Subtopic: Technology Misuse
Why did you choose this topic?
Cybercrime is a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity. Additionally, although the term cybercrime is more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, the term is also popularly used to include traditional crimes in which computers or networks are used to facilitate the illicit activity, or where a computer or network contains stored evidence of a traditional crime.
There are different ways on how a cybercrime is committed. There are different types of cybercrime. Certain other information crimes, including trade secret theft and economic spying, are sometimes considered cybercrimes when computers or networks are involved.
Summary:
With the development of computers and the information age, our lives have changed in ways that were once considered unimaginable. Around the world, technical innovations are being created on a daily basis. Computers and Internet are now being introduced to some of the most remote parts of the world. I chose this topic because as our world connects more complicatedly than ever before, the more our privacy and security levels are being pushed. The more connected our world becomes, the easier it is to access private and copyrighted information, as well as become susceptible to computer crimes and technology misuse. But before we can understand why computer crimes are committed and technologies used improperly, it’s important for us to understand the origins of computer ethics and why it’s important for us to integrate ethics into our daily uses with computers and information technology.
Bibliography:
Moffitt, T. Technology Misuse and Cyber Crime. January 12, 2014, from
Bibliography: Moffitt, T. Technology Misuse and Cyber Crime. January 12, 2014, from https://sites.google.com/site/tommoffittportfolio/the-hre-online-experience/technology-misuse-and-cyber-crime Primer on Cybercrime