Term Paper on "Computer Crime"

Term Paper 4 pages (1216 words) Sources: 4 Style: APA

[EXCERPT] . . . .

Computer Crime can be classified into two categories: crimes that use the computer as the primary instrument for felonies like identity theft or piracy; and crimes that use the computer and its related systems as the target such as systems hacking or viruses. Therefore, computer crime is a relatively broad designation. Criminal activities like operating black market economies in pharmaceuticals or for unauthorized distribution of copyrighted material do not depend on computers, however. For clarification the definition of computer crime should focus more clearly on the crimes that directly involve computers and their systems as targets. Viruses and hacking are two of the most well-known and potentially harmful types of computer crimes, or cybercrimes. From the teenager experimenting with rebellious software coding to the former FBI agent wreaking havoc on government systems, computer crimes can cause serious damage to property or human liberty. Because Internet banking has become commonplace, cybercrimes that involve identity theft can potentially affect hundreds of thousands of individuals. Viruses can destroy valuable data, and a hacker can conduct acts of terror by disrupting the computerized controls of a city's nuclear power plant. Because of the potential severity of cybercrimes, the Federal Bureau of Investigation and other law enforcement organizations are working to prevent and combat instances of computer crime.

Cybercrime, like terrorism, crosses international boundaries. A British man was recently busted for trying to hack into the FBI's computer systems, one of many examples of why computer crimes need to be investigated and dealt with differently than other types of crime. However, re
Continue scrolling to

download full paper
mote access to closed and secure systems is nearly impossible to arrange. Most sensitive data stored by government agencies or private corporations is not kept on servers that are connected to the Internet. Although Hollywood might make it seem that an eight-year-old kid with a PC can hack into the CIA's database, in reality such crimes are almost impossible to commit. Ex-employees, however, and disgruntled current employees can wreak enormous havoc. These inside jobs are of particular concern for all organizations with sensitive data.

Some computer crimes are less focused, driven by less specific motives. For example, computer viruses usually do not target one company or organization. Like the biological systems they are named for, computer viruses harm indiscriminately. A virus may spread relatively rapidly, invading computer systems worldwide and affecting individuals as well as organizations. Some hackers who code viruses intend to destabilize operating systems to expose inherent weaknesses, whereas others are far more mischievous and nefarious crimes. A BBC (2004) report describes most hackers as being harmless, even heroic. "Most hackers don't aim to cause problems, but they might send an anonymous email to the person in charge warning them of their security problem. Amongst other hackers, there is much honour to be gained by those who can 'crack the uncrackable' programs." Sometimes the media portrays hackers as genius geeks who relish being able to usurp the hegemony of Microsoft Windows.

Virus coding is sometimes less noble and is occasionally profit-motivated. Lovet (2007) notes that virus coders "can make a few hundred dollars for every criminal activity they engage in." Writing simple programs like Trojans does not require a degree in rocket science, either. Many coders are young and only have a few years' worth of computing experience. The BBC (2004) notes that "virus authors are normally 14- to 26-year-old males who spend a lot of time on their computers" and computer criminologists sometimes refer to them simply as kids," (Lovet, 2007).

Other types of computer crime include mail "bots" and large-scale SPAM endeavors that can disable ISPs by hogging bandwidth. Some computer criminals focus on identity theft. For example,… READ MORE

Quoted Instructions for "Computer Crime" Assignment:

Double spaced (including between paragraphs), standard margins ( 1 inch top, i inch bottom and sides) Standard type (12 courier or new courier) must be used ( or the closest text you got to those. 12 point font.

Refrences must be no more than three years old and come from the internet ( 4 refrences at least)

How to Reference "Computer Crime" Term Paper in a Bibliography

Computer Crime.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793. Accessed 5 Oct 2024.

Computer Crime (2007). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793
A1-TermPaper.com. (2007). Computer Crime. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793 [Accessed 5 Oct, 2024].
”Computer Crime” 2007. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793.
”Computer Crime” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793.
[1] ”Computer Crime”, A1-TermPaper.com, 2007. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793. [Accessed: 5-Oct-2024].
1. Computer Crime [Internet]. A1-TermPaper.com. 2007 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793
1. Computer Crime. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793. Published 2007. Accessed October 5, 2024.

Related Term Papers:

Computer Crimes Essay

Paper Icon

Computer Crimes

Cyberspace has now become a thrilling new avenue for criminologists. The conventional methodology of criminology has been confronted by the virtual reality & computer-based communications, infusing new kinds… read more

Essay 4 pages (1811 words) Sources: 6 Topic: Crime / Police / Criminal Justice


Computer Crime Term Paper

Paper Icon

Computer Crime as it Differs From Orinary Crime

We have reached a time in history that redefines many of the aspects of life we have always held most sacred. Suddenly,… read more

Term Paper 2 pages (630 words) Sources: 0 Topic: Crime / Police / Criminal Justice


Computer Misuse Legislation Unfit for Purpose? Essay

Paper Icon

Computer Misuse legislation unfit for purpose?

The current computer misuse legislation goes beyond its purpose. Criminal application is inevitably a technological development, which restrictions cannot curb. Computer misuse started from… read more

Essay 7 pages (2485 words) Sources: 13 Topic: Crime / Police / Criminal Justice


Computer Surveillance Term Paper

Paper Icon

Computer Surveillance: Qualitative Attempt to Conceptualize Crime in the 21st Century

Purpose/Objectives/Theoretical Framework

Summary of Remaining Chapters

Computer Crime in a Digital Age

The Impact of the Net on Computer… read more

Term Paper 19 pages (4976 words) Sources: 1 Topic: Computers / IT / Internet


Computer Addiction Research Paper

Paper Icon

Computer Addiction: Causes and Potential Cures

The determinants and predictors of computer addiction cannot be isolated only to a specific series of demographic, psychographic or socioeconomic variables, it is an… read more

Research Paper 3 pages (874 words) Sources: 3 Topic: Computers / IT / Internet


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!