*Classification Models for Preventing Juvenile Crimes Committed with Malware Apps DOI: http://dx.doi.org/10.5772/intechopen.107188*

their users to view, upload and share favorite songs and new albums of artists with friends and social groups. There are modern apps that enable people to have access to audio-books, historic podcasts, video, motion pictures, selected artifacts and read, examine or watch them at their leisure time. Some modern computer apps enable users to create their personal accounts, sign on to the apps by using their personalized accounts and remotely connect to some companies, colleagues and professionals in other locations and engage in virtual conferencing.

The functionalities of some of the accessible modern apps in the software industry allow their users to also add or invite people (users) as contacts [1]. Some computer apps allow users to select the kinds of services (such as message or call) of their choice. Some apps can enable users to equally share files and log on to chat box and engage in private or official conversations. Some of the existing apps enable their users to customize and fine-tune their background information. Some computer apps permit users to upload their personal pictures and insert personal notes or personal ideologies on their chat profiles. Some modern apps can engage participants and host many interactive sessions. Besides, some computer apps can engage several participants in every session and they will still experience clear pictures and audible audio conversations.

More so, the current advancements in computer apps cut-across scores of human domains. For example, there are computer apps for modern photography subsumes taking pictures (photographs or photos, snapshots), cinematography (movies production), film production, picture production, animatronics (animation), computer graphics, shooting cartoons, moving picture, mood mining, printing and camera repair. Furthermore, legitimate apps such as printing apps can enable both the professional and amateur printers to increase their creativities and proficiencies in photography. Nevertheless, the striking issues on modern computer apps are worrisome. The issue of privacy control and virtual data sharing syndrome have made some experts to reserve their comments on the confidentiality, integrity, availability and non-repudiation of virtual signals that would have migrated through several networks in different intercontinental boundaries in the course of using most of the existing legal computer apps. Another concern is that unproven juveniles that are suspects of the intrusions into computer apps may (or may not) necessarily commit the offense. Some juveniles may not possess software engineering skills that they require to design apps that will conform to best global standards. For these reasons, the foreseeable impacts and the confidence that users usually have in computer apps are constantly threatening the trust, customers' loyalty, recommendation and continuous usage of the current groups of computer apps in the software industry.

The legal interpretation and the technicality of cases of violations and misdemeanors regarding modern computer apps have now raised four pondering issues that require lateral deliberation and special attentions [3]. Firstly, the emergence of accidental (inadvertent, unintentional or unplanned) damages that can be incurred by end-users based on "the services and the trust in computer apps", especially if the events are proven (or suspected) to be directly caused by the occurrence of unexpected intrusions against the modern computer apps they use must require in-depth legal consideration. Secondly, the criminal consent of underaged children demands urgent review in law books and contemporay bulletins. Thirdly, the issue of transfer of criminal liability in the circumstances of using an apps and getting into "avoidable trouble" and fourthly, the circumstances whereby some legitimate apps may be held (or charged) by complainants for being liable to have criminally permitted some juvenile crimes (that left the victims with severe impacts) to have permeated (infused, pervaded) or

spread through them. After all, some statutory laws legalize complainants to institute legal actions against some manufacturers of items (or products) for the accidental (involuntary or unexpected) damages they have incurred by virtue of the trust they have in their products (or services) and in the course of using their products, services or items. The above legal paradigms and discourses are new debatable issues that we have put forward in this chapter to the criminologists and legal experts in the domains of computer apps to critically explore [8].
