Preview

Cyber Crime Research Paper

Better Essays
Open Document
Open Document
1860 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime Research Paper
Cyber Crime Research Paper Can anyone who uses a computer be a victim to cybercrime? Yes, anyone who uses a computer has a chance of being a victim of cybercrime. Cybercrime has become a big issue in today’s society. Cybercrime is defined as crimes committed on the internet using a computer as either a tool or a targeted victim(Razali). Cybercrime can be committed by many people like computer geeks looking for bragging rights to businesses trying to gain an upper hand in the marketplace by hacking competitor websites, Rings of criminals wanting to steal your personal information and sell it on black markets, or spies and terrorists looking to rob our nation of vital information or to launch cyber strikes(Computer Intrusions). Cybercrime can be used many ways.The two main cause of cybercrime are identity theft and internet stalking. Cybercrime is very bad and and can hurt many people physically and mentally, people need to be more aware of the ways to get around cybercrime.
Identity theft is one of the main cause of cybercrime. Identity theft, also know as ID theft is a crime in which a criminal obtains key pieces of personal information, such as social security numbers or driver 's license numbers, to pose as someone else(Razali). There are many kinds of identity theft. There is Criminal identity theft(posing as another person when apprehended for a crime), Financial Identity theft(using anothers identity to obtain credit, goods and services),
Identity cloning(using anothers information to assume his or her identity in daily life),Medical identity theft(using anothers identity to obtain medical care or drugs), and Child identity theft(Wikipedia). Many people out in the worlds try to steal peoples wallets, phone, purses and other belongings in plain site or while you are away from your belongings, But what are people trying to steal from you on the internet. Identity thefts on the internet can be stealing many of things. They can be taking



Cited: FBI​ . FBI, 17 Mar. 2010. Web. 04 Dec. 2014.  . FBI, 25 Aug. 2010. Web. 03 Dec. 2014.  <http://www.fbi.gov/about­us/investigate/cyber/computer­intrusions>.  .  Web. 05 Dec. 2014.  . Wikimedia Foundation, 30 Nov. 2014. Web. 04 Dec. 2014.  <http://en.wikipedia.org/wiki/Cyberstalking>.  . Wikimedia Foundation, 12 Apr. 2014. Web. 05 Dec. 2014.  <http://en.wikipedia.org/wiki/Identity_theft>.

You May Also Find These Documents Helpful

  • Good Essays

    This hands-on laboratory exercise is a highly simplified model that attempts to simulate evolution by means of natural selection. Predators will act as agents of selection on their prey, a species whose members vary in color. We will assume that color is an inherited trait. Small squares of paper will represent the prey, which will be spread out of a piece of printed colored fabric that will serve as the habitat. The predators (you) will prey upon the population, with the surviving members reproducing and passing along the genes for color.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Better Essays

    In the story "The Yellow Wall-Paper", by Charlotte Perkins Gilman, readers watch a woman as she descends into madness. The first time I read this story nothing more occurred to me than a woman with a mental condition finally lost it. Now that I have dug deep into the story I realized there is absolutely nothing wrong with the woman, except her husband. As a direct result of the way he treated her and constantly belittled her, out of loneliness and desperation she ended up going insane.…

    • 1119 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    Identity theft happens when someone takes "personally identifying information" such as a Social Security number, a driver's license number, or other information, and uses that information to commit fraud or other crimes.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Who is St. Teresa Margaret of the Sacred Heart? Though not commonly known, St. Teresa Margaret lived out a wonderful spiritual life and devoted herself completely to God. Her…

    • 714 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Courts

    • 350 Words
    • 2 Pages

    Once they have your personal information, identity thieves use it in a variety of ways.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Throughout the years, identity theft has become extremely prevalent and has affected many people. It’s important for everyone to know why identity theft began and the importance of it. There are many causes of identity theft that lead to negative effects. Identity theft is a serious problem that should not be taken lightly. Many people have gotten their wallet stolen or their purse and this is very common. Often times, people put their information on the internet when they do not know exactly who this information is going to. There are thousands of people out there who are out to get your money and/or identity. The things we frequently wonder are why these people take all our information and money. We do not fully understand the causes of…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Global Crimes Analysis

    • 702 Words
    • 3 Pages

    Another major global crime that is an issue in society is cyber crime it is one of the…

    • 702 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    A case of cybercrime that is very relevant is that of Jonathan James. He was the first juvenile to…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Identity Theft

    • 3014 Words
    • 13 Pages

    Identity theft is committed every day in the United States. This form of crime can be extremely serious and life changing. The amount of resources the United States puts toward the prevention of identity theft is just not enough. Identity theft can harm a persons’ entire life because of all the damage that the thief can cause in such a short amount of time. Identity theft is a threat to everybody and the world as a whole should be more aware of the consequences because of all the pain it can cause. Being the victim of identity theft comes with severe consequences and the attorney general’s office, police departments, and banks need to start educating the population about this issue.…

    • 3014 Words
    • 13 Pages
    Best Essays

Related Topics