Computer Crime Essay

Topics: Crime, Computer crime, Malware Pages: 4 (1141 words) Published: September 13, 2013
Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.

A major issue within this industry is the fact that citizens, law enforcement officials, prosecutors, and the government don’t put cyber crime at the top of their list of dangerous crimes is because the actual act of computer crime is not in itself viewed as being dangerous. This is a traditional view of computer crime, and the book goes on to explain that, “many [stereotypical] computer criminals are non-threatening, socially challenged individuals, and 36.3% of officers believe that investigation of computer crime interferes with their ability to concentrate on ‘traditional’ crimes” (Britz, 7). Because police tend to not look too seriously at these crimes, the general public will form their own, similar opinions on the matter. This gives people an inaccurate belief about the effects of cyber crime. In fact, computer crime can and many times is violent today.

One area of computer crime that has become particularly dangerous, especially for younger generations is cyber bullying. In recent years, we have seen more and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the United States v. Lori Drew. Lori was an older woman who pretended to be a teenaged boy and began to talk and soon after started an online relationship with a 14-year-old girl. The girl eventually began to fall for the fake 16-year-old boy that Lori Drew created. After a series of conversations, their “relationship” ended with...

Cited: Britz, M. T. (2013). Computer Forensics and Cyber Crime and
Introduction (3rd ed., Vol. 3). Upper Saddle River, NJ: Pearson.

Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown and Company, .
"United States v. Lori Drew." (Feb. 2008): California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.
Webster, S. C. (2013, June 20). Lawmakers Propose Cyber Crime Reforms. Retrieved from Raw Story website: http://www.rawstory.com/rs/2013/06/20/lawmakers-propose-cyber -crime-reforms-inspired-by-aaron-swartz/
Wilson, T. (n.d.). How Phishing Works. Retrieved June 30, 2013, from How Stuff Works website: http://www.howstuffworks.com/phishing.htm
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • CYBER CRIME Essay
  • Cyber Crimes and Steps to Prevent and Control Essay
  • Computer Crimes Essay
  • Crime Essay
  • Introduction to CYber Crime Essay
  • cyber crime Essay
  • Essay on Cyber Crime
  • Cyber Crime Essay

Become a StudyMode Member

Sign Up - It's Free