This website uses cookies to ensure you have the best experience. Learn more

Computer Crime Essay

3143 words - 13 pages


Computer Crime: Prevention and Innovation

Since the introduction of computers to our society, and in the early 80¡¦s the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we approach the year 2000, the turn of the millenium, humanity has already well established itself into the ¡§Information Age.¡¨ So much in fact that as a nation we find our selves out of a service economy and into an information based economy. In a matter of only a few years almost all systems are run buy computers in some way, shape, or form. We depend on them for everything. Even the smallest ...view middle of the document...

What is the social Problem?

Computer crime is the official name given to this criminal phenomenon driven by hackers. Although a solid definition of computer crime has yet to be agreed upon by scholars, it is described in a functional manner encompassing old crimes such as forgery, theft, mischief, fraud, manipulation or altering of documents; all of which are usually subject to criminal sanctions everywhere. Also included in the description or computer crime is the unauthorized invasion or trespass of data base systems of private companies or government agencies. According to Schamalleger computer crime is also described as any violation of a federal or state computer crime statue.
It has been suggested that the history of computer crime and hacking started in the late 1950¡¦s when AT&T first implemented its interstate phone system and direct distance dialing (DDD). Manipulation of the way that the DDD system worked, in order to make free long distance calling, was the objective of this crime. What the early hackers did was duplicate the particularly distinguishable tones that the phone companies used in their early switching devices enabling them to fool the system into thinking that the customer has paid. A person who used any number of devices available for manipulating switch systems in order to explore or exploit is called a phone phreak.

Who are the perpetrators?

Computer crime, like any other criminal activity, is a product of opportunity, desire, and ability. Anyone who owns a computer or has access to a computer has the opportunity to misuse its systems to engage in criminal activity. Researchers found that the average age of most computer crime defendants is between the ages of 21 and 23. The second highest age groups of computer crime defendants are between 18 and 20. They suggested that hackers could be classified into the following groups based on their psychological characteristics: pioneers, scamps, explorers, game players, vandals, and addicts.
Among these six classifications of hackers, hard-core computer criminals are mostly found in the explorers, game players, vandals, and addicts. Pioneers are simply captivated by technology and explore with out necessarily knowing what they are getting into or without specific criminal intent. Scamps are curious and playful hackers that intend no real harm. Explorers, on the other hand, specifically look for highly sophisticated and secured systems that are relatively far from their physical location. The further away and the more sophisticated the systems that are being broken into are, the more exciting it is for the explorer. For the game player hacker, hacking is a sport that involves the identification and defeat of software, systems, and copyright protections. Vandals are hateful, angry hackers that strike harshly, randomly, and without any apparent personal gain other then knowledge, responsibility, and credit for such acts. Finally, addicts are your stereotypical nerdy...

Other Essays Like Computer Crime

Digital Crimes Essay

1272 words - 6 pages computer has become both target and tool to a new breed of cyber-criminal. Computers are becoming an increasingly important part of everyday life. They also provide new opportunities for criminal enterprise. The computer provides both new types of crime, and new ways of perpetrating traditional crimes. Computer crime investigation differs from more traditional crime investigation in several critical ways and will require law enforcement

The Role of the Internet and Crime

968 words - 4 pages by any of these crimes at least once, as almost everyone these days has access to the computer and the internet. (Shahid, 2011) Crime has existed as long as humans and will only become extinct with us because offending and violating laws is defined as crime, and laws are created by man. No one can deny that technology has elevated crime rates and has even given birth to a variety of new crimes. Cell phones, email and instant messaging have

Accounting Information System Report

2045 words - 9 pages , identity theft, financial and telecommunications fraud, credit card fraud, and various other schemes. Theft crimes, as related to computer crime, include categories such as monetary, service and data theft, and piracy. Although system security measures can probably cost the time and resources greatly than the benefit but it can significantly reduce the opportunity for damages from both intentional and unintentional threats. Ultimately, the

Intro to Crime

2000 words - 8 pages prominent concerns of society. White collar crime is considered by many to be more damaging than street crime, due to factors such as the devastating loss of finances. White collar crimes typically come under the headings corporate, employee, economic, elite, computer, fraud, forgery, false pretences, corruption, bribery, embezzlement and misappropriation, with fraud dominating this list in offences committed. It is often referred to as the â

