Computer Crimes With Emphasis On Child Pornography Term Paper

Computer Crime As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals.

Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals and schools to corporate businesses and government agencies. In this day and age, it seems as though no one is safe from computer crime.

This paper aims to identify the different types of computer crimes and what can be done to prevent them. In addition, it will analyze the issue of child pornography, revealing whether or not pornographic images created on a computer are illegal.

Types of Computer Crime

In this modern information age, the innovation and power of technology tests the ethics of the average person, not just the criminal. As a result, computer crime is on the rise.

The most common computer crime committed on a daily basis is software piracy (Lilley, 2003). Many people commit this crime without even realizing it. When computer software is purchased, users agree that it will used on a single computer and cannot be shared with others. However, many people lend software to their friends or install it on entire networks. This is a crime.

Today, computer crime includes a variety of things, ranging from malicious code, such as viruses and worms, to human threats, such as hackers. These attacks target different area of a system.

Malicious code, such as viruses and worms, attack a system either internally or externally (Loundry, 2003). Traditionally, the virus has been an internal threat, such as one within a company, while the worm has been a threat from an external source, such as an attack from outside through a modem or connecting network.

Individuals or groups of individuals that attempt to penetrate systems through computer networks, public switched telephone networks or other sources create human threats.

These...

...

Hackers are the most widely known human threat (Cornwall, 1986). They are people who enjoy the challenge of breaking into systems and wreaking havoc.
Computer Crimes in the Corporate World

When 21-year-old Adrian Lamo broke into the internal networks of the New York Times earlier this year, he gained access to highly confidential information, including subscriber information and the social security numbers and home addresses of famous authors, such as Rush Limbaugh and Jimmy Carter (Lilley, 2003).

Fortunately, Lamo, who is well-known for exposing major security flaws of companies such as WorldCom and Yahoo, did not hack the system for personal gain. He was simply trying to prove that it could be done.

Computer crime has recently hit corporate world full blast, invading large, medium and small businesses by downloading confidential files; stealing their passwords, patents and database information; sending out false emails; transferring funds; and wreaking havoc on networks, servers and web sites (Westin, 2000).

Researchers say that most large businesses and government agencies in the United States have been the victim of computer crime, which has cost them millions of dollars.

According to Peter Lilley, author of "Hacked, Attacked and Abused: Digital Crime Exposed," the business world is completely dependent on technology but many users are ignorant of the risks involved with it (p. 124). These risks include organized digital crime, cyber laundering, hacking, cracking, worms, denial of service attacks, viruses, web site defacement, unauthorized disclosure of confidential information, and many more. Countless companies have suffered severe reputation, legal and financial consequences due to computer crimes.

Security flaws on three things: lack of money, lack of training and lack of knowledge (Loundry, 2003). Therefore, it is important to use encryption devices to protect stored data from unauthorized use.

In addition, to…

Sources Used in Documents:

Bibliography

Associated Press. (1999, January 30). Court Upholds Child Pornography Law.

Cornwall, H. (1986). The Computer Hacker's Handbook. Boston: Century.

Dern, David. (1994). The Internet Guide for New Users. New York: McGraw Hill.

Griffin, Linda and Plato, JoAnn. Child Pornography on the Internet. Retrieved from Internet on 2/26/03 at http://lrs.ed.uiuc.edu/wp/crime-2002/child.htm.
New York Police Department. (2003). Retrieved from Internet on 2/26/03 at http://www.ci.nyc.ny.us/html/nypd/home.html.


Cite this Document:

"Computer Crimes With Emphasis On Child Pornography" (2003, February 26) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/computer-crimes-with-emphasis-on-child-pornography-143855

"Computer Crimes With Emphasis On Child Pornography" 26 February 2003. Web.19 April. 2024. <
https://www.paperdue.com/essay/computer-crimes-with-emphasis-on-child-pornography-143855>

"Computer Crimes With Emphasis On Child Pornography", 26 February 2003, Accessed.19 April. 2024,
https://www.paperdue.com/essay/computer-crimes-with-emphasis-on-child-pornography-143855

Related Documents

("Supreme Court Rejects..." 2002) More constitutional problems have been encountered in the law's battle against child pornography as a federal court in September 2004 outlawed a Pennsylvania State law that required internet service providers (ISPs) to block websites containing child pornography. The Court considered the technology used in the blocking of such sites as clumsy that could cause "massive suppression" of constitutionally protected speech. Apart from conducting a legal "balancing

1st Amendment Protections for Child Pornography: The 2002 Decision in the Case of Ashcroft v. Free Speech Coalition. Laws have been passed outlawing child pornography in its various formats. It is forbidden by law to use a minor younger than age eighteen for visual depictions of sexually explicit acts. Possessions of such photographs are forbidden, and in 1966 the Child Pornography Prevention Act (CPPA) forbade trafficking in visual productions of

Journal of Child Sexual Abuse, 16(4): 99-114. Barrett, David & Melrose, Margaret (2012). Courting Controversy -- Children Sexually Abused Through Prostitution -- Are They Everybody's Distant Relatives but Nobody's Children? Child and Family Law Quarterly, 15(4): 371-382. McCabe, Kimberly (2007). The Role of Internet Service Providers in Cases of Child Pornography and Child Prostitution. Social Science Computer Review, 26(2): 247-251. Streetlight USA (2012). The Issue. Accessed 18 July 2012 at http://streetlightusa.org/the-issue/ U.S. Department

Sociologist Darryl Hall (2009) notes that the symbolic interactionism view of sexual deviance (which can relate to the issue of porn and sexual deviance) is as follows: "Symbolic interactionists suggest that the need of men to validate their sexual prowess or reaffirm their masculinity is an important factor in their seeking out pornography or prostitues" (p. 2). Such a notion can explain the rising level of sexually deviant crime in

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Since the late 1980s, the Council has addressed the growing international concern over computer-related crimes. In 1997, it established a Committee of Experts on Crime in Cyberspace (PC-CY) to begin drafting a binding Convention to facilitate international cooperation in the investigation and prosecution of computer crimes. The United States actively participated in both the drafting and plenary sessions (Chawki). The Convention stipulates actions targeted at national and inter-governmental levels, directed