StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Is the Fraud Act a Useful Tool in E-crime Prosecution - Dissertation Example

Cite this document
Summary
Table of Contents Abstract 2 1Introduction 3 1.1Background study 3 1.2Problem statement 7 1.3Aims and objectives 10 2Computer fraud 11 3An overview of the legal scenario as related to e-crime prior to the enactment of Fraud Act 2006 in UK 22 4Fraud Act 2006 34 5Methodology 42 45 6Analysis 51 7Conclusion 55 8Recommendations 56 References 56 Abstract Internet, one of the most compelling technological innovations of the twentieth century, has recently acquired great popularity as a medium of commercial activities and a mode for transactions of a financial nature…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Is the Fraud Act a Useful Tool in E-crime Prosecution
Read Text Preview

Extract of sample "Is the Fraud Act a Useful Tool in E-crime Prosecution"

Download file to see previous pages

Even though in existence for more than four decades, the Thefts Acts of 1968 and 1978 were deemed archaic and hence inadequate, when dealing with crimes that were internet based, as they failed they to check the increasing number of e-crimes. It is for this reason the Fraud Act 2006 was legislated, which purportedly had a large scope for prosecuting e- crimes under the purview of general offences, and including modern e-crimes, like phishing, while also increasing imprisonment terms. In this context, the paper seeks to examine and analyse whether the Fraud Act 2006, in reality, is an effective tool in terms of prosecuting cases of e-crimes.

1 Introduction 1.1 Background study The 21st century has seen the rapid use of Internet in UK (and elsewhere), primarily owing to the easy availability of computers (especially laptops), high-speed browsers and fast connectivity through broadband. This is evident in a survey report, which showed that in 1996 around 3.4 million adults were using the internet in UK, which by the next 10 years had expanded to a figure of 28.5 million internet users (8 times more).1 This rapid creation of an internet-based society has increased the information sphere available to users while also changing the very nature of communication between individuals within cyberspace, which started reflecting to some extent in the actual physical world.

Despite many benefits, widespread use of Internet has revealed a negative side, related to crime and criminal activities. Internet being a mode of personal and financial transaction, which is highly reliant on net-based interactions that take place through computers, without the people interacting ever coming face-to-face, which increases risk during interactions, especially in cases of financial transactions. The various activities that take place within the cyberspace attracts different kinds of people, and it is relatively ease for criminals to identify similar minded people, form online communities, and carry on their criminal activities.

One major factor, which increases instances of cyber-crimes, is the promise of large-scale financial remuneration from a virtual crime. As the Post Note survey confirms “Information security experts suggest that the motives behind computer crime have changed… [and] is now increasingly financially motivated.”2 This change in motive has occurred mainly due to rise in e-commerce, where we find that with nearly 45% of internet users using some kind of a financial transaction via cyberspace, there has been increasing number of online credits/debit card frauds, attempts at extortion attempts, and phishing.

3 Another major factor that has helped to aggravate the problem of cybercrime is the anonymity that Internet offers. A criminal may hide his /her own identity behind spam mails, spoofed mails addresses, or even proxy servers and commit online frauds. There are available, different encryption technologies that allow users to mask their actual identities, and various forms of software, easily accessible, which allow users to remove all electronic activity

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Is the Fraud Act a Useful Tool in E-crime Prosecution Dissertation - 1”, n.d.)
Retrieved from https://studentshare.org/other/1429285-is-the-fraud-act-a-useful-tool-in-e-crime
(Is the Fraud Act a Useful Tool in E-Crime Prosecution Dissertation - 1)
https://studentshare.org/other/1429285-is-the-fraud-act-a-useful-tool-in-e-crime.
“Is the Fraud Act a Useful Tool in E-Crime Prosecution Dissertation - 1”, n.d. https://studentshare.org/other/1429285-is-the-fraud-act-a-useful-tool-in-e-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Is the Fraud Act a Useful Tool in E-crime Prosecution

Intellectual Property and Cyber Law Issues

Copyrights provisions are meant to promote innovation and useful arts by offering incentives and protection to their owners.... These laws are incorporated in the information technology act, 2000.... Each of these rights is protected under the information Technology act of 2000.... Cyber crime A cyber crime is regarded as any crime or offense that violates The Information Technology act 2000.... Consequently, cyber crimes are defined as any form of malpractice that involves tampering with computer based resources, cyber fraud, cyber based intimidation, and computer hackings are some of the major cyber crimes....
8 Pages (2000 words) Essay

The Latest from Computer Forensics

If not, perhaps prosecution of the criminal will suffice.... Although no rigorous definition of it has been formulated, we can accept the common sense definition as useful.... With the rise of Internet usage in this Information Age, there corresponded a proportional increase in its misuse....
7 Pages (1750 words) Essay

Internet Crimes

It is seen that there are a number of antifraud and Cyber crime laws in the United States, prominent among which are the Electronic Communication Copyright act, Electronic Communication Privacy act, etc.... and finally, Computer Frauds and Abuse act, which seek, through legislative armaments to reinforce cyber laws.... (250 words) All types of fraud scheme that is done by the Internet are called Internet fraud....
14 Pages (3500 words) Essay

An Emerging Area in Criminology

(Fafinski, 2008) Variety and Extent Computers have been used as a tool in most kinds of crime including fraud, theft, larceny, burglary, sabotage, espionage, conspiracy, illegal gambling, distribution of pornography, extortion, forgery, bootlegging, and terrorist acts since the first cases were reported in the 1950s....
7 Pages (1750 words) Essay

Information Technology Security

Crimes as known are an act which is a violation of the law and regulations.... Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts.... Also another common fraud is hacking, or cracking of software to modify customer data, like phone number and address can be changed easily without any proof or evidence....
15 Pages (3750 words) Essay

The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem

In a cyber-crime, the computers or other digital devices may be a tool used in the crime, the target of the crime or a storage medium for storing the evidence of the committed crime.... The paper "The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem" highlights the modern ways to commit cybercrime, global trends in cybercrime, ways to protect cyberspace from the likelihood of cyberattacks, legislation to prosecute cybercrimes....
5 Pages (1250 words) Research Proposal

Malware, Computer Crime and Fraud

The essay "Malware, Computer Crime and fraud" aims to examine the problem of invasion of privacy as a form of computer crime.... 2Criminals, today, have become so expert that they manipulate the computer in order to obtain the information that they want and the user becomes the casualty of computer fraud.... After that the criminal has taken all the data from the user, they commit computer fraud....
6 Pages (1500 words) Research Paper

How Important is the Media in the Investigation of Serious Crime

The underlying goal is accomplished by the collection of accurate data in response to a particular crime or act that contravenes the law.... This paper highlights that an investigation refers to the patient, procedural inquiry or scrutiny.... It is a cautious analysis and evidence-based recording of a legal review....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us