SlideShare ist ein Scribd-Unternehmen logo
1 von 4
v                                  See more essay samples onESSAYSHARK.COM




           Research Paper Sample




         COMPUTER СRIME


    EssayShark.com - Online Academic Assistance
v                                                          See more essay samples onESSAYSHARK.COM




The widespread occurrence of computer crime has given rise to abundant research and
investigation on the subject. The incidence of criminal behavior on the internet is directly
related to the increase in time users spend at the computer. That is, the longer people spend
working, communicating, doing business, or seeking entertainment on their computers, the
more likely they are to encounter – or attempt – criminal behaviors (Jaishankar 27). Any
endeavor to research this subject must include data, findings, and studies from the early days
of the internet to the present day, because changes and innovations occur rapidly and
constantly.

It is not difficult to find recent works that treat the subject of cyber criminality. A number of
excellent books have been written by Information Technology (IT) experts, and there are also
some very comprehensive law books, which enumerate the aspects of crimes that take place
online, how they are dealt with, and the legislation put into place to control them.

Robert Moore (2010), in his recent book Cybercrime, Second Edition: Investigating High-
Technology Computer Crime,introduces researchers, and those whose job it is to investigate
online misconduct, to existing and emerging hi-tech crimes. He explores legal issues, digital
evidence and how it is presented; and shows how criminal justice responds to cyber
criminology. As new ways of breaking the law using computers are devised by those with
malice in mind, new ways must be found to fight them (Moore 15). This IT expert explains
how certain terms, such as „hacker‟, came about, what online criminals do and how they
think, and how investigators at agencies such as the Federal Bureau of Investigation (FBI) go
about understanding, investigating and controlling their ill deeds (Moore 24). The book also
treats data manipulation, denial-of-service attacks, the creation of Trojan horses and other
viruses, and goes on to describe the language and ethics of hackers.

“In less than 15 years, cybercrime has moved from obscurity to the spotlight of consumer,
corporate and national security concerns.” (Florencio and Herley, 2012) So starts an article in
a New York Times earlier this year. The article goes on to give some statistics about the
frequency and growth of online crime and how the only reason incidences are not more
massive is that pickings are necessarily limited and exhausted quickly. The writers assert that
although many respondents to surveys exaggerate their losses, it would be a „mistake not to
consider cybercrime to be a serious problem.‟ (Florencio and Herley, 2012).
v                                                         See more essay samples onESSAYSHARK.COM


In their latest book Computer Crime, Investigation, and the Law, C. Easttom and J. Taylor
(2010) write that the online world is awash „in identity theft, online child predators, and even
cyber espionage‟. They enumerate cases of unauthorized access, phishing, auction fraud,
session hijacking, brute force attacks, foot-printing, and website hacking that are becoming
harder to predict, prepare for, or counter. Hacking techniques are becoming more
sophisticated and difficult to fight (Easttom and Taylor 209). Identity theft techniques, for
instance, are doubling in efficiency every week, and because the consequences for the victims
can be very severe and difficult to reverse, hundreds of thousands of people are affected.

In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, the editor K.
Jaishankar (2011) has collected articles by a number of noted authors on the subject of
computer crime, with topics that include the criminal subculture of the internet, deviants‟ and
perpetrators‟ perspectives, how hackers regard identity construction, digital piracy, and cyber
stalking. This interesting book has an important conclusion by the editor that shows how
location has become irrelevant, and that crime on the internet can have no real limits or
borders. It is no longer a question whether cyber criminology will emerge as a separate
discipline, but rather when this will be established in colleges, universities and the courses
run by crime fighters in this all-important field (Jaishankar 411).

One of the most important findings that appear in these books is that computer crime is
committed by those to whom online anonymity seems to mean identity flexibility, and is
related to dissociative behavior (Jaishankar xxix). If one commits a crime online, the
likelihood of criminal behavior offline is increased. This does not bode well for the future,
and seems to indicate that everyone must be more security-conscious and mindful of
cybercrime and its implications.
v                                                     See more essay samples onESSAYSHARK.COM


     References


Easttom, C., and Taylor, J.,Computer Crime, Investigation, and the Law Course
     TechnologyPTR, 2010.

