Preview

Cyber Crime

Good Essays
Open Document
Open Document
8636 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
Computer Crime and e-Evidence

What is the link between the development of technology and criminal offences?

Trends are developing to shift the nature of crimes from traditional to Hi-Tech and it is impossible to prevent people from misusing technology to commit crimes. Computer or networks may be used as a tool or a storage medium to commit crimes. In the meantime, we must keep in mind that all computers related systems are vulnerable to destruction and intrusion. As a result some authors classify computer crimes under three areas such as :

1.Computer related offences – the accused uses the computer/network as tool/s to commit offences.

2. Computer integrated offences – the accused commits offences through Computer/system/programme e.g. modification by virus, Trojan horse etc.

3. Contents related offences – the accused changes/destroys data e.g. offences relating to intellectual property.

Under these circumstances, application of new methodology to investigate and seizure of data stored in Computer hardware, software, communication devices, or any other forms, its forensic issues will play a vital role relating to Computer Crimes.

What is the legal position on Computer Crimes in Sri Lanka?

The Parliament of Sri Lanka has enacted the long awaited Computer Crime Act and that was gazetted on the 13th July 2007. However, there is no implementation of the Act up to date due to various shortcomings of the Administration of the country such as public unawareness of the existence of the Act, shortage of experts, trained Police officers to investigate offences under the Act, non-availability of computer forensic laboratories.

What are the major Offences under the Computer Crime Act?

Part I of the Act explains the offences relating to cyber crimes. These offences are common offences (subject to some variations) identified and recognised internationally.

What is Computer hacking ?

Section 3 of the Act deals with ‘unauthorised access’

You May Also Find These Documents Helpful

  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    Whichever the case, computer forensics can be used to investigate computer related crime or misconduct. “Computer forensics is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law” (Rouse, 2007). This means that the information that is gathered must follow strict rules for forensic investigation. These rules may vary from state to state but are at least responsible for strict control over how the evidence is obtained, protected, and documented. “The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    The themes of forbidden love, tragedy, loss and isolation are closely interlinked in “Romeo and Juliet”. Shakespeare uses imagery throughout the play to highlight their importance. The forbidden love of Romeo and Juliet is described using religious language, imagery of contrasting light and darkness, and nature; tragedy is emphasised by the imagery of death throughout the play; isolation can be seen in the language and actions of both the central characters, and loss is experienced in terms of both lost love, and loss of life, adding to the weight of the tragedy.…

    • 2659 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Perhaps the most dominant characteristic of the Romantic movement was the rejection of the rational and the intellectual in favor of the intuitive and the emotional. In his critical theories and through his art, Poe emphasized that didactic and intellectual elements had no place in art. The subject matter of art should deal with the emotions, and the greatest art was that which had a direct effect on the emotions. The intellectual and the didactic was for sermons and treatises, whereas the emotions were the sole province of art; after all, Poe reasoned, man felt and sensed things before he thought about them. Even Poe's most intellectual characters, such as M. Dupin ("The Purloined Letter," "The Murders in the Rue Morgue," etc.), rely more on intuition than on rationality.…

    • 258 Words
    • 2 Pages
    Good Essays
  • Good Essays

    An example of the professional issue is the typical case in which a person visited the dentist to make a simple checkup and received a misdiagnosis. The patient was diagnosed with the presence of dental caries for the Doctor who is working since a few weeks with us in this clinic. In addition, the patient has applied the principle of autonomy. She decided to refuse the treatment recommended by the doctor.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cyber crimes here in the United States are becoming very dangerous and serious, this could include online scams, also here in the United States we are the highest target for cyber crimes. And sometimes, it is very hard to measure the extent of cyber-crime in the US, due to the fact that when authorities record cyber-crime, they don't necessarily record it as a computer-related offense. It is most often recorded as fraud or some other conventional crime. The people who hack alone cost the US billions of dollars every year.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Personal Data Breach

    • 889 Words
    • 4 Pages

    As this became more of an issue, what with the growing use of information systems, in 1990 the Computer Misuse Act was passed. The act recognised the following offences:…

    • 889 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime is an unlawful act commited using a computer (and/or internet), where it can be either a tool or a target or both. It can also be defined as any unethical activity facilitated by or commited with computer and information technologies.…

    • 1906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Detection of Cyber Crime

    • 1029 Words
    • 5 Pages

    The term 'cyber crime' has not been defined in any Statute or Act. A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. These acts committed are punishable by the IT Act.…

    • 1029 Words
    • 5 Pages
    Good Essays