Preview

Internet Crime and Moral Responsibility

Powerful Essays
Open Document
Open Document
3351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Crime and Moral Responsibility
Internet Crime and Moral Responsibility

Internet Crime and Moral Responsibility 3
Introduction 3
What is Internet Crime? 3
Types of Crimes 3
Phishing 3
Child Pornography 4
Cyber Stalking 5
Computer Intrusion 5
Denial of Service Attacks and Cyber War 5
Identity Theft 6
Whose responsibility is it to report these crimes? 7
Reporting agencies 8
Conclusion 8
References 9 Internet Crime and Moral Responsibility

Introduction
The Internet is the technological genius of the computer age. Although the Internet is a phenomenal tool, providing access to the world, it has also become a Shangri-La for criminals. The Internet because of the ability to remain anonymous is the perfect playground for this type of mayhem. This paper will outline the types of crimes that are being committed via the Internet, it will explain how to protect yourself and your computer against these crimes and then it will focus on why we are morally obligated to report these crimes to the appropriate authorities and how to accomplish this.
What is Internet Crime?
The National White Collar Crime Center defines Internet Crime as the use of a computer to break the law (Beresford 2003). There are two categories of computer crime: Internet crime and Computer-related crime. Computer-related crimes are those crimes that attack the content of operating systems, networks and specific programs. The attacks usually include unauthorized access, sabotage to the system, acquisition of data without the users ' knowledge or permission and hijacking a computer or service. Internet crimes include phishing, viruses, Trojans and Denial of service attacks, password theft, website defacement, etc.
Types of Crimes
Phishing
Phishing uses spurious email addresses and fraudulent websites to give email recipients the idea that the email is legitimate. Often the receiver will give out personal financial information such as credit card numbers, usernames and passwords or even worse, a social



References: Anti-Phishing Working Group (2004). Phishing Attack Trends Report for October 2004. Retrieved November 18, 2004 from http://www.antiphishing.org/APWG_Phishing_Activity_Report-Oct2004.pdf. Beresford A. D., Mason D., and Haantz, S. (2003). "True" Internet Crime. National White Collar Crime Center (NW3C). Retrieved November 24, 2004 from http://www.nw3c.org. Denning, D. (1990). Concerning Hackers Who Break into Computer Systems. Retrieved November 20, 2004 from http://www.cpsr.net/oldsite/externalSiteView/cpsr/privacy/crime/denning.hackers.html Department of Justice – DOJ. (2000) Identity Theft and Fraud. Retrieved November 17, 2004 from http://www.usdoj.gov/criminal/fraud/idtheft.html. Federal Bureau of Investigation. (2003). Online Child Pornography Innocent Images National Initiative. Retrieved November 25, 2004 from http://www.fbi.gov/hq/cid/cac/innocent.htm Federal Trade Commission. (2003). Sentinal Top Complaint Categories. Retrieved November 24, 2004 from http://www.consumer.gov/sentinel/states03/sentinel_top_complaint.pdf PBS. (2003) Interview with Richard Clarke. Cyber War. Frontline. Retrieved November 17, 2004 from http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/clarke.html PBS. (2003). Cyber War. Frontline. Retrieved November 17, 2003 from http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/arquilla.html Williams, P. (2001) Russian organized crime, Russian hacking, and US Security. Computer Emergency Response Team (CERT). Retrieved November 20, 2004 from http://www.cert.org/research/isw/isw2001/papers/Williams-06-09.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Jaeger, C. (2006). Cyberterrorism and information security. In B. Hussein, Handbook of Information Security (Vol.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    How to Report Internet-related Crime. (2005). Computer Crime and Intellectual Property Section of the Criminal Division of the Department of Justice website. Retrieved November 12, 2005 from, www.cybercrime.gov/reporting.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    What is a cyber crime? (n.d.). Retrieved October 22, 2004 from the World Wide Web: http://www.cybercitizenship.org/…

    • 1131 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Cyber Crime

    • 368 Words
    • 2 Pages

    Crime is global issue and for years researchers and law enforcement agencies have tried to determine why people choose the lifestyle of crime. They have theorized it down to social economics. But not all criminals commit crimes because of life disadvantages. Some criminals are adventure seekers and they seek the thrill and adventure of committing crimes and getting away without detection. Crime causation theories can vary. Some people believe that concentrated poverty is the cause of crime. Others tend to believe that criminal behaviors manifest it due to negative reactions to ordinary human characteristics. They even go as far using substance abuse and mental health issues as a large determining factor for criminal activity.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays