SlideShare a Scribd company logo
1 of 7
Running Head: DIGITAL COMPUTER CRIME
1
Digital Computer Crimes
Name
Institution
Course
Date
DIGITAL COMPUTER CRIME 2
Computer Crimes
Globalization has made the use of computer to grow drastically over the years. More people
from different parts of the world are coming closer to one another through computers. The World
Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of
cyber crimes. Although law enforcement agencies have come up with security policies, the number
of crimes related to computer theft and hacking is still alarming. Organizations, as well as
individuals are losing sensitive information to these crimes thus calling for imperative security
measures. Amongst computer crimes, there are four major ones that have become prevalent.
1. Hacking
Thus is a form of computer crime whereby a person’s PC or an organization’s main server is
broken into and sensitive information regarding these entities accessed without their permission
(Casey, 2011). Countries have taken measures to ensure that hacking is dealt with by classifying it
as a felony with heavy jail term punishment. The process requires the use of sophisticated softwares
to access computers from an unknown location.
2. Theft
This is the violation of copyrights regarding music, movies, softwares and games and persons
downloading such information without approval from recognized legal bodies. Also, peer sharing
sites that encourage piracy are also considered to be included as committing theft. Hence, theft is
mainly related to illegal downloading of softwares or other sensitive information without paying for
it.
3. Identity Theft
DIGITAL COMPUTER CRIME 3
This cyber crime is when a person accesses sensitive data information about another person’s
debit cards account, social security numbers and even bank accounts. They usually use this
information to buy online items and siphon money from the victims’ accounts. The victim could
even end up losing their credit history thus causing more problems.
4. Cyber Stalking
When a person is the subject of numerous online messaging streams and emails as well as
constant harassment texts through social media, they are being stalked through the internet. The
crime usually makes a person uncomfortable and unable to contact their friends through these
online social media sites.
Digital Crimes
Unlike computer crimes which are related to the computer and mainly affect its function or
information stored on the computer, digital crime is different. It usually revolves around every
hardware or software that is linked to the internet thus making the crime electronic in nature. There
are many forms of digital crimes ranging from spoofing to extortion. Sport betting is one form of
digital crime where people engage in business of betting on sports events over the internet. Since
the betting is regulated through software generating codes to increase credibility, the softwares
could be hacked and manipulated to favor one individual to win the bet.
Spoofing is when a person accesses another person’s computer without permission and
sending multiple emails to deceive recipients. The crime could be motivated by commercial gain or
blackmail and thus carries a heavy jail term punishment as well. Extortion as well is another digital
crime that is prevalent at this present time. A person can use the internet to threaten others either for
commercial gain or other valuable things (Jaishankar, 2011). For example, hackers can access
DIGITAL COMPUTER CRIME 4
sensitive private information from an organization and use it to extort the organization for a thing of
value or money, or else they make the information public.
Hacking and its Threats
Hacking poses an overall threat to the safety of a nation and almost every domain that the
nation is made of. It affects families, businesses, organizations, institutions, government
departments and even healthcare institutions as long as computers and other digital devices are
applied in these areas. To make matters worse, hacking encourages the increase of terrorism across
the globe. Research across all security areas show that the buying and selling of sensitive data
information that has been hacked is increasingly growing.
Through hacking of businesses such as banks, terrorism, and other social ills are able to
expand their agenda to the global scale. Online banking fraud which is as a result of hacking has
been found to £33m per year in the UK alone. This shows that hacking poses a threat that extends
from mere computer safety to a nationwide disaster. Hacking hence not only affects businesses but
acts as a pathway for committing other crimes.
Roles and Response of the U.S Government and Court System
The Federal Bureau of Investigations (FBI) which is a law enforcement agency of the
government is the major agency that deals with the investigation and prosecution of computer
crimes (Brenner, 2010). The department of Justice, which is closely linked to the U.S court system,
works in conjunction with the FBI to counter cyber crimes.
Also, through the legal system, there are a number of Acts that have been put in place to
counter such crimes. The Computer Fraud and Abuse Act, for example, which is the broadest
statute in the U.S tries to define multiple related cyber crimes such as espionage, computer
DIGITAL COMPUTER CRIME 5
trespassing, and hacking of government information among others. This Act also stipulates the
consequence as well as punishment that one is liable to when found guilty of these charges.
National agencies such as the FBI can work closely with international private organizations
such as Internet Service Providers (ISPs) to become more effective when dealing with cyber crimes.
Since the internet has increased globalization, the FBI should focus more on working with
international private agencies to gather information concerning hacking groups and their threat
potential.
DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.
DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.

