Preview

Computer Ethics Essay Example

Good Essays
Open Document
Open Document
485 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics Essay Example
Computer crimes such as malicious attacks on software, identity theft, and illegal distribution are quickly becoming big problems that are not easily enforceable. When average people hear the words "computer crime", they often think of obscene pictures available on the Internet or solicitation of children for sex by pedophiles via the Internet. The legal problem of obscenity on the Internet is the same as the legal problem of obscenity in books and magazines. It is not as pressing as other Internet crimes. There are no precise, reliable statistics on the amount of computer crime and the loss to victims. These silent crimes are not detected by victims and therefore are not reported to authorities. This in turn leads to a miscalculation about both the number of computer crimes committed and the damage. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is rapidly increasing. There are three major classes of criminal activity with computers: unauthorized use of a computer (stealing a username and password), creating or releasing a malicious computer program (computer virus, worm, Trojan Horse), and harassment and stalking in cyberspace.

Many crimes involving computers are no different from crimes without computers. The computer is only a tool that a criminal uses to commit a crime. These are examples of what is considered a crime:
• Using a computer, a scanner, graphics software, and a high-quality color laser or ink jet printer for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.
• Stealing a laptop computer with information stored on the hard disk inside the computer is the same crime as stealing a briefcase that contains papers with proprietary information.
• Using the Internet or online services to solicit sex is similar to other forms of

You May Also Find These Documents Helpful

  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    Whichever the case, computer forensics can be used to investigate computer related crime or misconduct. “Computer forensics is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law” (Rouse, 2007). This means that the information that is gathered must follow strict rules for forensic investigation. These rules may vary from state to state but are at least responsible for strict control over how the evidence is obtained, protected, and documented. “The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital evidence is not readable; however a printout is can be submitted as evidence under the "best evidence rule". The best evidence rule applies when a person wants to submit a copy of a document because the original document is unavailable (Nolo Dictionary, 2011).…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    CATEGORIES OF COMPUTER CRIMES:  Targeting the computer: When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.…

    • 938 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Stealing is pretty much putting your life in jeopardy, your reputation gets ruined, there are consequences to face, and it is illegal and of course forbidden.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    illegally accessing a computer system ranges from 6 months to 5 years or a fine.…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    A cybercrime suspect can sometimes use creative means to commit his or her criminal offense. Some examples of sources a cybercrime suspect controls from which digital evidence may be obtained are listed below.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bay Raif Sarıca

    • 7918 Words
    • 41 Pages

    well as loss of proprietary information costing millions of dollars. All of this has led to an…

    • 7918 Words
    • 41 Pages
    Good Essays