Preview

Computer Crime Is Increasing

Powerful Essays
Open Document
Open Document
1442 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime Is Increasing
Computer Crime Is Increasing

A report discussing the proposition that computer crime has increased dramatically over the last 10 years.

Introduction

Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their contents are damaged, for example when vandals attack the computer itself, or when a "computer virus" (a program capable of altering or erasing computer memory) is introduced into a computer system.

As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators ' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts.
Examples of these types of crimes are complex embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal or alter valuable information from an employer.

Variety and Extent

Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, burglary, sabotage, espionage, murder, and forgery. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses i.e. persons with the requisite skills, knowledge, access, and resources. Much of known computer crime has consisted of entering false data into computers. This method of computer crime is simpler and safer than the complex process of writing a program to change data already in the computer.

Now that personal computers with the ability to communicate by telephone are prevalent in our society, increasing numbers of crimes have been perpetrated by
computer



Bibliography: Bequai, August, Techno Crimes (1986). Mungo, Paul, and Clough, Bryan, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (1993). Norman, Adrian R. D., Computer Insecurity (1983). Parker, Donn B., Fighting Computer Crime (1983). Dodd S. Griffith, The Computer Fraud and Abuse Act of 1986: A Measured Response to a Growing Problem, 43 Vand. L. Rev. 453, 455 (1990).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    different types of computers whether its locking your car or relieving an exhausted pilot a…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    “It is so good of you to finally decide to grace us with your presence detective. How was your vacation with the rich and famous?”…

    • 1526 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    I want to be genuine and spontaneous and me; but you've got to help me.…

    • 3158 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    The Industrial Revolution was a period of great innovation and movement that affected the whole world; in one way or another. There were plenty of reason why the revolution emerged in Great Britain, they included steadiness in their social, economic, and political views. Britain worked sedulously especially on their navy, since the country was surrounded by water that played an enormous role on their part. The ocean helped in varies openings to a world of an endless opportunity both in economic and political sectors. Another important advantage the British had were colonies, which provided limitless supply of raw materials at little to no cost to the British. This way they were able to steadily grow at a faster rate, because of having invented Spinning Jenny and Water Frame. Spinning Jenny was invented by James Hargreaves, the main reason why it became popular was because the simple mechanics it used, not to mention it was quite economical to use. The Water Frame was invented by Richard Arkwright, it came to existence particularly used for cotton spinning mill. This steady growth could not have been carried out without the steam engine, which was invented by James Watt in 1763, the steam engine made quick and cheap way to transportation in just a couple of hours to days depending on the distance need to be covered. After hearing all these great ideas and success from this industrial revolution, the children were used badly as labors in factors, and farms. They played a significant role in this revolution to an extent that many of them were injuries operating machinery. Many future countries gained important knowledge from the British revolution that they used some of these tactics in other industrial revolutions.…

    • 1959 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The purpose of this paper is to explain the existing challenges that result from the independent nature of federal agencies, as well as the other factors that are common to each of them and discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    The NSA is the agency responsible for monitoring and protecting the federal government computers and networks against digital crime attacks. Most of the work that the NSA does is very secretive, therefore we do not hear about a lot of their success. The do provide information security training to many different government and private agencies, they also provide information security through security tools, security products, threat warnings, analysis of attacks and security bulletins. (Taylor and Fritsch, 2011)…

    • 611 Words
    • 2 Pages
    Good Essays
  • Good Essays

    - Theft – refers to when the attacker also steals the information from the user or system and use it for personal…

    • 910 Words
    • 4 Pages
    Good Essays