Preview

High Tech Offenders

Good Essays
Open Document
Open Document
863 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
High Tech Offenders
Cyber crimes

Thesis:
Cybercrime, hacking, blackmailing, fraud, piracy, cyber bullying, this are some types of crimes th at come to mind when we hear technology and crime. Every day we use technology as a part of our daily living. We are surrounded by technology we depend on technology. But this has also o pen new door for criminal to conduct their crimes. This also makes us vulnerable to those who have mater it.
Microsoft piracy case 25 men were arrested and 11 where proven guilty in the national copy right Microsoft counter eiting ring. The fraudulent Microsoft cds and DVDs where sold online and where shipped from c hina to anywhere in the united stated and to Europe. The imitation Microsoft software was valu ed at 500 million dollars. Differential association theory states that criminal actions are a result of the friendships of or companionship with others. Differential association theory explained th at a person could not commit a crime without first being trained. Without prior influence, is inc apable of inventing criminal behavior. a) techniques of committing the crime, which are someti mes very complicated, sometimes very simple; (b) the specific direction of motives, drives, ratio nalizations, and attitudes Individuals become criminal due to repeated contacts with criminal activity and a lack of contact with noncriminal activity. I believe that this counterfeiting ring was built on friendships. The 25 men must have been friends of acquaintances at some point I do not believe they would hire people who did not know about their illegal actions.

Social bond theory
Roman meydbray 27 from San Jose. A former information technology manager of creative explosions pleads guilty to getting unauthorized access to a computer of his former employer. According to the court after two weeks of his termination he got access to the computer system and deleted an email server domain and accesses the email account of the president of creative

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Choice theories are based on a perspective on crime causation that holds that criminality is the result of…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    All of our technology has come a very long way over the years. From the very first phone or television that was invented, it is unbelievable how these same devices look and function in today’s world. You now have flat screen televisions instead of tube televisions. We advanced from the first phone to now having satellite phones and cell phones. Modern technology is very amazing in one aspect, but very crippling to us in another. We have become so dependent on it that we would be lost without all of our gadgets.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    of today have become more obsessed with technology to the point that we have become the…

    • 2143 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Criminology

    • 586 Words
    • 3 Pages

    -Differential Association: Criminal behavior results from having more contact w/ individuals holding aattitudes favorable to crime than w/ those holding attitudes discouraging it.…

    • 586 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    How have criminals adapted to changes in technology? What do you consider the biggest threat to society from the criminals’ adaptation?…

    • 257 Words
    • 1 Page
    Good Essays
  • Better Essays

    Through the decades, the use of technology has allowed for much growth in all aspects of life by allowing for an evolutionary understanding in that there is always more to be discovered. Technology allows for a deeper understanding and that there is an infinite amount of knowledge to be learnt through the use of technology. Technology is a valuable tool that was created to achieve a better understanding of the world and everything around us. Evolution can bring about advancements that better help society grow in more ways than one. The evolutionary progression of technology has allowed for numerous technological advancements within the Criminal Justice System, resulting in more efficient and reliable ways to receive and process data.…

    • 1585 Words
    • 7 Pages
    Better Essays
  • Good Essays

    A. Most of the people in these interviews are poor, young males with similar social structures. Growing up on the streets and in bad neighborhoods can influence the interactions that each of these people will have. These interactions can result in definitions favorable to crime because these people are beginning to surround themselves and interact with people who are already doing illegal actions. (Hagan, p.89). In the article it gave an example of how a group of friends may be doing coke and once it runs out someone in the group, that has developed their own belief in what’s right and what’s wrong, suggests doing burglary in order to get some money for more coke. A new person within the group may feel pressure in continuing in order to maintain their status and relationship with the members in the group. Here they are learning new attitudes and accepting new values that are favorable to crime (Hagan, p. 89). The behavior being learned is that burglary can help with any immediate needs and together they rebel against the law. The new member may now start to change what they believe is right and wrong and could begin acting in more frequent illegal actions. These burglars have the belief that burglary is okay because it is a matter of “day to day survival”. This shows that they have their own interpretation on what they think is right and wrong which is a learned definition favorable to crime. In the interview Wild Will proved this theory by describing that when he is in need of money he thinks to himself, “How do I know how to get money quick and easy?” He at one point had to have learned that an immediate fix to a bump in the road,…

    • 890 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Computer Associates

    • 1339 Words
    • 6 Pages

    The Securities and Exchange Commission announced securities fraud charges against Computer Associates International, Inc. and three of the company 's former top executives -- Sanjay Kumar, former CEO and Chairman, Stephen Richards, former Head of Sales, and Steven Woghin, former General Counsel. The SEC alleges that from 1998 to 2000, Computer Associates routinely kept its books open to record revenue from contracts executed after the quarter ended in order to meet Wall Street quarterly earnings estimates. In total, Computer Associates prematurely recognized $2.2 billion in revenue in FY2000 and FY2001 and more than $1.1 billion in premature revenue in prior quarters. In addition, Computer Associates, through former executives Kumar, Richards and Woghin and others, obstructed the SEC 's investigation into the company 's accounting practices.…

    • 1339 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    TECHNOLOGY AND CRIME

    • 946 Words
    • 4 Pages

    The first thing that needs to be said is that Cell phones, email and instant messaging have facilitated the criminals into “doing their job” by lessening their communication gap to only seconds. It is important to add that criminal masterminds from different countries no longer have to sit in the same conference room and plot, with the fear of any law enforcement agency locating their secret meeting place. All they have to do is either talk to each other on their cell phones using conference calling and send and receive written and graphical information on the same device, or simply send an email. This is one of the major reasons why crimes such as car theft, robbery, stalking and terrorism have mounted. Crimes like drug dealing don’t depend on letters, or dealers to visit the purchaser personally anymore. A simple phone call will suffice as a source of contact between the two parties. A phone call and the price will be…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Governments in different countries fight computer software piracy; in which it provides support to national programs in order to educate and provide awareness to business communities.…

    • 1766 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Online Banking

    • 2749 Words
    • 11 Pages

    U.S. Code Collection. Title 18 Part I Chapter 47 Sec 1030. Fraud and Related Activity in Connection with Computers. September 23 2005.…

    • 2749 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime.…

    • 5098 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    For the past few years, Malaysia has been slowly in the Information Technology area. Malaysians are more IT literate and the awareness towards technology usage has increased. The high demand towards technology encouraged the country to open up more technological industries. For instant, due to the demands and needs of the users, a small Scottish software company designed software where it allowed users to safely share and communicate in a secure and safe environment. Without any marketing, the company manages to show a sign of growth through word of mouth. Meanwhile, this led to the escalating software piracy record. Thus, software piracy is about to overshadow the Malaysia’s reputation. The Malaysia government is trying their level best to fight against this crime for years.…

    • 5625 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Computer Crimes

    • 1328 Words
    • 6 Pages

    A computer crime would be defined as criminal activity where a computer or network is the source or place of a crime. Computer crimes have become more common in today’s society. In the old days people would rob banks to get a pay out, nowadays people are committing crimes through computers. Besides the obvious difference, computer crimes have a much larger pay out than the old fashioned bank robbery. Someone who may rob a bank could walk away (that’s if they get away) with a couple hundred thousand, someone who commits a crime through the network will walk away (they usually get away) with millions. Personally I believe the reason for increasing computer crimes is because so many are unaware of them.…

    • 1328 Words
    • 6 Pages
    Good Essays