StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Technology: Crimes - Essay Example

Cite this document
Summary
This essay "Computer Technology: Crimes" focuses on Computer crimes that can be committed in a variety of ways including gaining unauthorized access to someone’s computers, reading confidential files, deleting or modifying data, defacing websites, or sending bogus requests for web pages, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Computer Technology: Crimes
Read Text Preview

Extract of sample "Computer Technology: Crimes"

Journals
One:
The Canadian law doesn’t allow names of minors to be leaked out and thus the boy was nicknamed Mafiaboy. Once arrested in 2000, his computer using rights were severely restricted and he was denied access to the Internet.

Mafiaboy’s motivation was nothing but entertainment for himself and proof of his capability. The authorities later found that he didn’t even have the genius skills that other hackers possess. But he was someone who wanted to prove to himself that he could pull off something major. Crime hurts society and while in some rare cases motivation for crime may find ethical justification, in most cases the societal and economic damage far outweighs any ethical justification. In this case for example the boy slowed down the website which is accessed by millions around the world every second. The website contains vital information on world affairs and by denying people a right to access the website in a timely fashion, this boy caused economic as well as societal damage with loss of time and money. It is amazing that in most computer crime cases, system managers fail to detect the crime because of their subtleness. A third party or the offender normally reports these crimes. It is very likely that the same thing happened with this case as well where users reported the slow response they received when accessing the site instead of the system managers detecting it. It is vital that there are some special detection devices installed to nip these problems before they develop into serious system collapse.

Two:
As a computer professional, an employee usually has access to a large amount of data and may even be able to access information, which is confidential or personal. In such a case, it is important that a person understands the repercussions of accessing such data or sharing with it anyone. My senior supervisor is a highly regarded computer professional at our firm. He works as the network administrator and basically controls the entire LAN in the company. He also has access to personal computers and every kind of information that is available on the intranet. This has always been a serious concern with the senior management because any professional with such massive access and power could become dangerous and a possible threat as well. But lately, the management has calmed down after it became absolutely clear that Mr. Smith's integrity was unquestionable. This is all due to his actions a few months back when he gained access to some personal files on our CEO's computer. He realized that our CEO had been sharing some trade secrets with another person in New Jersey. The computer professional had no idea who the other person was but he knew very well that trade secrets are not to be disclosed to anyone except those whose computers are registered on the company's larger network. Since the other person's email address was not registered and neither was his computer connected with the company’s network, it was always a possibility that our CEO was sharing trade secrets with someone who was not supposed to know. Mr. Smith was caught in a serious dilemma now. He didn't know what to do but refused to speak to anyone about it till he had a course of action in mind. He knew that if he let it go, it would be unethical wrong since he was an employee and is responsible for the interests of others. After much deliberation, Mr. Smith decided to conduct a background check on the other person before he spoke to the CEO. It was a good idea since what happened after that was unexpected. Mr. J.A., the other person who was being contacted, was indeed Mr. Allende, the new CEO of our New Jersey setup. He had been hired only recently and hence his computer was not yet registered on the network. It was a huge relief and once Mr. Smith knew the truth, he approached the CEO, told him the whole story, and asked him politely to be careful about sharing information through personal email addresses. Since then, the CEO trusts Mr. Smith even more. He apologized and also asked Mr. Allende to have his email address and computer registered on the network. It has taught all of us an important lesson: Whistleblowing is not exactly the best approach. It should be treated only as of the last resort after all other options have been exploited because in some cases, it can backfire.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Journals Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Journals Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1518764-journals
(Journals Essay Example | Topics and Well Written Essays - 500 Words)
Journals Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1518764-journals.
“Journals Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1518764-journals.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Technology: Crimes

Computer Crimes

Other type of computer crimes only use computer and they were being carried out long before computer technology was developed so they have only been increased through computers.... This review ''Computer crimes'' classifies computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices....
6 Pages (1500 words) Literature review

Computer Crimes, Ethics, and Privacy

The paper talks about computer technology and ethical issues it poses therefore it is perfectly related to the chapter.... Customer Inserts His/her Name Customer Inserts Customer Inserts Grade Course (23, 10, 2011) Computer crimes, Ethics, and Privacy Introduction The age of technology has made our world cozier to a great extent but at the same technology has negatively affected the moral values of the society in general.... The advent of computers and internet in our daily life has given rise to computer crimes, illicit activity that is carried out by the help of computers, and these crimes have had a ponderous impact on the moral values of the people, especially adolescents....
6 Pages (1500 words) Research Paper

Computer-Based Crimes

However, this essay focuses on computer-based crimes, hackers and criminals, who can, for example steal personal data from a user.... This research paper not only describes such events, but also explaines terminology of hacking attacks, phishing and prevention and mitigation of computer-based crimes.... Phishing Computer-based crimes may also entail wrongful acquisition of data and information about users for the purpose of misrepresentation....
4 Pages (1000 words) Research Paper

Investigating High-Technology Computer Crimes

As the paper outlines, computer crimes, or cybercrimes, are a crime that is conducted on computers and computer networks as aids to attack or targets of attacks.... Data from the Bureau of Justice Assistance shows a general trend in increasing incidence of computer crimes over the past decade.... The decision by the Attorney General's to establish computer crime as a priority for the justice agency also means that the crime is becoming more significant than other types of crimes (Offices of the United States Attorneys, n....
1 Pages (250 words) Essay

Computer Crime Is Unlawful Activities

The constituents are Cybercrime al affiliation: Computer crimes Computer crime is unlawful activities that mainly employ information technology in gaining illegal or unauthorized access to computer systems.... Hacking is one of the most witnessed computer crimes.... The illegal access is geared towards damage creation, deletion or alteration of computer data.... computer crime has been on rise recently.... Additionally, the rise of computer crime is attributed to inexistence of laws related to computer crime (Fisch & White, 1999). ...
1 Pages (250 words) Essay

Computer Crimes in the Modern World

This paper "Computer crimes in the Modern World" focuses on the fact that with the passage of time, huge developments have been done in the field of computer science.... This paper offers a detailed analysis of computer crimes.... This aim of this research is to offer a deep analysis of computer crimes, their types, characteristics, and attacking areas.... This research will also outline the computer crimes consequence and potential way to stop them....
8 Pages (2000 words) Term Paper

How the Computer Forensics Type of Technology Applied to Detect Crime

The crimes include the misuse of computer systems, attacks on computer systems, using a computer system to work against another system, failure of a computer system, and the list continues.... The paper 'How the Computer Forensics Type of technology Applied to Detect Crime' presents the areas of police agencies, courts, and other correctional institutions, that define the crime and justice concepts, which have also been affected by the technological revolution....
5 Pages (1250 words) Case Study

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The essay "Computer Crime and the Measures That Can Curb the crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not.... This has also proved to be a major threat to security in combating the crimes that are committed on the internet.... The security experts have stepped up their game, by using preventive technology that can be used to detect internet crimes....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us