Preview

Computer Crime Is Increasing

Powerful Essays
Open Document
Open Document
1442 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime Is Increasing
Computer Crime Is Increasing

A report discussing the proposition that computer crime has increased dramatically over the last 10 years.

Introduction

Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their contents are damaged, for example when vandals attack the computer itself, or when a "computer virus" (a program capable of altering or erasing computer memory) is introduced into a computer system.

As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators ' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts.
Examples of these types of crimes are complex embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal or alter valuable information from an employer.

Variety and Extent

Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, burglary, sabotage, espionage, murder, and forgery. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses i.e. persons with the requisite skills, knowledge, access, and resources. Much of known computer crime has consisted of entering false data into computers. This method of computer crime is simpler and safer than the complex process of writing a program to change data already in the computer.

Now that personal computers with the ability to communicate by telephone are prevalent in our society, increasing numbers of crimes have been perpetrated by
computer



Bibliography: Bequai, August, Techno Crimes (1986). Mungo, Paul, and Clough, Bryan, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (1993). Norman, Adrian R. D., Computer Insecurity (1983). Parker, Donn B., Fighting Computer Crime (1983). Dodd S. Griffith, The Computer Fraud and Abuse Act of 1986: A Measured Response to a Growing Problem, 43 Vand. L. Rev. 453, 455 (1990).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    different types of computers whether its locking your car or relieving an exhausted pilot a…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The purpose of this paper is to explain the existing challenges that result from the independent nature of federal agencies, as well as the other factors that are common to each of them and discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    The NSA is the agency responsible for monitoring and protecting the federal government computers and networks against digital crime attacks. Most of the work that the NSA does is very secretive, therefore we do not hear about a lot of their success. The do provide information security training to many different government and private agencies, they also provide information security through security tools, security products, threat warnings, analysis of attacks and security bulletins. (Taylor and Fritsch, 2011)…

    • 611 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Some of the crimes whose primary target is the computer or devices within the computer include computing or creating viruses, malicious and malware codes and denial of service attacks. On the other hand activities that would fall under the second category include identity theft, cyber stalking, information warfare and fraud (Siegel, 2008).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime in America

    • 2352 Words
    • 7 Pages

    Cyber-crime is becoming a massive problem for citizens and businesses. Every day there is a hacker that gets into a computer system and causes trouble. It’s all due to businesses and individuals being careless with their computer security. People need to start realizing this is a serious issue and can affect anybody. There are numerous steps that need to be taken in order to protect individuals and businesses security. Hackers are getting smarter and want to find new ways to infiltrate your computer system. They want to find ways to get to your files and your credit card information. Hackers find new ways to get into our computers every day and know the ins and outs of computers. These hackers have the ability to shut down a national company that specializes in computer security. There are so many terrible things that these hackers can do to your computer. We need to take the proper steps to protect ourselves and to ensure that the hackers do not harm us or our computers.…

    • 2352 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    - Theft – refers to when the attacker also steals the information from the user or system and use it for personal…

    • 910 Words
    • 4 Pages
    Good Essays