Executive Summary on Computer Forensics Suites

523 words - 3 pages  Unit 10 Assignment 1: Executive Summary on Computer Forensics Suites IS 3350 Computer forensics is a relatively new scientific process for examining data stored on, received, or transmitted by electronic devices. The data from these electronic devices are examined to find evidence about an event of crime. Computer forensic examiners use specialized software and tools to collect and study data stored on various electronic

Cyber Terrorism

787 words - 4 pages . One main concern has been Cyber-terrorism and the criminals behind these acts. It is very difficult to prosecute some of these cases. If cyber-terrorism cases are taken out of the country, you might face lack of computer crime laws. It can take a couple of days for investigators to obtain a search warrant. You might have to persuade a judge to issue a search warrant on the basis of one possibility that the suspect is using cyberspace as a form of

Cyber Crime

558 words - 3 pages hate emails to interested parties. And badly affect to the younger generation which sometimes leave irreparable injury if not properly controlled. The second category of cyber crime committed against all forms of property including computer vandalism which distraction of others property, transmission of harmful program, stole the technical data base from other person's computer with the help of a corporate cyber spy. The third category of

Assignment 1: Computer Forensics Overview

1416 words - 6 pages otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into

Unit 4 Assignment 1

1197 words - 5 pages computer evidence. If any of those are not met the evidence could be thrown out and the case could dismissed. Evaluating, Securing, and Documenting the Crime Scene First things first: make sure that you are safe. Non-tech savvy people often think of computer crime scenes are nerds or geeks at their laptops. Computers have become part of a crime scene for many reasons being that technology is so prevalent that conventional criminals, as well as

Cyber Crime the New Age Devil

1279 words - 6 pages CYBER CRIME : THE NEW AGE EVIL The term ‘cyber crime’ seems a misnomer and has nowhere been clearly defined in any statute /Act passed or enacted by the Indian Parliament. Cyber Crime can be broadly defined as “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes” There is apparently no distinction between cyber and conventional crime. However, demarcation lies in the

Research Your Career

626 words - 3 pages the security industry. Local Employers: LockHeed Martin Corporation: Computer Tech Spt Analyst This company works with USSOUTHCOM’s Enterprise Support Directorate in Computer Network Defense. It provides technical, operations, and training support to users of the company’s personal computers either by telephone or on-site. They perform hardware diagnostics and coordinates repairs. They do not provide internship opportunities. Miami-Dade Police Department: Digital Forensics examiners Digital Forensic examination services are provided to assist local, state, and federal agencies to investigate crime. Does not state whether they provide internships or not.

Related Papers

Computer Crime Essay

621 words - 3 pages Computer Crime Question #2 Computer Crime Daniel Kilburn Computer Science 300 Professor Christensen May 11, 2007 Question #2 Computer Crime The Penetration Attack: This type of attack involves breaking into a system using the known security flaws of the system. Once the intruder has penetrated the system he has access to the entire systems resources. Acting as an authorized user the intruder can perform any task that

Computer Crime Essay

714 words - 3 pages discover in the cyber world. Most Hackers don’t engage in illegal action; it is more about the skills and motivation that drives them. The normal Hackers ethic is not profiting from their hack and not purposely harming the computer system. A Hacker is usually simply a person that shows a profound interest in a computer, how it works, and the technology used to access parts of the system itself. They feel that in most cases their knowledge is actually

The Problem Of Computer Crime Essay

2391 words - 10 pages , from businesses, families, individuals, and most importantly, our children. Even as new technology has created more uses for its users, firewalls, password protections, and new programs to safeguard our children when viewing the Internet, our vulnerability increases with our perceived values and reliance on this new technology. There are new increased opportunities for the deviant individual than was ever thought of. Computer crime started

Computer Fraud Essay

1037 words - 5 pages How Computer Fraud and Abuse Evolved Before 1984 there was little that could be done about computer fraud. In 1984 the Counterfeit Access Device and Computer Fraud and Abuse Act was the first legislation on computer fraud. The act made it a misdemeanor to illegally retrieve financial and credit information by computer. Also, the act made it illegal to cause harm to other computer systems. Around this time, what constitutes computer crime