Computer Crime As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals. Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals...
Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...
Computer Crime As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals. Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals and schools to corporate businesses and government agencies. In this day and age, it seems as though no one is safe from computer crime.
This paper aims to identify the different types of computer crimes and what can be done to prevent them. In addition, it will analyze the issue of child pornography, revealing whether or not pornographic images created on a computer are illegal. Types of Computer Crime In this modern information age, the innovation and power of technology tests the ethics of the average person, not just the criminal. As a result, computer crime is on the rise. The most common computer crime committed on a daily basis is software piracy (Lilley, 2003).
Many people commit this crime without even realizing it. When computer software is purchased, users agree that it will used on a single computer and cannot be shared with others. However, many people lend software to their friends or install it on entire networks. This is a crime. Today, computer crime includes a variety of things, ranging from malicious code, such as viruses and worms, to human threats, such as hackers. These attacks target different area of a system.
Malicious code, such as viruses and worms, attack a system either internally or externally (Loundry, 2003). Traditionally, the virus has been an internal threat, such as one within a company, while the worm has been a threat from an external source, such as an attack from outside through a modem or connecting network. Individuals or groups of individuals that attempt to penetrate systems through computer networks, public switched telephone networks or other sources create human threats. These attacks usually target known security vulnerabilities of computer systems.
Hackers are the most widely known human threat (Cornwall, 1986). They are people who enjoy the challenge of breaking into systems and wreaking havoc. Computer Crimes in the Corporate World When 21-year-old Adrian Lamo broke into the internal networks of the New York Times earlier this year, he gained access to highly confidential information, including subscriber information and the social security numbers and home addresses of famous authors, such as Rush Limbaugh and Jimmy Carter (Lilley, 2003).
Fortunately, Lamo, who is well-known for exposing major security flaws of companies such as WorldCom and Yahoo, did not hack the system for personal gain. He was simply trying to prove that it could be done. Computer crime has recently hit corporate world full blast, invading large, medium and small businesses by downloading confidential files; stealing their passwords, patents and database information; sending out false emails; transferring funds; and wreaking havoc on networks, servers and web sites (Westin, 2000).
Researchers say that most large businesses and government agencies in the United States have been the victim of computer crime, which has cost them millions of dollars. According to Peter Lilley, author of "Hacked, Attacked and Abused: Digital Crime Exposed," the business world is completely dependent on technology but many users are ignorant of the risks involved with it (p. 124). These risks include organized digital crime, cyber laundering, hacking, cracking, worms, denial of service attacks, viruses, web site defacement, unauthorized disclosure of confidential information, and many more.
Countless companies have suffered severe reputation, legal and financial consequences due to computer crimes. Security flaws on three things: lack of money, lack of training and lack of knowledge (Loundry, 2003). Therefore, it is important to use encryption devices to protect stored data from unauthorized use. In addition, to avoid security breaches, many companies are moving away from traditional methods of storing documents in computer files and sending confidential files over email. Encryption technology can also keep data safe while it is in transit over public networks.
According to most security professionals, every business needs to have a secure network, an enforced security policy, and a dedicated security team. Legalities of Virtual Child Pornography As the Internet continues to grow and provide increased access to the world and other people, we have access to an enormous amount of resources. However, it also opens a whole new area of dangers, especially for children. One of these dangers lies in the area of child pornography.
Criminals can easily use computers to communicate with each other and gain access the very population they plan to victimize (AP, 1999). While United States and other countries have enacted laws outlawing child pornography and have banded together to bring these criminals to justice, the Internet has brought a whole new set of obstacles to lawmakers, parents and others. Basically, it is believed that the only way that child pornography can be created is to molest a child (Griffin, Plato, 2002).
However, with the advancement of technology, a new issue has risen-- computer-generated or "morphed" images. This issue came before the Supreme Court in 2002, resulting in a law that banned virtual "morphed" images of child pornography on the grounds being overthrown on the grounds that it was "unconstitutionally vague and far-reaching" and infringed on material with artistic value that does not violate community standards. According to the Computer Investigation and Technology Unit (NYPD, 2003), "the transmission, or simply the possession of child pornography is illegal.
The depiction of any child engaged in a sexual act, or an image that is obviously not "artistic" or serving any educational purpose also qualifies as pornography. This category includes images which are "morphed" or constructed of various body parts and do not represent living individuals." To prevent computer crimes involving child pornography, parents, government agencies and schools must band together to familiarize themselves with the issues associated.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.