Term Paper on "Computer Crime"
Term Paper 4 pages (1216 words) Sources: 4 Style: APA
[EXCERPT] . . . .
Computer Crime can be classified into two categories: crimes that use the computer as the primary instrument for felonies like identity theft or piracy; and crimes that use the computer and its related systems as the target such as systems hacking or viruses. Therefore, computer crime is a relatively broad designation. Criminal activities like operating black market economies in pharmaceuticals or for unauthorized distribution of copyrighted material do not depend on computers, however. For clarification the definition of computer crime should focus more clearly on the crimes that directly involve computers and their systems as targets. Viruses and hacking are two of the most well-known and potentially harmful types of computer crimes, or cybercrimes. From the teenager experimenting with rebellious software coding to the former FBI agent wreaking havoc on government systems, computer crimes can cause serious damage to property or human liberty. Because Internet banking has become commonplace, cybercrimes that involve identity theft can potentially affect hundreds of thousands of individuals. Viruses can destroy valuable data, and a hacker can conduct acts of terror by disrupting the computerized controls of a city's nuclear power plant. Because of the potential severity of cybercrimes, the Federal Bureau of Investigation and other law enforcement organizations are working to prevent and combat instances of computer crime.Cybercrime, like terrorism, crosses international boundaries. A British man was recently busted for trying to hack into the FBI's computer systems, one of many examples of why computer crimes need to be investigated and dealt with differently than other types of crime. However, re
download full paper ⤓
Some computer crimes are less focused, driven by less specific motives. For example, computer viruses usually do not target one company or organization. Like the biological systems they are named for, computer viruses harm indiscriminately. A virus may spread relatively rapidly, invading computer systems worldwide and affecting individuals as well as organizations. Some hackers who code viruses intend to destabilize operating systems to expose inherent weaknesses, whereas others are far more mischievous and nefarious crimes. A BBC (2004) report describes most hackers as being harmless, even heroic. "Most hackers don't aim to cause problems, but they might send an anonymous email to the person in charge warning them of their security problem. Amongst other hackers, there is much honour to be gained by those who can 'crack the uncrackable' programs." Sometimes the media portrays hackers as genius geeks who relish being able to usurp the hegemony of Microsoft Windows.
Virus coding is sometimes less noble and is occasionally profit-motivated. Lovet (2007) notes that virus coders "can make a few hundred dollars for every criminal activity they engage in." Writing simple programs like Trojans does not require a degree in rocket science, either. Many coders are young and only have a few years' worth of computing experience. The BBC (2004) notes that "virus authors are normally 14- to 26-year-old males who spend a lot of time on their computers" and computer criminologists sometimes refer to them simply as kids," (Lovet, 2007).
Other types of computer crime include mail "bots" and large-scale SPAM endeavors that can disable ISPs by hogging bandwidth. Some computer criminals focus on identity theft. For example,… READ MORE
Quoted Instructions for "Computer Crime" Assignment:
Double spaced (including between paragraphs), standard margins ( 1 inch top, i inch bottom and sides) Standard type (12 courier or new courier) must be used ( or the closest text you got to those. 12 point font.
Refrences must be no more than three years old and come from the internet ( 4 refrences at least)
How to Reference "Computer Crime" Term Paper in a Bibliography
“Computer Crime.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/computer-crime-classified/37793. Accessed 5 Oct 2024.
Related Term Papers:
Computer Crimes Essay
Computer Crimes
Cyberspace has now become a thrilling new avenue for criminologists. The conventional methodology of criminology has been confronted by the virtual reality & computer-based communications, infusing new kinds… read more
Essay 4 pages (1811 words) Sources: 6 Topic: Crime / Police / Criminal Justice
Computer Crime Term Paper
Computer Crime as it Differs From Orinary Crime
We have reached a time in history that redefines many of the aspects of life we have always held most sacred. Suddenly,… read more
Term Paper 2 pages (630 words) Sources: 0 Topic: Crime / Police / Criminal Justice
Computer Misuse Legislation Unfit for Purpose? Essay
Computer Misuse legislation unfit for purpose?
The current computer misuse legislation goes beyond its purpose. Criminal application is inevitably a technological development, which restrictions cannot curb. Computer misuse started from… read more
Essay 7 pages (2485 words) Sources: 13 Topic: Crime / Police / Criminal Justice
Computer Surveillance Term Paper
Computer Surveillance: Qualitative Attempt to Conceptualize Crime in the 21st Century
Purpose/Objectives/Theoretical Framework
Summary of Remaining Chapters
Computer Crime in a Digital Age
The Impact of the Net on Computer… read more
Term Paper 19 pages (4976 words) Sources: 1 Topic: Computers / IT / Internet
Computer Addiction Research Paper
Computer Addiction: Causes and Potential Cures
The determinants and predictors of computer addiction cannot be isolated only to a specific series of demographic, psychographic or socioeconomic variables, it is an… read more
Research Paper 3 pages (874 words) Sources: 3 Topic: Computers / IT / Internet
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!