Computer Crimes

Topics: Computer, Computer security, Fraud Pages: 17 (4386 words) Published: September 20, 2014

Park University

Computer Crimes
Technology in a Global Society CS300

Table of Contents…………………………………………………….2

Introduction…………………………………………………………..3

(Research Discoveries)
Origins of Computer crimes………………………………………….4

Internet fraud…………………............................................................5

Internet Cyber Crime………………………..…………………….…6
Personal Crimes……………………..…………………..…..6.2
Financial Crimes…………………….…………………..…..6.3

Computer hackers……........................................................................8

Computer security……………………….………………………...…9

Summery/Conclusion
Prosecution of computer crimes……….………………..……...……11

References
Works Cited………………..………………………….……..............13

Introduction

A computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and access to the Internet, along with the knowledge of how to use it. Pizza explains that, “The known history of computer crimes is not as old as computing is. One can perhaps say that the history of crimes started with the invention of the computer virus” (Kizza). Since the introduction of computers to our society in the early 1980’s, our world has never been the same. Suddenly our physical world got smaller and the electronic world grew to an endless electronic reality. As we approach the year 2015, humanity will further itself into the Information Age. Computer technology has brought us into an era that is no longer run by man but instead is dependent on computers due to their incredible capabilities. Mankind has progressed further in the last fifty years than any other period of history. With the introduction of the computer a new form of crime was created. These crimes referred to as computer crimes are varied but all involve criminal activities such as theft, fraud, forgery and mischief. The problem with today’s computer crimes is that the criminal justice systems have not been able to keep up with the technology change. Only a few countries have adequate laws to address the problem, and of these, not one has addressed all the legal, enforcement and prevention issues. Technology is growing much too fast for the legal system to keep with the pace. Computer crimes are often heard a lot about in the news. Since that's where the money is. Instead of settling for a few hundred thousand dollars in a bank robbery, with enough computer knowledge someone can walk away from a computer crime with millions. The National Computer Crimes Squad estimates that between 85 and 97 percent of computer crimes are not even detected. Fewer than 10 percent of all computer crimes are reported, this is mainly because organizations fear that their employees, clients, and stockholders will lose faith in them if they admit that their computers have been attacked. Few of the crimes that are reported are ever solved.

This would be considered a 21st century bank heist in which the criminals never wore ski masks, threatened a teller or set foot in a vault. In 2013, a situation occurred where thieves took $45 Million in ATM scheme (Santora). In two precision operations that involved people in more than two dozen countries acting in close coordination and with surgical precision, thieves stole $45 million from thousands of A.T.M.'s in a matter of 10 hours. All it took was the knowledge and a few keystrokes along with blank credit cards that were accessible by purchasing over the Internet.

Sony revealed that the company's PlayStation Network and Sony Entertainment Network were hit by "an attempt to overwhelm the network with artificially high traffic” (Molina, para 1). Sony says the company is working to restore PSN service as soon as possible. Sony says that the ability to access their network has been impacted; no personal information has been accessed. This...

References: ISBN: 978-1-4471-4989-7 (Print) 978-1-4471-4990-3
Marc Santora, May 9, 2013, In Hours, Thieves Took $45 Million in A.T.M
Retrieved from: http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?pagewanted=all
Brett Molina, August 25, 2014, Sony 's PlayStation Network targeted in attack,
M. E. Kabay, PhD, CISSP-ISSMP (2008). A Brief History of Computer Crime: An Introduction for Students.
Retrieved from: http://www.mekabay.com/overviews/history.pdf
Concordia University (2008). “Who we are: History.”
Retrieved from: http://www.concordia.ca/about/whoweare/ourhistory/sgw.php
Whiteside, T. (1978). Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: New American Library
Work Cited page (Internet fraud)
National White Collar Crime Center (NW3C). Internet Fraud (2013).
Retrieved from: http://www.nw3c.org/docs/research/internet-fraud.pdf?sfvrsn=8
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Crime and Information Overload on the Internet Research Paper
  • Computer Crime Essay
  • Internet Crime and Moral Responsibility Essay
  • Computer Crime Essay
  • Essay about Cyber Crimes
  • cyber crime Essay
  • The Threats of Cyber Crime Essay
  • Computer Crime Essay

Become a StudyMode Member

Sign Up - It's Free