SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Communications
New times bring new crimes. It’s a story as old as humanity and as new as the Internet. First comes cars,
and then car thieves follow. Telephones are followed by telephone fraud. Now we’ve got computers…. To
make home, school, and office life easier, we rely on computers. As a result of this dependency, computer
use grows everyday. Along with this growing use of computers comes widespread computer crime.

With the Internet becoming increasingly popular, more and more people are becoming computer literate,
and networks are becoming more readily accessible.

People think that computer crime is a fact that started around of 1980s that is not true. We know that the first
recorded computer crime took place in 1958 and the first prosecution for computer crime came about in
1966. “A few years after the IBM begun marketing its first line of business computers. By the mid-1970s
scores of such crimes were being reported every year and yearly losses were estimated to be as high as
$300 million” [Mandell, 1992]. Computer criminals are active for more than 30 years. At this point it is useful
to collocate some past important cases:

“1964: Robert F. Hancock attempted to sell $5 mi

...
“The FBI said that the dangers of cyber crime were rising because of the increased availability of hacking
tools on the Internet as well as electronic hardware such as radio frequency jamming equipment. “Hackers
are school dropouts and job changers who turned to computing as a way of outsmarting everyone except
the other members of their social group” . Subject: Why the Rise??

The rise in computer crime can easily be blamed upon the increasing number of users. We have already
seen that some hackers strive to access closed computer systems not for pecuniary gain but as intellectual
exercise.

Hacking really came into existence after 1980s as a result of telecommunication growth as well as high
computer literacy. The remainder were dismissed for lack of evidence. Up to 40% were turned down 'for lack
of evidence of criminal intent, weak or insufficient evidence or no apparent violation of law'. 5 billion worth of
software is illegally copied and distributed worldwide. It provides the same opportunities for crime that the
real world offers. Hacking include a broad-range of computer-helped activities. Finally we can say that all
hackers cannot be characterised as benevolent nor nasty or nuisance. Hackers seem to break into computer
systems for the intellectual challenge. My investigation also continued by a wider question: is it legal to have
access and knowledge on information? As I have mentioned previously the majority of hackers does not
have malicious purpose. A poll conducted this year by the Information Technology Association found 61% of
those surveyed said rising cyber-crime made them less likely to do business over the Internet; 62% said
they did not believe enough was being done to protect consumers against cyber-crime. These are based on
authorisation and "need to know" basis.

Weitere ähnliche Inhalte

Was ist angesagt?

The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulationsWAQAR AHMED
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Agesheilaschultz43
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 

Was ist angesagt? (20)

Cyberspace
CyberspaceCyberspace
Cyberspace
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
E commerce
E commerceE commerce
E commerce
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulations
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Age
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Digital law
Digital lawDigital law
Digital law
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital law
Digital lawDigital law
Digital law
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 

Andere mochten auch

Google mission statement
Google mission statementGoogle mission statement
Google mission statementWAQAR AHMED
 
Disney mission statement
Disney mission statementDisney mission statement
Disney mission statementWAQAR AHMED
 
Ibm mission statement
Ibm mission statementIbm mission statement
Ibm mission statementWAQAR AHMED
 
Coca cola mission statement
Coca cola mission statementCoca cola mission statement
Coca cola mission statementWAQAR AHMED
 
Vision & mission statement
Vision & mission statementVision & mission statement
Vision & mission statementAnupam Kumar
 

Andere mochten auch (8)

Google mission statement
Google mission statementGoogle mission statement
Google mission statement
 
Denny
DennyDenny
Denny
 
Disney mission statement
Disney mission statementDisney mission statement
Disney mission statement
 
Ibm mission statement
Ibm mission statementIbm mission statement
Ibm mission statement
 
DERVİŞ DEMİR GOOGLE
DERVİŞ DEMİR GOOGLEDERVİŞ DEMİR GOOGLE
DERVİŞ DEMİR GOOGLE
 
Don’T Be Evil
Don’T Be EvilDon’T Be Evil
Don’T Be Evil
 
Coca cola mission statement
Coca cola mission statementCoca cola mission statement
Coca cola mission statement
 
Vision & mission statement
Vision & mission statementVision & mission statement
Vision & mission statement
 

Ähnlich wie Communications

The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 

Ähnlich wie Communications (20)

Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Mehr von WAQAR AHMED (20)

Dhl mission statement
Dhl mission statementDhl mission statement
Dhl mission statement
 
Dell mission statement
Dell mission statementDell mission statement
Dell mission statement
 
Burger king mission statement
Burger king mission statementBurger king mission statement
Burger king mission statement
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statement
 
Childrens magazines
Childrens magazinesChildrens magazines
Childrens magazines
 
13thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp0213thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp02
 
Ali
AliAli
Ali
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch19
Ch19Ch19
Ch19
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch09
Ch09Ch09
Ch09
 
Ch08
Ch08Ch08
Ch08
 

Communications

  • 1. Communications New times bring new crimes. It’s a story as old as humanity and as new as the Internet. First comes cars, and then car thieves follow. Telephones are followed by telephone fraud. Now we’ve got computers…. To make home, school, and office life easier, we rely on computers. As a result of this dependency, computer use grows everyday. Along with this growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more people are becoming computer literate, and networks are becoming more readily accessible. People think that computer crime is a fact that started around of 1980s that is not true. We know that the first recorded computer crime took place in 1958 and the first prosecution for computer crime came about in 1966. “A few years after the IBM begun marketing its first line of business computers. By the mid-1970s scores of such crimes were being reported every year and yearly losses were estimated to be as high as $300 million” [Mandell, 1992]. Computer criminals are active for more than 30 years. At this point it is useful to collocate some past important cases: “1964: Robert F. Hancock attempted to sell $5 mi ... “The FBI said that the dangers of cyber crime were rising because of the increased availability of hacking tools on the Internet as well as electronic hardware such as radio frequency jamming equipment. “Hackers are school dropouts and job changers who turned to computing as a way of outsmarting everyone except the other members of their social group” . Subject: Why the Rise?? The rise in computer crime can easily be blamed upon the increasing number of users. We have already seen that some hackers strive to access closed computer systems not for pecuniary gain but as intellectual exercise. Hacking really came into existence after 1980s as a result of telecommunication growth as well as high computer literacy. The remainder were dismissed for lack of evidence. Up to 40% were turned down 'for lack of evidence of criminal intent, weak or insufficient evidence or no apparent violation of law'. 5 billion worth of software is illegally copied and distributed worldwide. It provides the same opportunities for crime that the real world offers. Hacking include a broad-range of computer-helped activities. Finally we can say that all hackers cannot be characterised as benevolent nor nasty or nuisance. Hackers seem to break into computer systems for the intellectual challenge. My investigation also continued by a wider question: is it legal to have access and knowledge on information? As I have mentioned previously the majority of hackers does not have malicious purpose. A poll conducted this year by the Information Technology Association found 61% of those surveyed said rising cyber-crime made them less likely to do business over the Internet; 62% said they did not believe enough was being done to protect consumers against cyber-crime. These are based on authorisation and "need to know" basis.