Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Computer crime - Research Paper Example

Comments (0) Cite this document
In this context, the computer might have been used to commit a crime or else be the target in the crime committed. Criminal commissions over the internet are referred to as…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Computer crime
Read TextPreview

Extract of sample "Computer crime"

Computer crime Computer crime A computer crime is any criminal act that is committed through the use of a computer of a network system. In this context, the computer might have been used to commit a crime or else be the target in the crime committed. Criminal commissions over the internet are referred to as net crimes whereas cyber-crimes are the crimes which are intended to individuals or the society to harm the reputation or cause physical harm to the victim, directly or indirectly. These crimes are committed using communication networks, which mostly are threats circulated in the social media networks (Casey, 2004). These criminals are traced through the computer system, and they are got through computer IP addresses and Mac addresses which are unique with the log files they generate. These are among the various and popular problems of lack of confidentiality and privacy in the computer users. Below is a discussion of various examples of computer crimes.
Some of the contents circulated in computers in various non-specific ways. These may include obscenities, inflammatory and derogatory contents of speech form people focusing on a specific target group in the society e.g. gander, race or religion among other social groups. This can also be used to propel hate speech in political volatile regions and political arrest situation where ethnicity prevails among the leaders.
Fraud is a criminal act that involves false acquisition of money through the use of computer and network system. This includes hacking of bank accounts, vandalism of ATM and the use of fishers to hack password for false transfer of online money. This is an illegal practice and harms the unsuspecting victims.
Cyber terrorism
It is evident that information and technology and government officials have well documented numerous incidents on the breakdown of servers and network infrastructures due to sabotage (Parker, 1983). These criminals pulls down the servers, and stop the normal operation causing loss of data, and siphoning information from the servers and hence causing many institution suffer from computer terrorism attacks.
Casey, E. (2004). Digital evidence and computer crime: forensic science, computers and the Internet (2nd ed.). London: Academic Press.
Parker, D. B. (1983). Fighting computer crime. New York: Scribner. Read More
Cite this document
  • APA
  • MLA
(“Computer crime Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer crime Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from
(Computer Crime Research Paper Example | Topics and Well Written Essays - 250 Words)
Computer Crime Research Paper Example | Topics and Well Written Essays - 250 Words.
“Computer Crime Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Computer crime

...?Journal We live a highly technologically dependent lifestyle in the 21st century. Everything we do is somehow connected to the world wide web. As such, my privacy as a person has, for quite some time now, been floating around in the internet where it can be accessed by questionable persons. That is why computer companies work very hard to secure my personal information. In the wrong hands, it could be a potentially life threatening situation for me. That is why I do not believe that the government, the FBI in particular should be given access to my personal information without my consent. My personal security and information is protected under the various provisions of the U.S. constitution and I am not just about to surrender... it to the...
4 Pages(1000 words)Article

Computer Crime

...? Computer Science and IT Computer Science and IT Computer crimes include internet fraud, business identity theft, and other criminalpractices that result in a security breach. Hackers effectively use the internet to send malicious spam emails thereby tricking users to give out confidential information such as passwords, credit card PINs and to send on viruses and harmful softwares. Computer crimes can not only result in data loss but they also result in sales loss and reputational damage. Among the most prominent security breaches against any company was that against the popular multinational company Yahoo!. Yahoo is a famous search...
3 Pages(750 words)Research Paper

Computer crime and forensic

...? Representations of Islam in the media Grade (29th, Oct. Computer crime and forensic Question My opinion on this matter is that the leakage has served to expose some law violations by the country’s security agencies, which then calls for more attention especially regarding the Patriot Act and its application by the security agencies. It is out of the leakage by Edward Snowden, that the issue of the law flouting activities of the security agencies has been disclosed, which now places the public in a better position to scrutinize the impacts of such a law on their privacy (Greenberg, 2013). The good that he has done is to open up the activities of NSA, as well as its partner in Britain, who violates the...
3 Pages(750 words)Term Paper

Computer Crime and Security

...and processing, increased popular access to IT renders corporate systems vulnerable to unauthorized penetration and the associate accessing of private and confidential data (U.S. Department of Commerce, 2000). While it is the responsibility of corporate entities to ensure the securitization of their networks, absolute inviolability is practically impossible to achieve. It is, thus, that recent years have witnessed the ever-increasing adoption of computers in the commission of crimes of fraud and theft (Power, 2000). Our company has recently fallen victim to one such incident. 3 Incident Overview On January 16th, 2008, a periodic review of our IT activities logs evidenced a string of unusual...
6 Pages(1500 words)Essay

Computer Crime

...Computer Crime MGMT 305 Rationale behind Increasing Computer Crime The extreme dependency on electronic system, increasing complexity of IT system to support the business operations of e-commerce and the cost of digital signature and assets has make the internet system complex as medium of online shopping. This makes IT companies' job difficult to provide secure, safe and user-friendly medium to deal with customer. Hackers further dents into the security system of companies to steal sensitive data. The instances of increasing software piracy and data theft certainly reflect that computer crime is increasing. Identification of 3 Different...
2 Pages(500 words)Essay

Computer Crime & Identity Theft

For the purposes of this paper, the particular computer crime will be concentrated in the area of identity theft and the impact it has both personally and economically on the individual and society. What is Identity Theft? The encyclopedic definition of identity theft is the use of another person’s identity, i.e. financial, personal, geographic or another source, to commit fraud or other types of misrepresentation. By using another person's social security number, drivers license number, date of birth, address, online information one may open bank accounts, apply for loans and credit cards, get a cell phone and so on. In addition to financial loss that can result from identity theft, by using another’s identity the cre...
11 Pages(2750 words)Essay

Computer crime

...Computer Crime Introduction: Crime in a society can be defined as the breach of law for which the legal ity of a is likely to render punishment. It is an act executed for trespassing with the laws and the accused is adjudged. Crime is a self annihilative path. The probable causes of crime are ambiguous and ever-changing. Criminals are not a product of congenital traits but they are a product of the environment by which they are surrounded. The atrocities are growing at a fast pace in today’s’ world. One of the major antisocial behavior is computer crime in the prevalent time period. Meaning: Computer...
7 Pages(1750 words)Essay

Categories of Computer Crime

...Running Head: COMPUTER CRIMES Categories of Computer Crimes School Computer Crimes Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless. Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights. Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the...
2 Pages(500 words)Essay

Study Case (computer Crime)

... number Computer Crime Defendant was put into conviction in court and tried in the United s District Court. His charges were the production, assisting, and taking part in the production of a visual representation of a minor engaging in sexually unequivocal behavior, and using materials that were mailed, and shipped in interstates which violated the 18 U.S.C.S. § 2251(a); the sexual exploitation of children’s act (Jordan 120). The law protects children against sexual exploitation. In the case, the defendant is accused of possessing a computer hard drive, which contained visual depiction of a minor engaged in sexually explicit conduct, and a webcam. According to the sexual exploitation of children’s act, the accused is guilty... on...
2 Pages(500 words)Case Study


...Computer Crime Computer crime refers to utilization of information technology to attain illegal objectives or to access a computer system without authority with the intention of causing damage or altering data in the system (Stephenson & Gilbert, 2013). Despite the full use of computers from the 1970s, crimes related to computers as victims and tools remained rare. When the first such crime was reported, Kizza (2013) observes that it was difficult for law enforcement agencies to act appropriately due to their limited knowledge as compared to perpetrators. However, the modern world...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Computer crime for FREE!

Contact Us