Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.
Out of the many crimes that use IT systems, the one that cost us the most would have to be identity theft. Biegelman states, “Simply put, identity theft is the stealing of your good name and reputation for financial gain. Yet not everyone can agree on a suitable meaning of the term. The definition of this crime differs among law enforcement, regulatory agencies, and the many studies of this subject” (2). There is big money at stake and the financial rewards for criminals are almost limitless, they go to amazing lengths to defraud their victims.
The Federal Trade Commission (FTC) estimates that as many as 9 million people have their identities stolen each year (FTC, 2012). Experts agree that identity theft is a serious problem, and special precautions must be taken to avoid it. When people become the victims of identity theft, they are unaware of what just happened, and they need answers. According to the FTC, Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars...
Please join StudyMode to read the full document