**6. Conclusion and summary**

This chapter has shown that malware apps are malicious apps that are strongly competing with legitimate computer apps in the software industry in recent time. It has been shown that malware apps have intrusive or criminally-minded motives that

## *Classification Models for Preventing Juvenile Crimes Committed with Malware Apps DOI: http://dx.doi.org/10.5772/intechopen.107188*

underlie their functions, usage and practices. The motives of their designers and their users are to use them to corrupt, explore, delete, deface, swindle or steal resources or personal details of another people. Thus, we further classified prominent malware apps that are competing with legitimate computer apps in the software industry on the basis of their coaching skills. Several social and legal dilemmas came to fore in this study. The rationale that underlies the behavior of a child may be influenced by many unexpressed and unnoticeable circumstances that may initially elude the imaginations of their parents, guardians and fosters. These determinants can gradually upsurge and eventually attain high climax over time. The danger begins to increase if the affected child voluntarily or involuntarily commits juvenile crimes with malware apps against known or known victims. The influx of software industry with numerous computer apps has led to the classifications of computer apps into two groups in this chapter. Many business-oriented apps are target of malware apps that have been designed by fraudulent people.

Moreover, bankruptcy, economic failure and poverty may be inducers of juvenile crimes committed with malware apps. This study further observes that some factors such as grim determination, disconsolate, parental death, downcast, disappointment; uncertainties about future and down grading a child, etc. that underlie the fundamental elements of the above crimes have not been empirically substantiated over the years. In other words, the correlation between the elements of the crime and the circumstances that surround vulnerable children that were rarely buttressed and made explicit by empirical studies over the year have been empirically investigated in this chapter. For this reason, virtual interactions with the participants in the survey that is reported in this chapter adduce the above lapses and their correlations with the dwindling of the efficacies of several social policies in most countries. Some of the intentions of malware apps like deceptive coaching, deceptive dating guidance and fake financial coaching tips have been enumerated above. We specifically argue that malware apps can expose the users of legitimate apps and continued usage of legitimate apps to greater risk of distraction and sudden neglect if the trend of their incursion into the software industry is not quickly curtailed.

Above all, this chapter has raised novel legal debates on four vital paradigms and other technological issues concerning the legal and technical interpretations of juvenile crimes committed with malware app that urgently call for in-depth legal consideration and interpretations. We submit that malware apps with deceptive motives may send malicious files (or documents) to a vulnerable child and lure the child to download (or open) the files in order to unlock his/her internet account. The files may be Trojans or virus that will in turn corrupt other computer apps in the digital systems of the child or flout the security of another person without the consent of the child. We have therefore identified new issues regarding shared or joint criminal liability, the transfer of criminal liability, the restrictive applicability of the criminal consent of a child that is still under the tutelage and guidance of their parents and the circumstances whereby some legitimate apps may be held (or charged) by complainants for being liable to have criminally permitted some juvenile crimes that severely impact them (or to have permeated malware apps that spread virus or malicious information to propagate through them either by accidental (inadvertent, unintentional or unplanned) or intentional manner.

In addition, another dilemma that we put forward in this chapter is how the software companies and service providers can acceptably account for fake voice apps (for instance) that are proven to have adopted the data (e.g. multimedia data and textual data) they have previously gathered from vulnerable children to defraud some people or swindle some vulnerable friends or cause controversies among the relatives of the users in the later time. We therefore raise new legal debates regarding industrial conflict and amicable resolution of disputes in relation to the procedures for compensating end-users (or paying) for the damages end-users might have incurred by virtue of "the services they receive and the confidence (or trust) they have that underlie the use of the computer apps", especially if the damages are proven to be directly caused by the occurrence of unexpected intrusions that the manufacturers of the computer apps or service providers (vendors) should have stopped from taking place.

The premise is that the impacts of juvenile crimes with malware apps on victims must not statistically correlate to stigmatization, shame, stress, hurtful experience or increased anxiety. Otherwise, several victims of the crimes may cover up their tribulations and harms that they have incurred from the crimes. Therefore, we suggest that global governance should be directed towards the review and constant improvement of criminal laws to ensure that local and multinationals together with third party (service providers) can be effectively held to account for aiding or failing to mitigate serious juvenile crimes committed with malware apps and their variants. We also suggest that global citizens and media sector should work together to advocate and stand against all forms of discriminations against victims of the above crimes. We solidly believe that victims of juvenile crimes with malware apps require social interventions for them to recover to normal life. We recommend that future research work should delve into the above legal paradigms. Inter-disciplinary collaborations that will ensure accurate media's representations of the methodology, prevalent and prevention of juvenile crimes that some children may commit with malware apps are inevitable in order to enlighten vulnerable children and to maximize the efficacies of the preventive and restorative interventions that governments and Non-Governmental Organizations (NGOs) have designed for the above category of global crimes.

Finally, we believe that the lists of legitimate apps and malware apps in the software industry across the globe may be inexhaustible when compare to all the computer apps that we have mentioned in this chapter. There are possibilities of fake homework coaching apps and fake fitness coaching apps. We might have only discussed malicious apps that may not comprise the entire competitors with legitimate apps in the industry. Therefore, we strongly recommend future research work to improve on the limitations of the above research findings.

*Classification Models for Preventing Juvenile Crimes Committed with Malware Apps DOI: http://dx.doi.org/10.5772/intechopen.107188*
