StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer-Based Crimes - Research Paper Example

Cite this document
Summary
This research paper describes on computer systems including networks and information systems, that have revolutionized many facets of society in recent years. However, this essay focuses on computer-based crimes, hackers and criminals, who can, for example steal personal data from a user. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Computer-Based Crimes
Read Text Preview

Extract of sample "Computer-Based Crimes"

? Computer-Based Crimes Computer-Based Crimes Computer systems including networks and information systems have revolutionized many facets of society. However, computers have also present criminals with various ways to carry out their criminal activities. Today, it is common for individuals to steal personal data from unsuspecting users online or for hackers to take over a website, even for a short time. Consequently, there is less emphasis on how criminal undertake computer crime and how their action affect stakeholders such as users, online businesses, and system developers. Over year, the number of computer-based crimes has been rising and there are no signs the pattern will change, at least for now. Computer crime refers to any criminal activity where criminals target a computer, or use computers to violate the law (Mooney, Knox, & Schacht, 2011). In recent years, criminals have used computers to commit crime such as stealing credit cards from unsuspecting users. With the number of computer crimes growing, there is significant interest on how users can enhance their safety when using computers. In most computer-based crime, criminal with knowledge of computer systems exploit flaws or users awareness on various aspects of computers to commit crime. Because of computer-based crimes, such as hacking and phishing, stakeholders in the computer industry are concerned on how they can enhance security in the computer industry especially with many computer crimes targeting business organizations and their users. Various types of computer-based crimes, but the most prevalent one are hacking, and phishing. Hacking Hacking is one of the prevalent computer-based crimes that involve hackers gaining unauthorized access into computer systems with intent to steal data. When a hacker gains access into an information system like a server, the hacker may steal information that could be sensitive to an individual or government or business. Hackers receive their motivation from the desire to become famous, gain financial reward or revenge against an entity. Some hackers simply hack systems to feel recognized among peers. This is the case because some hackers get praise from their illegal work. In some cases, hackers break into systems to steal and sell data from an organization. In this case, monetary reward is the goal of hacking. Some hackers may also hack into a computer system with the aim of revenging. Such a hacker may steal and distribute sensitive information that could hurt the business. During a hacking episode, a hacker may connect to a target computer through an open network. For instance, open wireless connection offers hackers a quick way of attacking a computer system. Hackers can also use exploits to compromise a host and use it to gain access into the target computer. Once the hacker compromises the computer, they are may steal unprotected information from the computers. Phishing Computer-based crimes may also entail wrongful acquisition of data and information about users for the purpose of misrepresentation. Users who have access to computer systems have various identities, which describe the users such s they address or bank details. There are times when criminal attempt to acquire date from users by false means. For instance, criminals could dupe users into providing their bank details to a website that appears to be genuine, but not (Onescu, Irea, & Blajan, 2011). With a successful phishing, the criminal may use the data from the user to commit crime or for financial gain such as purchasing items online. Among the many computer-based crimes, phishing has the highest number of occurrences. There are various ways of phishing users online. One common technique is the use of an email that may appear to be from legitimate from a legitimate source. Using such emails, the sender will convince the user to follow a link and perhaps fill some sensitive information into a form and upon clicking the submit button send the information to the user. A typical scenario will be a criminal sending an email to a user, with online banking, request changes to the account. The email may have valid links, but the link to update the information may point to fake website where the criminal will capture personal information the user enters. The information the criminal acquires through phishing may find use in other criminal acts such as misuse of credit cards. Prevention and mitigation of computer-based crimes There are many strategies of preventing and mitigating the effect of various computer-based threats. First, increasing the awareness of computer users is effective in curbing crimes such as phishing. Users who are aware that banks do not ask for confidential information are less likely to become victims of such crimes. In addition, users such as employees, who are aware of social engineering, may help prevent hackers from acquiring passwords and usernames of critical information systems. The use of effective computer virus could help curb the rate of crimes. For instance, some antivirus may detect illegal tools or exploits hackers may use in compromising a computer system. By installing and constantly updating antivirus solutions, computer users may prevent or reduce the rate and the number of computer. Antivirus software may also help users detect websites that aim at phishing users and this could help avert loss of personal information. Organizations can harden their network, install intrusion devices, and install firewall solutions. Hardening of networks entails the fixing vulnerabilities and continuous patching defects. For open networks, organizations need to lock them and install devices that scan traffic and alert network administrators of intrusion not to mention blocking them. Firewall services may help prevent users from opening sites that may phish personal information. These strategies are essential in preventing and in some cases limiting the above threats, which create ethical issues in computers. Any of the above crimes creates an intersection between ethics and information technology use in today’s IT field. IT-related ethical issue Computer professionals must uphold the highest level of professional ethics in their workplace. Today, issues such as computer piracy affect some organization where employees choose to violate copyright laws. When employees make illegal copies of computer software for their use or for distribution, this practice is unethical and taints their image as professional. The problem here lies on the act of creating copies of the program and avoiding paying for genuine copies (Reynolds, 2011). This problem affects developers who have to contend with low revenues for works they have produced, some over years. However, the users will enjoy the software while the developer fails to earn from the use. In most cases, the developer will fail to get any benefit while the organization of individual gains by using the pirated software. To solve this issue, it is needful for organization to empower their employees by providing them with software. At the same time, professionals should avoid copying the software and making illegal copies. This decision to curb piracy will be expensive for the organization because it will raise the cost of running business. For instance, purchasing new software such as Windows 8 for Windows 8 apps developers will cost considerable amount of money. However, Microsoft will benefit from the sale so will the suppliers of the software. The software industry will profit from the purchase. The fairness approach guides this decision as it seeks a solution that is fair. While the software may be expensive, it fair to pay the developers. In addition, the firm will make money and pass the cost to customers. Evidently, there are many issues that affect the computer industry with computer-based crime and ethical issues being the chief. Using computers, criminals can commit crimes such as phishing where they capture sensitive user data and possibly misuse them. However, increasing user awareness and using antivirus software can help prevent and mitigate this threat. On the other hand, organizations can implement decision to curb ethical issues such as software piracy where employees copy and install software without purchasing them. Being that those firms deprives software vendors of revenues, purchasing the software and creating awareness is a fair strategy of reducing the practice. This solution align with fairness approach because it allows the developers to earn money while making software firms pay for tools they use to earn money. References Kouhestani, J. (2013). Combating Crime in Cyberspace. Officer, 89(1), 84-85. Mooney, L. A., Knox, D., & Schacht, C. (2011). Understanding social problems. Belmont, Calif: Wadsworth Cengage Learning. Onescu, L., Irea, V., & Blajan, A. (2011). Fraud, Corruption and Cyber Crime In A Global Digital Network. Economics, Management & Financial Markets, 6(2), 373- 380. Reynolds, G. W. (2011). Ethics in information technology. Mason, Ohio: South-Western. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1468068-computer-based-crimes
(Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 Words)
Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1468068-computer-based-crimes.
“Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1468068-computer-based-crimes.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer-Based Crimes

