Académique Documents
Professionnel Documents
Culture Documents
2017-2018, Semester 2
Level 4
Cyber-Crime in Oman
ID #: 61S1687
Group: 2
Date of Submission:
Table of Contents
Contents Pages
Background………………………………………………………………...3 .3.1
Objectives……………………………………………………………………3 .3.3
Body………………………………………………………………………4 .4
Methodology 4.2
Sampling .4.2.3
Conclusion .5
Recommendations .6
References .7
Appendices .8
3.0. Introduction
2
3.1. Background
Crime is not something new. It has been in existence for a while. There are different forms of
crimes. For example, personal crimes, property crimes, inchoate crimes, and statutory crimes.
Interestingly, there are also different degrees of crimes such as felony and misdemeanor. All of the
crimes stated above occur around the world today. The world is battling very hard fight these
crimes. However, with the development of computers another form of crime has been added to the
list that is Cyber-crime. Cyber-crime also known computer oriented crime, is crime that involves a
computer and a network. The computer may have been used in the commission of a crime, or it may
be the target. Cyber-crimes can be defined as: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet and mobile phones. Cybercrime may threaten a
person or a nation's security and financial health. Issues surrounding these types of crimes have
unwarranted mass-surveillance. There are also problems of privacy when confidential information
I have chosen this topic, ‘Cyber-crime in Oman’ because it is something which is affecting our
country and many people have lost huge sums of money and valuable properties. It will also give
3.3. Objectives:
Computer as a tool
3
When the individual is the main target of cybercrime, the computer can be considered as the tool
rather than the target. These crimes generally involve less technical expertise. Human weaknesses
are generally exploited. The damage dealt is largely psychological and intangible, making legal
action against the variants more difficult. These are the crimes which have existed for centuries in
the offline world. Scams, theft, and the likes have existed even before the development in high-tech
equipment. The same criminal has simply been given a tool which increases his potential pool of
victims and makes him all the harder to trace and apprehend