Preview

Computer Crime Hackers and Security Measures from Research Assistance

Powerful Essays
Open Document
Open Document
4490 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime Hackers and Security Measures from Research Assistance
Abstract

A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.

Introduction

It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today 's technology. The Internet can be used for criminal purposes in different ways: from a simple ‘blackmail ' to the most perplex crime like money laundering.
"Technology can be applied as easily by the criminal and terrorist as it can by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves" .
Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and



Bibliography: Barrett N (1996) The state of the cybernation: cultural, political and economic implications of the Internet. Kogan page, London. Barrett N (1997) Digital crime: policing the cybernation. Kogan Page, London. Bequai A (1987) Technocrimes. Lexington Books, Lexington, Mass. Doswell R T and Simons G L (1986) Fraud and abuse of IT systems. Ncc, Manchester. Forester T and Morrison P (1994) Computer ethics: cautionary tales and ethical dilemmas in computing.(2nd) MIT Press, Cambridge, Mass. Guisnel J (1997) Cyberwars: espionage on the Internet. Plenum Press, New York. Lobbecke C Content providers on the Internet: A dicussion paper on opportunities, limits and impacts. Mandell S L (1992) Computers and information processing: concepts and applications.(6th) West Publishing, St Plant S (1997) Zeros + ones: digital women + the new technoculture. Fourth Estate, London. Porter D (1996) Internet culture. Routledge, London. Sieber U (1986) The international handbook on computer crime: computer related economic crime and the infringements of privacy. Wiley, Chichester. Taylor P (1999) Hackers: crime the digital sublime. Routledge, New York. Wasik M (1990) Crime and the computer. Oxford university press, Oxford.

You May Also Find These Documents Helpful

  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    andrew jackson: tyrant

    • 424 Words
    • 2 Pages

    “When the 1828 election rolled around, a lot of people were terrified when they heard Andrew "Old Hickory" Jackson was running. If you're wondering how a guy we're calling a bad ass got such a lame nickname, it's because he used to carry a hickory cane around and beat people senseless with it, and if you're wondering why he did that, it's because he was a f#$%*in g lunatic.” (Daniel O’Brien February 15, 2008) This quote from cracked.com illustrates the depth of the ruthlessness within Andrew Jackson, and it is this callousness that made him a tyrant of a President. His decisions were calculated.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the aftermath of the American civil war, the slave's life changed for the better as they were granted their freedom. This is so for every war in history if we look at the revolutionary war and both world war 1 and world war 2.This means that every war improves the quality of life. The aftermath of war societies both winners/losers make our society richer,safer,and improved the quality of life. In every aftermath of every war it leads to better quality of life.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    Bibliography: Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    <br><li>Jordan, T. (1999) Cyberpower: the culture and politics of cyberspace and the Internet London: Routledge.…

    • 1736 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perscriptives in the Social Sciences, 240-259.…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Digital Privacy

    • 2212 Words
    • 9 Pages

    Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. Online Submission,…

    • 2212 Words
    • 9 Pages
    Best Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Ethical Hacking

    • 1563 Words
    • 7 Pages

    Lesson 1: Introduction to Ethical Hacking | Problem Definition -Why Security? Essential Terminologies Elements of Security The Security, Functionality and Ease of se Triangle Case Study What does a Malicious Hacker do?…

    • 1563 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Disadvantages Of Internet

    • 2142 Words
    • 7 Pages

    Across the modern world, internet is practically used by lots of people because it’s really accessible and fast to use especially for college students, to apply its main purpose of convenience to do a specific task. The problem is how it really affects the academic learning of each student that perhaps instead of gaining advantages it causes bad effects for its user. As it with all new development, the Internet has its own downside. Likewise with the unpredictable developing of the World Wide Web openly mindfulness and expanding in measure of data it takes in, the Internet is not thoroughly secure and burglary is one of the various threat it postures, specialists individual data is at danger of being access by rebel persons (Inoue, 2006).Formally, that is in the school, our youth utilize the Internet for occasion, when hunting down data and when finishing tests. Casually, that is in their extra time, they talk with companions, play online PC diversions and are included in fan fiction, i.e. utilizing distributed material to make pictures and movies and so on. (Olin-Scheller & Wikström 2010).The Internet is the conclusive innovation of the Information Age, presently motor was the vector of mechanical change of the Industrial Age. This worldwide system computers, to a great extent construct these days with respect to stages of remote correspondence, gives universal limit of multimodal, intuitive correspondence in picked time, rising above space (Castells 2014).Today we live in a world in light of integration and communication, in which a thriving system of electronic frameworks and gadgets helps us explore our days (Sharma 2014).The Internet can be an excellent study resource, and is progressively being…

    • 2142 Words
    • 7 Pages
    Best Essays