>
        <p>Because criminology has begun to see the rise of cyberspace as a major focal point for criminal activity, a new theory is needed to explain why cybercrime is happening. The above principle of spatial transformation outlines the criminal conduct in cyberspace. The Space Transformation Theory needs to be tested to figure out if it addresses cybercrime <xref ref-type="bibr" rid="ridm1842985404">25</xref>. The second issue of the paper includes a wide range of articles written by emerging and established experts in the field of cyber criminology. The first essay by Russell Smith explores how developments in ICTs have created new crime problems, but also helped to prevent, track, evaluate, prosecute and execute abuse. Michael L. Pittaro's second article is a guide to online harassment and intimidation, which is called cyberstalk. In this article he addressed how the internet has encouraged violence. He claims that cyberstalking is not so simplistic but an evolution of online harassment as conventional stalking. The author gives several examples of cyber stalking and how the suspect is quickly abused. Each problem includes two book reviews. Nicholas Chantler, of Queensland University of Technology reviewed the book titled "CYBERCRIME–The Reality of the Threat by Nigel Phair. He believes that this book is an easy-to-read document for addressing cybercrime, based on the experience of the writer as a federal agency at the Australian Crime Centre and an Australian Federal Police. He notes that Internet users who get filmed on the site of on-line crime will decrease their trust in e-commerce<xref ref-type="bibr" rid="ridm1843004908">14</xref>. The profile of cybercrime criminals is also mentioned briefly. Often identified are the global analyses of the elements of cyber crime. The book discusses cybercrime under a broad range of headings-recommendations for and expectations for the law enforcement action-such as unauthorized malware, crime of identification, phishing, critical infrastructure security, intellectual property, messaging, terrorism and compliance. </p>
        <p>In fact, versatility, dissociative privacy, easy online communication and lack of protection are attracting more and more conventional offenders to the Web. In this analysis also the theory that cyberspace is used by cyber criminals if there is a discrepancy between the principles and values of physical                    space <xref ref-type="bibr" rid="ridm1842939748">26</xref>. Although few scholars test the theory of space transformation, there are some issues with the feasibility of testing the theory and several scholars have underlined this (Holt, Bossler, &amp;Spellar, 2015; Holt &amp;Bossler, 2016). It is to be noted that getting data of the cyber crime offenders is an onerous task                      and hence the difficulty of testing the space transition theory ensued. Even, Kethineni, Cao and Dodge (2017, pp-13-14) note that: While case studies provide some evidence for space transition theory, further data is needed to empirically evaluate these ideas. "Having a large population of cyber criminals will be challenging at this point and this problem may be addressed in the                 future <xref ref-type="bibr" rid="ridm1842938020">27</xref>. Cybercrimes will continue to grow, and in the future there is a thin line between offline and Web criminals, which will allow more cyber offenders and will make testing the hypothesis of the space transformation far simpler than is currently the case.</p>
      </sec>
    </sec>
    <sec id="idm1842277828" sec-type="conclusions">
      <title>Conclusion</title>
      <p>Cyber crime is not limited to two neighboring countries and cross-border conflicts; an attempt could be conducted from another world. It is fearful to see cyber wars as the easiest way to carry out sabotaging rather than wars such as cold war, chemical and biological wars, terrorist wars or jihadist attacks. Crime involving a machine or a cybercrime includes any crime involving a device and a network. The machine may or may be the subject of the crime committee. Dr. DebaratiHalder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)" <xref ref-type="bibr" rid="ridm1842934636">28</xref>. These offenses that endanger the protection and financial health of a country. Issues related to these types of crimes have become popular, particularly ones related to breaking, copyright violations, child pornography and childcare. Privacy problems also occur when confidential information is legally or otherwise lost or intercepted. Internationally, cybercrimes are perpetrated by both states and non-state actors, including hacking, financial fraud, and other cross-border offences. Operation that crosses international borders and affects the desires of at least one nation state is sometimes referred to as cyber warfare <xref ref-type="bibr" rid="ridm1842932836">29</xref>. The international legal framework aims by the International Criminal Court to keep offenders accountable for their actions. The government has by far the biggest burden and obstacle in raising knowledge of cybercrime among the people.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1843163148">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://thedailynewnation.com



</mixed-citation>
      </ref>
      <ref id="ridm1843160484">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.thedailystar.net



</mixed-citation>
      </ref>
      <ref id="ridm1843165380">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.bangladeshobserver.com



</mixed-citation>
      </ref>
      <ref id="ridm1843171764">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <date>
            <year>2006</year>
          </date>
          <chapter-title>Information and Communications Technology Act</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1843177164">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. New York:OxfordUniversityPress</article-title>
          <date>
            <year>2009</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1843270060">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Grabosky</surname>
            <given-names>Peter</given-names>
          </name>
          <name>
            <surname>Smith</surname>
            <given-names>Russell</given-names>
          </name>
          <date>
            <year>1998</year>
          </date>
          <chapter-title>Crime in the Digital Age:Sydney:Federation Press,(co-published with the Australian Institute of Criminology)</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1843020788">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><name><surname>Levi</surname><given-names>M</given-names></name><article-title>Between the risk and the reality falls the shadow: evidence and urban legends in computer fraud</article-title><date><year>2001</year></date><chapter-title>Crime and the Internet</chapter-title>
In: D. S. Wall (ed.)
<publisher-loc>London:Routledge</publisher-loc></mixed-citation>
      </ref>
      <ref id="ridm1843017404">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
www.ticklethewire.com



