Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Computer Crimes, Term Paper Example
Hire a Writer for Custom Term Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
With the ever-growing expansion of computer technology and internet resources, criminals are finding new ways every day to combine technology, intelligence and resourcefulness to commit many crimes. These crimes are not always well-known or easy to track, but the government and criminal justice services throughout the country realize a continuing need to advance their methodologies to identify criminal behavior, track criminal activity and ultimately place criminals behind bars. For this reason, it is necessary to identify many of the frequent crimes experienced in today’s society in addition to the current methods by which government and police force agencies are working to restrict criminal activity. These crimes can include fraudulent activity, spam, unauthorized access to programs and data, and intellectual property theft.
The first and perhaps most invasive criminal behavior is computer or systems fraud. Fraud is achieved by the manipulation of computer records (Department of Justice). One example of fraudulent behavior is common within banking institutions where items are purchased using credit cards or bank accounts that are not owned by the individual making the purchase. Commonly, this type of fraudulent behavior involves the stealing of private data such as social security numbers, bank account or PIN numbers. In this example, fraudulent behavior is used at the expense of others in order to acquire personal, financial or monetary gain.
In recent years, spamming has become a hot topic by government legislators in responding to the outcry from citizens throughout the country. Spamming is not only a violation of personal rights but can ultimately lead to illegal soliciting for services to minors and individuals without their own consent. Due to the growing prevalence in spamming behaviors and activities, spamming is often outlawed or under government regulations in certain states to control the type and frequency of spamming (Kovec & Seager, 1995). Spamming seeks to bombard consumers with a series of advertisements, false claims and misleading links that can have negative consequences to the recipient. For instance, several key examples include pornographic links along with web sites that automatically download cookie Trojan horse viruses to the user’s computer for current and future data infringement.
A similar crime associated with fraud and spamming is the unauthorized access to programs and data. As discussed with fraud, a common example of this crime can involve coming upon, whether intentionally or unintentionally, private identification passwords or account numbers. For instance, one example of this type of crime can involve the practice of computer or systems hacking. Hacking bypasses authorization requirements such as usernames and passwords in order to gain access to data. In the past, hacking was identified when someone stole data for illegal use by “breaking in” to a computer or system’s authorization process. Under this definition, hacking was viewed as highly invasive with a strong intent to cause harm to others. However, hacking has since evolved to include unauthorized access to programs or data which may or may not be intentionally harmful (Computer Crime Research Center, 2005). Under this definition, companies and regulatory agencies may now prosecute for data infringement and hacking regardless of intent and motive.
Above all else, intellectual property theft has become one of the most highly debated and regulated subjects since the emersion of Napster and the reproduction and downloading of movies, music and television episodes online. Illegally pirating of movies and software electronically has cost companies and artists millions of dollars annually and continues to pose a great threat to the economy (Department of Justice). The federal government has increased the penalties and fines associates with such behaviors and has also most recently eliminated the requirement that individuals seek monetary gain in order to profit financially from stealing copyrighted materials. Nonetheless, it is very clear that these behaviors are detrimental to society and the government has led the way to show how destructive they can be by implementing high penalties with jail time.
Due to the growing threat of computer crimes, companies and government agencies must take action to protect against criminal behavior. For instance, many companies are able to deter criminal activity from within the organization by performing quality background checks on all personnel, creating and maintaining strict separation of duties, and implementing quality controls to ensure proper authorization of all financial and electronic data transactions (Scams & safety). The federal and state governments must take an active role toward eliminating the potential for fraudulent activity and reducing the ways in which criminals can illegally come into contact with personal data. Efforts have already been made the Department of Justice to begin an active campaign toward devising new methodologies for ensuring greater internet security systems as well as tracking potential hacking and spamming activities.
Bibliography
Computer Crime Research Center. (26 November, 2005). Types of Computer Crimes. Retrieved from http://www.crime-research.org/news/26.11.2005/1661/
Department of Justice. (n.d.). Computer crime & intellectual property section. Retrieved from http://www.cybercrime.gov/ccpolicy.html
Kovec & Seager, D. &. K. (1995). Computer crime: A crimefighter’s handbook. O’Reilly Online. Retrieved from http://oreilly.com/catalog/crime/chapter/cri_02.html
(n.d.). Scams & safety: How to protect your computer. Retrieved from Federal Bureau of Investigations website: http://www.fbi.gov/scams-safety/computer_protect
Stuck with your Term Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee