(computer Crime) - Case Study Example

Comments (0) Cite this document
His charges were the production, assisting, and taking part in the production of a visual representation of a minor engaging in sexually unequivocal behavior, and using materials that…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Study Case (computer Crime)
Read TextPreview

Extract of sample "(computer Crime)"

number Computer Crime Defendant was put into conviction in court and tried in the United s District Court. His charges were the production, assisting, and taking part in the production of a visual representation of a minor engaging in sexually unequivocal behavior, and using materials that were mailed, and shipped in interstates which violated the 18 U.S.C.S. § 2251(a); the sexual exploitation of children’s act (Jordan 120).
The law protects children against sexual exploitation. In the case, the defendant is accused of possessing a computer hard drive, which contained visual depiction of a minor engaged in sexually explicit conduct, and a webcam. According to the sexual exploitation of children’s act, the accused is guilty of transporting visual depiction a sexual misconduct against children. The accused had the duty to verify that the material transported was safe for use and free of any sexual exploitation. However, failure to observe this measure makes the defendant an accomplice to children sexual exploitation.
Furthermore, the defendant claimed that the evidence used against him was insufficient to confirm him as guilty. The defendant states that the goods were part of a foreign interstate commerce. The hard drives, as well as the webcam were probably made from Korea or China. However, he depended on his experience and assumed that they originated from Korea or China; thus, free of any sexual videos. It is unlawful to transport videos of sexual exploitation on children. The government requires that individuals trading in foreign computer hardware must be keen to avoid the sale of hardware with consisting of videos that sexually exploit children. The defendant is guilty as he failed to do his job professionally assuming that the place of origin of the hard drive and webcam were safe.
On the other, the defendant’s trial was delayed, which is against the sixth amendment. This amendment requires that an accused must face immediate trial when accused of criminal activities. Delayed trial is a violation of an accused sixth amendment’s right (Jordan 123). Nevertheless, violation of the defendant does not make him less guilty or free from the crime committed. The court was provided with adequate evidence to prove that the defendant was guilty. It is rightful for the court to convict the defendant to avoid similar carelessness in future.
In the case of Acevado, the defendant was sentenced following a panel of adjudicators’ trial of aiding, and producing and assisting in the creation of a visual portrayal of a minor taking part in explicit sexual behavior with materials shipped, mailed or transported in foreign commerce or expressway. Defendant appealed, affirming that the proof that the Government had with regard to the crimes law element - namely that the equipment were part of interstate or foreign commerce - depended on uncertain barred hearsay, which sullied his right to challenge in the Sixth Amendment. Acevedo disputed that the testimony provided by the Governments witness concerning the source of the webcam and hard drive constituted barred hearsay as it depended on statements enclosed in the tags stuck to the same. The First Court of Appeals declared Defendants sentence, sticking that the tribunal court did not evidently state error in owning up the disputed testimony, since the eyewitness could have depended on his individual expert understanding slightly than the tags in shaping an judgment regarding the objects source.
As an inception matter, Acevedo challenge that the appraisal is acceptable since he voiced a Confrontation Clause case during his Rule motion. Conversely, the appropriate typical of evaluation is plain fault given that Acevedo botched to contemporaneously oppose to the depositions in question plus he admit as much in his succinct. It is noted that Acevedo does not plea the refutation of his Rule motion. Acevedo confronts his guilty verdict instead. As a result, plain error appraisal is appropriate. To institute plain error, Acevedo is required to show “plain” “error” that “affect” substantial rights. If Acevedo is able to assure all the three essentials, the prudence court, in its discretion, can spot a penalty error. This analysis is significantly related to the standard followed in risk-free fault analysis, in addition to the added crinkle that the activist, not the Government, endures the load of conviction with regard to prejudice.
Works Cited
Jordan , David. Free Law Supplement 4: Statutory and Administrative Law Glossary for U.S. Intelligence Law. New York: David Alan Jordan, 2000. Print. Read More
Cite this document
  • APA
  • MLA
(“Study Case (computer Crime) Example | Topics and Well Written Essays - 500 words”, n.d.)
Study Case (computer Crime) Example | Topics and Well Written Essays - 500 words. Retrieved from
(Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words)
Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words.
“Study Case (computer Crime) Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Study Case (computer Crime)

Computer crime

...?Journal We live a highly technologically dependent lifestyle in the 21st century. Everything we do is somehow connected to the world wide web. As such, my privacy as a person has, for quite some time now, been floating around in the internet where it can be accessed by questionable persons. That is why computer companies work very hard to secure my personal information. In the wrong hands, it could be a potentially life threatening situation for me. That is why I do not believe that the government, the FBI in particular should be given access to my personal information without my consent. My personal security and information is protected under the various provisions of the U.S. constitution and I am not just about to surrender... it to the...
4 Pages(1000 words)Article

Computer Crime

...? Computer Science and IT Computer Science and IT Computer crimes include internet fraud, business identity theft, and other criminalpractices that result in a security breach. Hackers effectively use the internet to send malicious spam emails thereby tricking users to give out confidential information such as passwords, credit card PINs and to send on viruses and harmful softwares. Computer crimes can not only result in data loss but they also result in sales loss and reputational damage. Among the most prominent security breaches against any company was that against the popular multinational company Yahoo!. Yahoo is a famous search...
3 Pages(750 words)Research Paper

Computer crime and forensic

...? Representations of Islam in the media Grade (29th, Oct. Computer crime and forensic Question My opinion on this matter is that the leakage has served to expose some law violations by the country’s security agencies, which then calls for more attention especially regarding the Patriot Act and its application by the security agencies. It is out of the leakage by Edward Snowden, that the issue of the law flouting activities of the security agencies has been disclosed, which now places the public in a better position to scrutinize the impacts of such a law on their privacy (Greenberg, 2013). The good that he has done is to open up the activities of NSA, as well as its partner in Britain, who violates the...
3 Pages(750 words)Term Paper

Computer Crime

...Computer Crime MGMT 305 Rationale behind Increasing Computer Crime The extreme dependency on electronic system, increasing complexity of IT system to support the business operations of e-commerce and the cost of digital signature and assets has make the internet system complex as medium of online shopping. This makes IT companies' job difficult to provide secure, safe and user-friendly medium to deal with customer. Hackers further dents into the security system of companies to steal sensitive data. The instances of increasing software piracy and data theft certainly reflect that computer crime is increasing. Identification of 3 Different...
2 Pages(500 words)Essay

Computer crime

...Reports states that during 2004 to 2006, U.S. consumers lost more than $8 billion to viruses, spy ware and online chicanery plans (Cyber crime flourishes in online hacker forums , November 2006). Consumers continue to show careless attitudes although the frequency of internet intrusions and scams are growing at a fast pace. Many recent cases have been observed like:- i. A resident of New Jersey begged for guilty for cyber attacking the website of Church of Scientology on January 2008 that depicted the websites unavailable. ii.19 years old, Dmitriy Guzner of New Jersey appealed guilty to charges on computer hacking for his act in the DDOS intrusion against the websites of Scientology. As...
7 Pages(1750 words)Essay

Psychology of Crime Case Study

...Case study Application of Social Learning Theory to explain a criminal behavior Introduction No one is born as a criminal or a super hero. For the same reason several theories are defined by several sociologists and psychologists to understand the supportive reasons for human behaviors that deviated from the ordinary range and the criminal mind. In criminology, these theories are helpful to find out the motivation behind the crime, decide the punishment and to plan social interventions to reduce crimes. Evolutionary theories, Free will/determinism, Biobehavioural theories, Psychodynamic theories, Trait theories, Social learning theories, Moral development theories,...
8 Pages(2000 words)Essay

Computer crime

...Computer crime Computer crime A computer crime is any criminal act that is committed through the use of a computer of a network system. In this context, the computer might have been used to commit a crime or else be the target in the crime committed. Criminal commissions over the internet are referred to as net crimes whereas cyber-crimes are the crimes which are intended to individuals or the society to harm the reputation or cause physical harm to the victim, directly or indirectly. These crimes are...
1 Pages(250 words)Research Paper

Fighting Crime Case Study

...Fighting Crime Case Study The problems that accost the efforts of fighting crime are multifaceted, with some touching on the nature of criminal justice, while others are not related to the American justice system. One of the problems that beset war on crime is overcrowding in prisons. Walmsley (2005) for instance points out that not only is America imprisoning more people than Russia is doing, but that for every 100,000 Americans, 714 are in prison also. Racial profiling is presented as a force against fair justice system. For instance, the African American makes up 13% of the US population yet it accounts for 40.7% of America’s 2.1 million convicts....
1 Pages(250 words)Essay


...Computer Crime Computer crime refers to utilization of information technology to attain illegal objectives or to access a computer system without authority with the intention of causing damage or altering data in the system (Stephenson & Gilbert, 2013). Despite the full use of computers from the 1970s, crimes related to computers as victims and tools remained rare. When the first such crime was reported, Kizza (2013) observes that it was difficult for law enforcement agencies to act appropriately due to their limited knowledge as compared to perpetrators. However, the modern world...
2 Pages(500 words)Coursework

Computer R us case study

...Assignment, Statistics Computer R us case study of Assignment, Statistics Computer R us case study Background Computer R Us (a manufacturer and retailer) has recently established Complete Care, a service and repair division. This division is responsible to provide rapid response to the customer technical enquiries and warranty repairs. The division is facing some issues that lead to the customer dissatisfaction. Problem Statement The launch was successful but there are some issues with the operations of Complete Care. The issues are explained below: 1) There is a shortage of technical operators that can operate in the telephone centre. 2) The courier (who picks up the machines and also delivers the repaired items to the customers... in the...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Study Case (computer Crime) for FREE!

Contact Us