Violence in the Age of Technology: Theological Reflections on Cyber Crime

  • Adam Kiplangat arap Chepkwony, PhD University of Kabianga
Keywords: Violence, the Age of Technology, Theological Reflections, Cyber Crime
Share Article:

Abstract

It is generally believed that our societies are becoming more and more violent day by day. This is indeed not entirely true in that there are certain violent deeds that have subsided while other have been on the rise. This can be observed in the current age of information technology more so fashioned over the internet and related telecommunication services and gadgets. This paper debunks violence in terms of cybercrime from a theological reflection. With the escalated expansion of globalization and advancements in information technology, digitalization is an invaluable tool that is transforming the private, public, and professional lives of people; both Christians and non-Christians. Virtually, people depend on the internet and digital devices from communication to business transactions and so on. There are millions of websites and blogs offering various services and information to the population enabling people to acquire the readily available massive information. As much as we celebrate and enjoy the technology, it equally has liabilities due to cyber violence perpetrated by fraudsters, conmen, hackers, and other cyber criminals. Concerns such as impersonation, forgery, falsification, fraudulent representation, and presentation of facts as well as counterfeiting are common parlance, but the implication is adverse. Most internet users are vulnerable to traps set by conmen. The crimes are real as elucidated by the two personal examples given in this paper. People and governments are losing millions of monies daily through advance free fraud. It is prudent for Christians not to wait until one becomes a victim in order to acknowledge the risks and become vibrant participants in the mitigation of digital crimes

Downloads

Download data is not yet available.

References

Pinker, S. The Better Angels of our Nature. (New York: Viking. 2011) 658

Phillips, P., Lewis, B., & Bruce, K.. Digital Communication, the Church, and Mission. (Retrieved February 14, 2017, from Church Growth Resource Mission. 2013). http://www.churchgrowthrd.org.uk/UserFiles/File/Resourcing_Mission_Bulletin/June_2013/Digital_Communication_the_Church_and_Mission.pdf.

Chawki, M. Nigeria tackles advance fee fraud. (Journal of Information, Law, and Technology, 1(1), 2009) 2-3.

Chawki, M. Nigeria tackles advance fee fraud. (Journal of Information, Law, and Technology, 1(1),2009) 4.

Holt, T. J., & Graves, D. A qualitative analysis of advance fee fraud email schemes. (The International Journal of Cyber Criminology, 1(1),2009) 150.

World Economic Forum. Digital Media and Society Implications in a Hyperconnected Era. Retrieved February 16, 2017, from World Economic Forum: (http://www3.weforum.org/docs/WEFUSA_DigitalMediaAndSociety_Report2016.pdf. p.6 2016, January)

Glaser, E. Conscious Dream, Unconscious Reality. (Augsburg College Youth Theology Institute Journal, 2014) 4.

Campbell, H. Religious and the Internet. (Quarterly Review Of Communication Research, 25(1-3),2007) 1-44.

Miroslav, Volf. Violence and Theology in Magazine of Theological and Ethical Inquiry from Yale Divinity School, 2004

Adeoti, J. O. Automated teller machine (ATM) frauds in Nigeria: The way out. (Journal of Social Sciences, 27(1), 2011) 53-58.

Holt, T. J., & Graves, D. A qualitative analysis of advance fee fraud email schemes. (The International Journal of Cyber Criminology, 1(1), 2007) 146-147.

Chawki, M. Nigeria tackles advance fee fraud. (Journal of Information, Law, and Technology, 1(1), 2009) 4.

Holt, T. J., & Graves, D. A qualitative analysis of advance fee fraud email schemes. (The International Journal of Cyber Criminology, 1(1),2007) 151.

Published
13 April, 2022
How to Cite
arap Chepkwony, A. (2022). Violence in the Age of Technology: Theological Reflections on Cyber Crime. East African Journal of Traditions, Culture and Religion, 5(2), 32-39. https://doi.org/10.37284/eajtcr.5.2.613