</mixed-citation>
      </ref>
      <ref id="ridm1843016612">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
www.washingtonpost.com



</mixed-citation>
      </ref>
      <ref id="ridm1843022012">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.dailymail.com



</mixed-citation>
      </ref>
      <ref id="ridm1843001236">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <date>
            <year>2010</year>
          </date>
          <chapter-title>The IC3 2009 Annual Report on Internet Crime. Washington, DC: Federal Bureau of Investigation</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1843006852">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://daily-sun.com



</mixed-citation>
      </ref>
      <ref id="ridm1843005988">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
https://www.dhakatribune.com



</mixed-citation>
      </ref>
      <ref id="ridm1843004908">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><name><surname>R</surname><given-names>G Smith</given-names></name><name><surname>Holmes</surname><given-names>M N &amp;Kaufmann</given-names></name><name><surname>P</surname><given-names/></name><article-title>Nigerian Advance Fee Fraud., Trends and Issues</article-title><date><year>1999</year></date><chapter-title>in Crime and Criminal Justice, No. 121, Australian Institute of Criminology</chapter-title><publisher-loc>Canberra</publisher-loc>
republished in The Reformer



</mixed-citation>
      </ref>
      <ref id="ridm1842993492">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>O</surname><given-names>B Longe</given-names></name><article-title>Proprietary Software Protection and Copyright issues in contemporary Information Technology</article-title><date><year>2004</year></date>
(M.Sc Thesis)
<institution>Unpublished. Federal University of Technology</institution><publisher-loc>Akure, Nigeria</publisher-loc></mixed-citation>
      </ref>
      <ref id="ridm1842997092">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <chapter-title>Paranjape.N.V.(2008). Criminology and Penology, 13th ed., Allahabad:CentralLawPublications</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842993924">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.ejisdc.org



</mixed-citation>
      </ref>
      <ref id="ridm1842982524">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Grabosky</surname>
            <given-names>P</given-names>
          </name>
          <article-title>Computer Crime: A Criminological Overview. V: Forum on Crime and Society</article-title>
          <date>
            <year>2001</year>
          </date>
          <source>New York:United Nations Publications</source>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>35</fpage>
          <lpage>53</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842980652">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.osce.org



</mixed-citation>
      </ref>
      <ref id="ridm1842978924">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <date>
            <year>2007</year>
          </date>
          <fpage>95</fpage>
          <institution>World Information Society Report</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842974676">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
http://www.internationalaffairs.org



</mixed-citation>
      </ref>
      <ref id="ridm1842975828">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
https://edition.cnn.com



</mixed-citation>
      </ref>
      <ref id="ridm1842973740">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Turkle</surname>
            <given-names>S</given-names>
          </name>
          <article-title>Life on the Screen: Identity in the Age of the Internet. New York:Simon&amp;Schuster.Wall,D.S.(2007).Cybercrime: The Trasformation of Crime in the Information Age</article-title>
          <date>
            <year>1997</year>
          </date>
          <publisher-loc>Cambridge, Malden: Polity</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842971076">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>E</surname>
            <given-names>J Aghatise</given-names>
          </name>
          <date>
            <year>2006</year>
          </date>
          <chapter-title>Level of Awareness of Internet Intermediaries Liability. (HND Project work) Unpublished. Auchi Polytechnic</chapter-title>
          <publisher-loc>Auchi, Edo State, Nigeria</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842985404">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Jaishankar</surname>
            <given-names>K</given-names>
          </name>
          <article-title>Space Transition Theory of cybercrimes</article-title>
          <date>
            <year>2008</year>
          </date>
          <chapter-title>In Schmallager,F.,&amp;Pittaro,M.(Eds.), Crimes of the Internet.Upper Saddle River, NJ:Prentice Hall</chapter-title>
          <fpage>283</fpage>
          <lpage>301</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842939748">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>K</surname>
            <given-names>R</given-names>
          </name>
          <chapter-title>Chaubey.(2009). An Introduction to Cyber Crime and Cyber Laws, 1st ed., Kolkata:KamalLawHouse</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842938020">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Naughton</surname>
            <given-names>J</given-names>
          </name>
          <article-title>A Brief History5 of the Future: The Origins of the Internet.London:</article-title>
          <date>
            <year>1999</year>
          </date>
          <publisher-loc>Phoenix</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842934636">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Zulfiquar</surname>
            <given-names>Ahmed</given-names>
          </name>
          <date>
            <year>2009</year>
          </date>
          <chapter-title>A Text Book on Cyber Law in Bangladesh, 1st ed</chapter-title>
          <publisher-loc>Dhaka: NationalLawBookCompany</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842932836">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Halim</surname>
            <given-names>Abdul</given-names>
          </name>
          <name>
            <surname>Siddiki</surname>
            <given-names>N E</given-names>
          </name>
          <date>
            <year>2008</year>
          </date>
          <chapter-title>The Legal System of Bangladesh after Separation,( 1st ed.), Dhaka:UniversityPublications</chapter-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
