Computer Crime

Read Complete Research Material

COMPUTER CRIME

Computer Crime over the Internet



Computer Crime over the Internet

Introduction

Computers are integral for the citizens and businesses lives. The Internet has become one of the most important means of information and communication. The other side of the growing impact of computers is that computer crime has becomes more profitable and can cause even more damage. A relatively simple computer virus can quickly lead to economic loss of several million dollars (Goodwin, 2004). This is due, in large part by the characteristics of the Internet:

The Internet is immaterial: the shares are not really tangible, but real cause harm or damage.

Happens in real time: the results are felt immediately.

The Act describes four new offenses related to computer crime:

The false computer

Computer fraud

Data manipulation

Hacking

Statement of Hypothesis

Computer Crime over the Internet Influence, how people Make Use of this Technology

Research Information

The methodology used for the purpose of this research is based on the secondary data that is the qualitative approach. This research is more or less based on the literature review & the conclusions are drawn on the basis of actual resources listed in the references. In view ,the approach taken in earlier studies the research began with a broad analysis of the existing literature. The findings & conclusions are based on the secondary data. The main conclusive data is the result of a thorough analysis of the material found online. The research involved analyzing the news postings on the web over a phase of years. Libraries including online databases were accessed to get the most relevant and updated literature. Some of the online databases that were used are: EBSCO, Emerald, Blackwell, etc (Rantala, 2005).

Research Conduct on Computer Crime

Society has been victimization due to various types of harmful behaviors committed by individuals or groups against other people. Behaviors considered negligent or abusive, or that otherwise are considered criminal in a particular place, often depends on the amount of harm inflicted, the technological means employed, and existing laws that forbid specific activities. Technological means used to commit cyber offenses refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. Modern information technology (IT) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wirelessly, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or legal jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes (Kessler, 2009).

Since computers and networks now pervade almost every corner of our lives, from making a telephone call to driving on the freeway, the crimes that occur in the cyber environment are many. Some of these crimes may or may not be crimes, depending on the jurisdiction, especially as the Internet transcends international borders. Gambling, for example, or even trading in child pornography, may not be crimes in some ...
Related Ads