Florencio, D., and Herley, C., The Cybercrime Wave that Wasn’t New York Times Sunday
     Review, April 14, 2012 Retrieved August 20, 2012
     http://www.nytimes.com/2012/04/15/opinion/sunday/the-cybercrime-wave-that-
     wasnt.html

Jaishankar, K (Editor) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior
     CRC Press, 2011.

Moore, R. Cybercrime, Second Edition: Investigating High-Technology Computer Crime
     Anderson Publishing, 2010.

Weitere ähnliche Inhalte

Andere mochten auch

Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research PaperDraizelle Sexon
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolDenni Domingo
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about BullyingDarlene Enderez
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its partsDraizelle Sexon
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paperQueene Balaoro
 
Correct Use of Sources
Correct Use of SourcesCorrect Use of Sources
Correct Use of Sourcesdrgcuny
 
Stroopeffect
StroopeffectStroopeffect
Stroopeffectmikemod
 
Revisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperRevisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperDr. Alex Rinehart
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research PaperJacqui Brauman
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paperChristopher Swires
 
Research proposal approval sheet
Research proposal approval sheetResearch proposal approval sheet
Research proposal approval sheetmegan0913
 
Research Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKResearch Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKSamantha Schultz
 

Andere mochten auch (18)

Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research Paper
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about Bullying
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paper
 
ThesisWritingSample
ThesisWritingSampleThesisWritingSample
ThesisWritingSample
 
Correct Use of Sources
Correct Use of SourcesCorrect Use of Sources
Correct Use of Sources
 
Stroopeffect
StroopeffectStroopeffect
Stroopeffect
 
Revisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperRevisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis Paper
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research Paper
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paper
 
Internet Addiction Disorder
Internet Addiction DisorderInternet Addiction Disorder
Internet Addiction Disorder
 
sample thesis powerpoint2
sample thesis powerpoint2sample thesis powerpoint2
sample thesis powerpoint2
 
Research proposal approval sheet
Research proposal approval sheetResearch proposal approval sheet
Research proposal approval sheet
 
Research paper 2010
Research paper 2010Research paper 2010
Research paper 2010
 
Research Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKResearch Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINK
 
Stroop Effect
Stroop EffectStroop Effect
Stroop Effect
 

Mehr von ESSAYSHARK.com

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films ESSAYSHARK.com
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!ESSAYSHARK.com
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesESSAYSHARK.com
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSESSAYSHARK.com
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed ESSAYSHARK.com
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National CuisineESSAYSHARK.com
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipESSAYSHARK.com
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on GlobalizationESSAYSHARK.com
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyESSAYSHARK.com
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting StyleESSAYSHARK.com
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book ReviewESSAYSHARK.com
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book ReportESSAYSHARK.com
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That RocksESSAYSHARK.com
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeESSAYSHARK.com
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing ExercisesESSAYSHARK.com
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different LanguagesESSAYSHARK.com
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]ESSAYSHARK.com
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student TripsESSAYSHARK.com
 

Mehr von ESSAYSHARK.com (20)

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female Employees
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National Cuisine
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of Censorship
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on Globalization
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX Century
 
APA Formatting Style
APA Formatting StyleAPA Formatting Style
APA Formatting Style
 
MLA Formatting Style
MLA Formatting StyleMLA Formatting Style
MLA Formatting Style
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting Style
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book Review
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That Rocks
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew before
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing Exercises
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student Trips
 

Kürzlich hochgeladen

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Kürzlich hochgeladen (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Research Paper Sample

