Preview

Cyber Crime

Best Essays
Open Document
Open Document
2925 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
Content Page

1. Introduction 2

2. Cyber Crime

1. Classification of cyber crime 3

2. Comparison of cyber crimes in Malaysia and USA 6

3. Suggestion of reduce cyber crimes 9

3. Conclusion 11

4. References 12

1.0 Introduction

Since the internet had been introduced to public during the mid-1990s, it had changed the human’s lifestyle. Until now, with the finger clip at home, we can buy all the things we need, enjoy the music and movie without going to cinema, and also contact with friends and families whose are staying at other countries. Computer and internet have brought a lot of convenience to us. They make our life easier and complete. But just like a Chinese proverb mentioned: “water can carry a boat, can also capsize it.” Internet and computer can bring many benefits when we use it wisely and vice versa, it also giving the chance to the criminals to use it to prey on unsuspecting victims who are IT-savvy.

Thus, in this paper, we will discuss about the criminal that happen by using internet and computer that is cybercrime. Before we discussed further about the cybercrime, we need to know the definition of cybercrime first. According to the definition of Symantec Company which produce Norton antivirus, cybercrime can be defined as “any crime that is committed using a computer or network, or hardware device”. The computer or device may be the agent of the crime, the facilitator of the crime or the target of the crime.



References: 1. Symantec Corporation. (n.d) what is Cybercrime? Retrieved 10 October, 2011, from http://us.norton.com/cybercrime/definition.jsp 2. Prashant Mali. (2009) classification of cybercrime. Retrieved 11 October, 2011, from http://www.lawyersclubindia.com/articles/Classification-Of-CyberCrimes--1484.asp 3. Wikipedia. (2011) Credit card fraud. Retrieved 11 October, 2011, from http://en.wikipedia.org/wiki/Credit_card_fraud 4. The Star Online. (2011) Hacker asks law expert’s e-mail contacts for money. Retrieved 14 October, 2011, from http://thestar.com.my/news/story.asp?file=/2011/1/14/nation/7797993&sec=nation 5. Federal Bureau of Investigation. (2010) Congressional Report Pro IP Act Annual Report 2010. Retrieved 17 October, 2011, http://www.justice.gov/criminal/cybercrime/proipreport2010fbi.pdf 6. Jo TimBuong. (2011) Cybercrimes continue to rise. Retrieved 18 October, 2011, from http://techcentral.my/news/story.aspx?file=/2011/9/23/it_news/20110923182141&sec=it_news 7. Techterms. (n.d) Cybercrime. Retrieved 19 October, 2011, from http://www.techterms.com/definition/cybercrime

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Web's Dark Side

    • 835 Words
    • 4 Pages

    U.S. News and World Report, whom the team of authors is employed for, sent a team of reporters out for one particular week to discover a host of crimes in the online world, and the rest of the article is spent reviewing cases discovered, culminating with a week-in-review list of the reporter’s findings.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    References: Cybercrime. (2013). In C. Bates et al. (Eds.), Global social issues: An encyclopedia. London, United Kingdom: Routledge. Retrieved from http://ezproxy.apus.edu/login?url=http://search.credoreference.com.ezproxy2.apus.edu/content/entry/sharpesi/cybercrime/0…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    capstone analysis

    • 535 Words
    • 2 Pages

    A cybercrime is a crime that is committed on a computer. There are several different types of crimes that are considered cybercrimes. A few examples of these crimes are virus spreading, hacking, fraud, and cyber bullying. A large amount of identity theft is committed online, and this has become a huge problem. According to "What Is Cyber Crime?" (2015), “reports of alleged computer crime have been a hot news item of late. Especially alarming is the realization that many of the masterminds behind these criminal acts are mere kids. In fact, children no longer need to be highly skilled in order to execute cybercrimes. "Hacker tools" are easily available on the Net and, once downloaded, can be used by even novice computer users” (para. 3).…

    • 535 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber war Vs Cyber terrorism

    • 3714 Words
    • 13 Pages

    In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the negative and positive aspects in view of the introduction of computers and telecommunications techniques as follows: Firstly, it raises awareness with regard to the new age of crimes, termed as cyber crimes. The paper focuses, in particular, on the difference between the two common types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having graduates through e-learning. Thirdly and lastly, the paper discusses on whether computer practitioners should be required to have a practicing license as it is with other professionals such as doctors, lawyers and teachers.…

    • 3714 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Technology and Crime

    • 2517 Words
    • 11 Pages

    Examples of these crimes include, electronic funds transfer crime, electronic money laundering, [2]counterfeiting, and software piracy.[3] Contrary to traditional property offences, computers coupled with telecommunications technology enables offenders not to leave any traces of usual biological evidence in interpersonal offences such as finger prints or hair that could lead to the offender through forensic tests. Even if the police traced back the computer that the fund transfer crime was originated, the actual offender would be uncertain if it’s located in internet café which is used by numerous customers. This anonymity is considered the major attraction for offenders with advanced computer skills to commit such crimes. This paper will discuss the effectiveness of the current law in protecting the people from the new treats and possible policies or methods that could be implemented by authorities to combat this…

    • 2517 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In our modern technology-driven age, keeping our personal information private is becoming more and more difficult. The truth is, highly classified details are becoming more available to public databases because we are more interconnected than ever. This creates a negative stigma that the use of technology is dangerous because practically anyone can access one’s private information for a price. Technology continues to promise to ease our daily lives, however, there are dangers of using technology. One of the main dangers of using technology is cybercrimes. Cybercrimes are any crimes that cause harm to another individuals by using a computer or a network ( ). While privacy and confidential information is lost or interrupted by unlawfully individuals, it gives to high profile crimes such as hacking, cyber terrorism, espionage, financial thief, spamming, cyber warfare and many more crimes ( ). The purpose of this research paper is to educate people who do not know about cybercrimes. Understanding the threat of cybercrimes is a very pertinent issue because technology…

    • 1741 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Along with computer technology's swift development, the information network already became the social development the important guarantee. The information network involves to the national government, the military, the culture and education and so on many domains, the memory, the transmission and processing many information is the government macroeconomic regulation and control decision-making, the commercial economy information, the bank fund account transfer, the stock negotiable securities, the energy resources data, the scientific research data and so on important information. And has many are the sensitive information, even is the national secret, will therefore attract unavoidably from the world's each kind of artificial attack (e.g. information divulging, information steals, data distortion, data to delete adds, computer virus and so on). Usually is very difficult using the computer-related crime to leave behind the crime evidence, this greatly has also stimulated the computer high-tech criminal case's occurrence. Computer crime rate's rapid increase causes various countries' the computer system is specially the network system is facing the very big threat, and becomes one of serious social questions.…

    • 1380 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Computer Crimes

    • 4386 Words
    • 15 Pages

    A computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and access to the Internet, along with the knowledge of how to use it. Pizza explains that, “The known history of computer crimes is not as old as computing is. One can perhaps say that the history of crimes started with the invention of the computer virus” (Kizza). Since the introduction of computers to our society in the early 1980’s, our world has never been the same. Suddenly our physical world got smaller and the electronic world grew to an endless electronic reality. As we approach the year 2015, humanity will further itself into the Information Age.…

    • 4386 Words
    • 15 Pages
    Powerful Essays