Study of Risk and Perceptions of Crime or Danger

Running Head: Stay Safe Stay Safe Stay Safe Part 1 In more or less all stages of western culture, the unstoppable rise in crime has been regretted in the “corridors of authority, the media, and the public” (Zimring, p.... hellip; 72, 2008).... Worried by reminiscences of an earlier golden period, specialists have applied crime data research, and the approximately daily stream of media reports as a basis to speculate regarding the varying nature as well as extent of crime, together with terrible forecasts for the time to come....
9 Pages (2250 words) Essay

THE LEGAL ISSUE IN NETWORK SECURITY USA

For the computer based crimes, it is hard to enforce any law on legal basis as the computer or the network cannot be restricted by boundaries of a country around it.... There are many issues that US legal system face when dealing with the computer based crimes as they are bound in one or the other ways.... Laws for Federal Computer crimes 10 9.... Other Laws Used to act against Computer crimes: 12 10....
3 Pages (750 words) Essay

The Internet: Application in Marketing

This paper provides an overview of the advantages and challenges involved in electronic commerce that represents an attempt to understand the range of issues related to using the Internet for business.... nbsp;The practice of e-commerce has changed the very principles of both trade and services.... hellip; Since the advent of trade in the infancy of human civilization, its routine has never been transformed as profoundly as after the emergence of the Internet and the advent of e-commerce....
8 Pages (2000 words) Research Paper

Computer Fraud and Abuse Act

The paper “Computer Fraud and Abuse Act” will look at CFAA originally known as the Counterfeit Access Device and Computer Fraud and Abuse Act, which was first enacted in 1984, in order to treat computer-related crimes as separate federal offenses.... hellip; The author of the paper explains that the Act was introduced and amended in Title 18 of the United States Code for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping....
4 Pages (1000 words) Essay

White Collar Crime

White-collar crimes are commissioned both at the public and private levels.... The complexity involved in these crimes is about their non-violent nature.... This is widely known as 'crime' throughout the ages and in essence, crimes are deemed punishable by the head of societies or by the governments at large.... These components make such crimes apparently less vulnerable and unidentifiable because criminals exploit their authority and corporate status for pursuing financial gains....
2 Pages (500 words) Essay

Plan for Change

In the case of the City of North City, its economy With such advancements, more sophisticated computer based crimes have emerged.... Technological advancement not only enables economic growth but also attracts criminals who exploit the very same technology for certain malicious intents....
4 Pages (1000 words) Essay

Apply decision-making frameworks to IT-related ethical issues

This is a constant war between information defending specialists (and software) on one side and Viruses, Trojan horses, backdoor-exploits, miscellaneous phishing techniques and so on (The 10 Most Common Internet crimes).... Lots of people nowadays are hunting for other's people private data in order to use it for maximizing their own profits, such as financial stealing, blackmailing other people, extortion, and so on....
3 Pages (750 words) Essay

The American System of Criminal Justice

This essay "The American System of Criminal Justice" discusses a number of various qualitative approaches that can be adopted to study crime perceptions.... The majority of studies on this topic, if not all, make use of a quantitative approach, but not both.... hellip; One of the messages from this study is that better highlighting should be placed on expecting and acting in response to prospect crime series....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us