Preview

Computer Crimes

Powerful Essays
Open Document
Open Document
4386 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crimes
Park University

Computer Crimes
Technology in a Global Society CS300

Table of Contents…………………………………………………….2

Introduction…………………………………………………………..3

(Research Discoveries)
Origins of Computer crimes………………………………………….4

Internet fraud…………………............................................................5

Internet Cyber Crime………………………..…………………….…6 Personal Crimes……………………..…………………..…..6.2 Financial Crimes…………………….…………………..…..6.3

Computer hackers……........................................................................8

Computer security……………………….………………………...…9

Summery/Conclusion
Prosecution of computer crimes……….………………..……...……11

References
Works Cited………………..………………………….……..............13

Introduction

A computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and access to the Internet, along with the knowledge of how to use it. Pizza explains that, “The known history of computer crimes is not as old as computing is. One can perhaps say that the history of crimes started with the invention of the computer virus” (Kizza). Since the introduction of computers to our society in the early 1980’s, our world has never been the same. Suddenly our physical world got smaller and the electronic world grew to an endless electronic reality. As we approach the year 2015, humanity will further itself into the Information Age.
Computer technology has brought us into an era that is no longer run by man but instead is dependent on computers due to their incredible capabilities. Mankind has progressed further in the last fifty years than any other period of history. With the introduction of the computer a new form of crime was created. These crimes referred to as computer crimes are varied but all involve criminal activities such as theft, fraud, forgery and



References: ISBN: 978-1-4471-4989-7 (Print) 978-1-4471-4990-3 Marc Santora, May 9, 2013, In Hours, Thieves Took $45 Million in A.T.M Retrieved from: http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?pagewanted=all Brett Molina, August 25, 2014, Sony 's PlayStation Network targeted in attack, M. E. Kabay, PhD, CISSP-ISSMP (2008). A Brief History of Computer Crime: An Introduction for Students. Retrieved from: http://www.mekabay.com/overviews/history.pdf Concordia University (2008). “Who we are: History.” Retrieved from: http://www.concordia.ca/about/whoweare/ourhistory/sgw.php Whiteside, T. (1978). Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: New American Library Work Cited page (Internet fraud) National White Collar Crime Center (NW3C). Internet Fraud (2013). Retrieved from: http://www.nw3c.org/docs/research/internet-fraud.pdf?sfvrsn=8

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.…

    • 1206 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Figure 3, Guarded conditions (1989) shows repetitions of eighteen polaroids of a woman in a white dress, with text below. Her posture signifies that she is guarded as she is facing away from the camera with her arms crossed behind her back. It is clear that she is guarding something, the beholder does not know what, but it could be assumed a identity or a secret. The position of her arms portrays a sense of nervousness, as though she is shielding something from the viewer. It is suggested that "Simpson's work is built on the juxtaposition and gesture of re-enactment" (Simon, 2013, p9).…

    • 931 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article goes into detail about the most widely known source of fraud: the internet…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    The growing capability of computers and applications as well as the ever increasing level of interconnectivity and information sharing has made it easier for persons with malicious intent to use computers to plan terrorism attacks, conduct intellectual property theft, credit card fraud and hack computer systems to gain access to confidential information. The sophisticated nature of these crimes has seen the growing need for experts in computer forensics.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays