Preview

Digital Crime

Powerful Essays
Open Document
Open Document
5203 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Crime
Digital Crime Evidence and Procedures Digital

TITLE:
Compare and contrast the four different categorizations of computer crimes

Abstract
Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.

Introduction

A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also



References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx The Internet crime complaint center Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html Computer crime - categorizing computer-related crime Wright, Scott. (2001, January 22). Www.hackerheaven.edu. Community College Week, Retrieved from http://findarticles.com/p/articles/mi_7781/is_12_13/ai_n32870192 Taylor, R., Caeti, T., Loper, D., Fritsch, E., & Liederbach, J Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library Carter, David Carter, David. (1995). Computer crime categories: how techno-criminals operate. The FBI Magazine, Retrieved from http://www2.fiu.edu/~cohne/Theory%20S09/Ch%2014%20-%20Types%20of%20computer%20crime.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cited: Reinman, David P. “Fighting Cybercriminals.” Cybertech Montly February 2008: 52-58. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.html>. Turrell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, said federal authorities. (The Associated Press, 2013). This story was in the headlines in the news early last year around February. It is a great illustration to show the harshness of cybercrime and the degree to which it has a greater likelihood for destruction than traditional crime. Robbing a bank traditionally meant secluded instances at individual banks. Cybercrime unlocks new accesses to delinquents where they have the influence to take advantage of complete associations in ways that would not have been imaginable traditionally.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cover an array of offense by examining several existing definitions of computer crime, as well as…

    • 2776 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Running head: THE GROWING THREAT OF COMPUTER CRIME The Growing Threat of Computer Crime Diana Ritter Baker College of Cadillac May 9, 2001 Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to manipulate information and access computers by telephone, increasing numbers of crimes--electronic trespassing, copyrighted-information piracy, vandalism--have been committed by computer hobbyists, known as hackers, who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programming. It was a challenge to all hackers, and an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result. The Growing Threat of Computer Crime Do you think your company’s computer systems are secure? Think again. Billions of dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal. Crimes such as embezzlement, fraud and money laundering are not new. However, each of these crimes now…

    • 3261 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 751 Words
    • 4 Pages

    The rapid growth of the internet and computer technology over the past few years has led to the growth in new forms of crime-dubbed cyber crime- throughout the world. Based on statistics on the various forms of cyber crime and other evidence which form of cyber crime pose the most serious threat to individuals and business? What concrete steps should government take to protect individuals’ n companies from cyber criminal? What can individual and business do to protect themselves against cyber crime?…

    • 751 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyber-crimes can be divided into two broad categories; the first category involves attacks on computer hardware and software tools, such as botnets, network intrusions, and malware. The category involves cybercrimes of financial nature such as online fraud and penetration of online financial services (Brenner, 2010). Others include phishing, corporate account takeover and theft of intellectual properties. Cyber-crimes are committed across geographical boundaries, with the perpetrators taking advantage of the internet to propel their criminal activities. The convenience, anonymity and increased profitability of cyber-crimes have increased the proliferation of cyber-crimes in recent years. Eighty percent of modern cyber-crimes are estimated to originate from organized criminal activities. Prevalence of the crime can be attributed to the establishment of fraud-as-service, increased profitability and increasing diversification of the digital media platforms (ITU,…

    • 3110 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Security Research Paper

    • 4882 Words
    • 13 Pages

    The definition of cybercrime mostly depends upon the purpose of using the term. A limited number of acts against the confidentiality, integrity and availability of computer data or systems represent the core of cybercrime. The word ‘cybercrime’ itself is not limited to a single definition, and is likely best considered as a collection of acts or conduct, rather than one single act.…

    • 4882 Words
    • 13 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime

    • 2249 Words
    • 9 Pages

    [8] Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime, Available at: http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economic-impact-of-cyber-crime/…

    • 2249 Words
    • 9 Pages
    Powerful Essays