Preview

Digital Crime

Powerful Essays
Open Document
Open Document
5203 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Crime
Digital Crime Evidence and Procedures Digital

TITLE:
Compare and contrast the four different categorizations of computer crimes

Abstract
Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.

Introduction

A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also



References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx The Internet crime complaint center Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html Computer crime - categorizing computer-related crime Wright, Scott. (2001, January 22). Www.hackerheaven.edu. Community College Week, Retrieved from http://findarticles.com/p/articles/mi_7781/is_12_13/ai_n32870192 Taylor, R., Caeti, T., Loper, D., Fritsch, E., & Liederbach, J Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library Carter, David Carter, David. (1995). Computer crime categories: how techno-criminals operate. The FBI Magazine, Retrieved from http://www2.fiu.edu/~cohne/Theory%20S09/Ch%2014%20-%20Types%20of%20computer%20crime.pdf

You May Also Find These Documents Helpful

  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several different theories that could be used to describe those who commit computer crimes. I am going to summarize Choice Theory and why I think it is most relevant to computer crimes. The Choice Theory basically in a nut shell says that a person will choose to commit a crime even after weighing the positive and negative outcomes of doing so. To this person they see a quick opportunity to make money or cause a disruption and no matter what the consequence will still choose to offend. There are other types of crimes that could be related to this theory as well such as theft, burglary and robbery. When…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cited: Reinman, David P. “Fighting Cybercriminals.” Cybertech Montly February 2008: 52-58. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.html>. Turrell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber-crimes can be divided into two broad categories; the first category involves attacks on computer hardware and software tools, such as botnets, network intrusions, and malware. The category involves cybercrimes of financial nature such as online fraud and penetration of online financial services (Brenner, 2010). Others include phishing, corporate account takeover and theft of intellectual properties. Cyber-crimes are committed across geographical boundaries, with the perpetrators taking advantage of the internet to propel their criminal activities. The convenience, anonymity and increased profitability of cyber-crimes have increased the proliferation of cyber-crimes in recent years. Eighty percent of modern cyber-crimes are estimated to originate from organized criminal activities. Prevalence of the crime can be attributed to the establishment of fraud-as-service, increased profitability and increasing diversification of the digital media platforms (ITU,…

    • 3110 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Running head: THE GROWING THREAT OF COMPUTER CRIME The Growing Threat of Computer Crime Diana Ritter Baker College of Cadillac May 9, 2001 Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to manipulate information and access computers by telephone, increasing numbers of crimes--electronic trespassing, copyrighted-information piracy, vandalism--have been committed by computer hobbyists, known as hackers, who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programming. It was a challenge to all hackers, and an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result. The Growing Threat of Computer Crime Do you think your company’s computer systems are secure? Think again. Billions of dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal. Crimes such as embezzlement, fraud and money laundering are not new. However, each of these crimes now…

    • 3261 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Types of Computer Crimes

    • 487 Words
    • 2 Pages

    Computer crime in today’s world has become more common than in the past. Everywhere you go there is always some sort of Internet access. For instance most restaurants have Wi-Fi for their customers to connect. Cellular networks also provide Internet access away from home making computer criminals be able to work wherever. Having the Internet at the tips of your fingers makes it easier for today’s criminals to commit a crime. There are three main categories in which computer crimes are categorized.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 751 Words
    • 4 Pages

    The rapid growth of the internet and computer technology over the past few years has led to the growth in new forms of crime-dubbed cyber crime- throughout the world. Based on statistics on the various forms of cyber crime and other evidence which form of cyber crime pose the most serious threat to individuals and business? What concrete steps should government take to protect individuals’ n companies from cyber criminal? What can individual and business do to protect themselves against cyber crime?…

    • 751 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, said federal authorities. (The Associated Press, 2013). This story was in the headlines in the news early last year around February. It is a great illustration to show the harshness of cybercrime and the degree to which it has a greater likelihood for destruction than traditional crime. Robbing a bank traditionally meant secluded instances at individual banks. Cybercrime unlocks new accesses to delinquents where they have the influence to take advantage of complete associations in ways that would not have been imaginable traditionally.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Crime

    • 2249 Words
    • 9 Pages

    References: [5] Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba (2005), Cyber-Criminal Activity and Analysis,White Paper, Group 2.…

    • 2249 Words
    • 9 Pages
    Powerful Essays