White Collar Crim: Computer Fraud

Only available on StudyMode
  • Download(s) : 58
  • Published : February 15, 2011
Open Document
Text Preview
White Collar crime has been Identified by Edwin Sutherland as “A crime committed by a person of respectability and high social status in the course of his occupation" Since technology has come into play many issues have come to surface and the crime rates have increased causing one particular branch of white collar crime known as computer fraud



White collar crime: Computer Fraud

White Collar crime has been Identified by Edwin Sutherland as “A crime committed by a person of respectability and high social status in the course of his occupation" (Sutherland, 1939) White Collar crimes are serious, but non-violent crimes that usual deal with stealing money or other material items. Majority of the time they involve scams and an degree of high intelligence is needed to actually commit and not get caught. White collar crime has victims just like violent crimes and the victim may be affected for life. A few examples of a white collar crime would be, embezzlement, Copyright infringement, money laundering, bribery, computer crimes, and different kinds of fraud. Since technology has come into play many issues have come to surface and the crime rates have increased causing one particular branch of white collar crime known as computer fraud. Computer fraud is where computer hackers steal information sources contained on computers such as: bank information, Credit cards, and proprietary information. Bank information consists of amounts, pin numbers, debit card numbers and information like that. It is obvious as to why computer fraud is a dangerous type of white collar crime committed; it affects thousands of people every day. There are many types of cyber crimes that are related to computer fraud. Hacking into networks via Phishing and fake website, financial crimes such as siphoning of money from banks, credit card frauds, money laundering, online gambling, Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations, Harassments such as cyber stalking, cyber defamation, indecent and abusing mails, Launching of virus, worms and Trojans, Cyber attacks and cyber terrorism. As a general matter, copyright infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner. The amount of Copyright infringement cases have increased dramatically lately with sites like Limewire, Frostwire and similar websites pirating music has become easy and accessible for anyone anywhere in the world. Limewire, the biggest of the file sharing websites was recently shut down on October 26, 2010. According to the injunction, Limewire “intentionally encouraged infringement” by Limewire users, it is used “overwhelmingly for infringement” and it knew about the “substantial infringement being committed” by its users. The government finally got enough information to close it down for good, but another site will surely take its place. Computer hacking has also increased. Computer’s automatically store numerous files that contain your most sensitive data like your address, name and even credit card information. Spyware is often used by hacker’s and legitimate companies. Once it is installed into a computer it has the ability to monitor a user’s activity and collect information without their knowledge or consent. Other approaches include a system called phishing in which the hacker sends out a bunch of emails, and take advantage of the person by stealing credit card information and other things like that. The email may claim it’s from a bank and look legitimate, but once you send your information through the site it has now been given to someone to steal money or purchase numerous items causing horrible credit and/or other things like Identity theft. Identity theft is the biggest problem as a result of computer fraud. This process is when someone basically steals individual’s...
tracking img