More Related Content

What's hot

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
computer crime
computer crimecomputer crime
computer crime
00jitesh00
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
Yash
 

What's hot (20)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
computer crime
computer crimecomputer crime
computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 

Viewers also liked

Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
marta marta
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
marta marta
 

Viewers also liked (12)

Mohicans
MohicansMohicans
Mohicans
 
Futur simple
Futur simpleFutur simple
Futur simple
 
Eia bosconia, daju
Eia bosconia, dajuEia bosconia, daju
Eia bosconia, daju
 
Healthcare
HealthcareHealthcare
Healthcare
 
Tarea7.sistemas
Tarea7.sistemasTarea7.sistemas
Tarea7.sistemas
 
Louisiana purchase
Louisiana purchaseLouisiana purchase
Louisiana purchase
 
Las Torres de Hanoi
Las Torres de HanoiLas Torres de Hanoi
Las Torres de Hanoi
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Passé compossé
Passé composséPassé compossé
Passé compossé
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Normas de convivencia en el salón de clases
Normas  de convivencia en el salón de clasesNormas  de convivencia en el salón de clases
Normas de convivencia en el salón de clases
 

Similar to Computer crimes

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 

Similar to Computer crimes (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Computer crimes

  • 1. Running Head: DIGITAL COMPUTER CRIME 1 Digital Computer Crimes Name Institution Course Date
  • 2. DIGITAL COMPUTER CRIME 2 Computer Crimes Globalization has made the use of computer to grow drastically over the years. More people from different parts of the world are coming closer to one another through computers. The World Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of cyber crimes. Although law enforcement agencies have come up with security policies, the number of crimes related to computer theft and hacking is still alarming. Organizations, as well as individuals are losing sensitive information to these crimes thus calling for imperative security measures. Amongst computer crimes, there are four major ones that have become prevalent. 1. Hacking Thus is a form of computer crime whereby a person’s PC or an organization’s main server is broken into and sensitive information regarding these entities accessed without their permission (Casey, 2011). Countries have taken measures to ensure that hacking is dealt with by classifying it as a felony with heavy jail term punishment. The process requires the use of sophisticated softwares to access computers from an unknown location. 2. Theft This is the violation of copyrights regarding music, movies, softwares and games and persons downloading such information without approval from recognized legal bodies. Also, peer sharing sites that encourage piracy are also considered to be included as committing theft. Hence, theft is mainly related to illegal downloading of softwares or other sensitive information without paying for it. 3. Identity Theft
  • 3. DIGITAL COMPUTER CRIME 3 This cyber crime is when a person accesses sensitive data information about another person’s debit cards account, social security numbers and even bank accounts. They usually use this information to buy online items and siphon money from the victims’ accounts. The victim could even end up losing their credit history thus causing more problems. 4. Cyber Stalking When a person is the subject of numerous online messaging streams and emails as well as constant harassment texts through social media, they are being stalked through the internet. The crime usually makes a person uncomfortable and unable to contact their friends through these online social media sites. Digital Crimes Unlike computer crimes which are related to the computer and mainly affect its function or information stored on the computer, digital crime is different. It usually revolves around every hardware or software that is linked to the internet thus making the crime electronic in nature. There are many forms of digital crimes ranging from spoofing to extortion. Sport betting is one form of digital crime where people engage in business of betting on sports events over the internet. Since the betting is regulated through software generating codes to increase credibility, the softwares could be hacked and manipulated to favor one individual to win the bet. Spoofing is when a person accesses another person’s computer without permission and sending multiple emails to deceive recipients. The crime could be motivated by commercial gain or blackmail and thus carries a heavy jail term punishment as well. Extortion as well is another digital crime that is prevalent at this present time. A person can use the internet to threaten others either for commercial gain or other valuable things (Jaishankar, 2011). For example, hackers can access
  • 4. DIGITAL COMPUTER CRIME 4 sensitive private information from an organization and use it to extort the organization for a thing of value or money, or else they make the information public. Hacking and its Threats Hacking poses an overall threat to the safety of a nation and almost every domain that the nation is made of. It affects families, businesses, organizations, institutions, government departments and even healthcare institutions as long as computers and other digital devices are applied in these areas. To make matters worse, hacking encourages the increase of terrorism across the globe. Research across all security areas show that the buying and selling of sensitive data information that has been hacked is increasingly growing. Through hacking of businesses such as banks, terrorism, and other social ills are able to expand their agenda to the global scale. Online banking fraud which is as a result of hacking has been found to £33m per year in the UK alone. This shows that hacking poses a threat that extends from mere computer safety to a nationwide disaster. Hacking hence not only affects businesses but acts as a pathway for committing other crimes. Roles and Response of the U.S Government and Court System The Federal Bureau of Investigations (FBI) which is a law enforcement agency of the government is the major agency that deals with the investigation and prosecution of computer crimes (Brenner, 2010). The department of Justice, which is closely linked to the U.S court system, works in conjunction with the FBI to counter cyber crimes. Also, through the legal system, there are a number of Acts that have been put in place to counter such crimes. The Computer Fraud and Abuse Act, for example, which is the broadest statute in the U.S tries to define multiple related cyber crimes such as espionage, computer
  • 5. DIGITAL COMPUTER CRIME 5 trespassing, and hacking of government information among others. This Act also stipulates the consequence as well as punishment that one is liable to when found guilty of these charges. National agencies such as the FBI can work closely with international private organizations such as Internet Service Providers (ISPs) to become more effective when dealing with cyber crimes. Since the internet has increased globalization, the FBI should focus more on working with international private agencies to gather information concerning hacking groups and their threat potential.
  • 6. DIGITAL COMPUTER CRIME 6 References Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the Internet (3rd ed.). Waltham, MA: Academic Press. Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca Raton, FL: CRC Press. Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.
  • 7. DIGITAL COMPUTER CRIME 6 References Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the Internet (3rd ed.). Waltham, MA: Academic Press. Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca Raton, FL: CRC Press. Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.