IndexSituational crime preventionCrime mappingConclusionCrime is a problem in every society in the world because as society and technology advance, new challenges related to crime emerge. These new crime challenges include electronic crimes which are often committed in cyberspace. The advent of the Internet has seen the birth of a digital society that operates on the basis of technologies. The digital society is characterized by the invention of new technological products that can increase the possibility of committing crimes. According to Tilley (2011) the digital society is characterized by both advantages and problems. Therefore it is necessary to take action to solve the problems. This paper will aim to critically examine the feasibility of "designing" the principles and practices of crime in the era of digital society. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Situational Crime Prevention Clarke (2009) states that situational crime prevention (SCP) is primarily about crime design and opportunity reduction. By focusing on the situational factors that facilitate the commission of a criminal act, SCP aims to discover methods of reducing the opportunities for an offender to commit a crime (Newman et al, 2016). SCP has been criticized for being too silent on electronic crimes as it focuses more on crimes committed in physical space. However, in this section its feasibility in "eliminating" crime will be critically examined. Moving situational crime prevention into the online realm requires taking principles from the real world and applying them to the Internet environment. Increasing efforts so that crime may not be easy to commit in the digital society implies strengthening objectives. Hardening targets may include the use of authentication passwords and difficult-to-crack personal identification numbers (PINs). This ensures that criminals do not easily access important files inside computers and other digital devices. Tilley (2011) states that physical devices can be installed to ensure security. This may include installing mobile trackers that help locate stolen or lost cell phones. Access control can be used to minimize the risk of unauthorized access to physical assets and information systems such as computers. For a crime to occur in a location, the person who committed the crime must be present in that particular location through access. Therefore, it is important to prevent infringers from gaining access in the first place. For example, staff at the High Court of Botswana should use electronic cards to access their offices. This is because the computers they use contain sensitive files related to court cases. This prevents unauthorized access and data theft. Access control can also include the use of visible detection devices that detect any unauthorized entry into a location. Crime Mapping Due to the advancement of technology and the emergence of digital society, crime mapping has become common in defining crime. According to Ratcliffe (2004) crime mapping is the process of using geographic information system (GIS) to conduct spatial analyzes of crime problems. GIS is defined as a set of computer tools that allow the user to modify, visualize and analyze geographic data. Crime mapping is used.
tags