  • 1. v See more essay samples onESSAYSHARK.COM Research Paper Sample COMPUTER СRIME EssayShark.com - Online Academic Assistance
  • 2. v See more essay samples onESSAYSHARK.COM The widespread occurrence of computer crime has given rise to abundant research and investigation on the subject. The incidence of criminal behavior on the internet is directly related to the increase in time users spend at the computer. That is, the longer people spend working, communicating, doing business, or seeking entertainment on their computers, the more likely they are to encounter – or attempt – criminal behaviors (Jaishankar 27). Any endeavor to research this subject must include data, findings, and studies from the early days of the internet to the present day, because changes and innovations occur rapidly and constantly. It is not difficult to find recent works that treat the subject of cyber criminality. A number of excellent books have been written by Information Technology (IT) experts, and there are also some very comprehensive law books, which enumerate the aspects of crimes that take place online, how they are dealt with, and the legislation put into place to control them. Robert Moore (2010), in his recent book Cybercrime, Second Edition: Investigating High- Technology Computer Crime,introduces researchers, and those whose job it is to investigate online misconduct, to existing and emerging hi-tech crimes. He explores legal issues, digital evidence and how it is presented; and shows how criminal justice responds to cyber criminology. As new ways of breaking the law using computers are devised by those with malice in mind, new ways must be found to fight them (Moore 15). This IT expert explains how certain terms, such as „hacker‟, came about, what online criminals do and how they think, and how investigators at agencies such as the Federal Bureau of Investigation (FBI) go about understanding, investigating and controlling their ill deeds (Moore 24). The book also treats data manipulation, denial-of-service attacks, the creation of Trojan horses and other viruses, and goes on to describe the language and ethics of hackers. “In less than 15 years, cybercrime has moved from obscurity to the spotlight of consumer, corporate and national security concerns.” (Florencio and Herley, 2012) So starts an article in a New York Times earlier this year. The article goes on to give some statistics about the frequency and growth of online crime and how the only reason incidences are not more massive is that pickings are necessarily limited and exhausted quickly. The writers assert that although many respondents to surveys exaggerate their losses, it would be a „mistake not to consider cybercrime to be a serious problem.‟ (Florencio and Herley, 2012).
  • 3. v See more essay samples onESSAYSHARK.COM In their latest book Computer Crime, Investigation, and the Law, C. Easttom and J. Taylor (2010) write that the online world is awash „in identity theft, online child predators, and even cyber espionage‟. They enumerate cases of unauthorized access, phishing, auction fraud, session hijacking, brute force attacks, foot-printing, and website hacking that are becoming harder to predict, prepare for, or counter. Hacking techniques are becoming more sophisticated and difficult to fight (Easttom and Taylor 209). Identity theft techniques, for instance, are doubling in efficiency every week, and because the consequences for the victims can be very severe and difficult to reverse, hundreds of thousands of people are affected. In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, the editor K. Jaishankar (2011) has collected articles by a number of noted authors on the subject of computer crime, with topics that include the criminal subculture of the internet, deviants‟ and perpetrators‟ perspectives, how hackers regard identity construction, digital piracy, and cyber stalking. This interesting book has an important conclusion by the editor that shows how location has become irrelevant, and that crime on the internet can have no real limits or borders. It is no longer a question whether cyber criminology will emerge as a separate discipline, but rather when this will be established in colleges, universities and the courses run by crime fighters in this all-important field (Jaishankar 411). One of the most important findings that appear in these books is that computer crime is committed by those to whom online anonymity seems to mean identity flexibility, and is related to dissociative behavior (Jaishankar xxix). If one commits a crime online, the likelihood of criminal behavior offline is increased. This does not bode well for the future, and seems to indicate that everyone must be more security-conscious and mindful of cybercrime and its implications.
  • 4. v See more essay samples onESSAYSHARK.COM References Easttom, C., and Taylor, J.,Computer Crime, Investigation, and the Law Course TechnologyPTR, 2010. Florencio, D., and Herley, C., The Cybercrime Wave that Wasn’t New York Times Sunday Review, April 14, 2012 Retrieved August 20, 2012 http://www.nytimes.com/2012/04/15/opinion/sunday/the-cybercrime-wave-that- wasnt.html Jaishankar, K (Editor) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior CRC Press, 2011. Moore, R. Cybercrime, Second Edition: Investigating High-Technology Computer Crime Anderson Publishing, 2010.