StudentShare solutions
Triangle menu

Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party - Assignment Example

Not dowloaded yet

Extract of sample
Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party

INTRODUCTION Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party. The evolving technologies such as the expert use of smart phones, tablets, laptops, home computers have added the threat of new crimes every day. The criminal activities are encompassed by excessive use of technology and computer abuse, which have resulted in major social, cultural, and financial losses over the last two decades. The new dimension of criminal activities involves expert use of technology that is intelligent and technical that it can be even misread by the law enforcement agencies. For instance, a property crime on a larger scale involves fraud against the property of people without involving any physical contact with the people (Denning, 2004). The prevention of such crimes is essential for the future of advance technology and criminal investigations undertaken by trained computer experts or forensic individuals. The advancement of technology and awareness of computer abuse possess a serious threat for not only to individual but also to the nation’s security in terms of legislative and financial crimes preceded by computer frauds and abuse. It has also resulted in crash of financial markets, the great depressions periods and various money laundering cases, which is a threat for not only the national security but also preceded under anti-terrorism globally. The last three decades have given rise to various hacker groups around the globe who had attacked and invaded the financial market as well as the highly sensitive data regarding the national security. For instance in recent years, the wake of wiki leaks is a big example of computer abuse. It has resulted in releasing secret sensitive information and publishing documents that possess a serious national and financial threat globally (National White Collar Crime Centre, 2002). The emerging threats from excessive computer abuse have raised the scope of federal and local legislation in regards to larger crimes. The legislations and penalties are in place to combat the computer abuse and punish the offenders for misuse of information and data (Denning, 2004). DISCUSSION Computer Crimes and Abuse Computer crimes are defined as criminal activities committed in a technological environment in order to cause damage or derive economic gains from other others (U.S. Department of Justice, 2001). According to the adaption of Cohen Felson’s Routine Activities theory, a crime is determine due to the availability of a suitable target, lack of backing from any guardian and a serious motive by the offender. It was also stimulated that usage of computer adversely can result in invading the sensitive information and using it for criminal purposes (Gordon et al, 2003). It is also confided in law that intentionally or without permission, accessing the computer services or any device can result in committing a criminal offence (National Security Institute, 2004). The traditional crimes such as fraud, theft and organised criminal rings are now ...Show more

Summary

Running Head: Finance and Accounting Finance and Accounting Computer Fraud and Abuse Table of Contents EXECUTIVE SUMMARY 1 INTRODUCTION 2 DISCUSSION 4 Computer Crimes and Abuse 4 Computer Fraud 4 Various Computer Frauds 5 Spamming 5 Advanced Fee Fraud 6 Employment Frauds 6 Counterfeit Schemes 6 Credit/ Debit Card Computer Fraud 7 Investment Fraud 7 Phishing Fraud 7 Cyber Terrorism 8 COMPUTER CRIME STATISTICS 8 CONCLUSION AND RECOMMENDATIONS 12 REFERENCES 14 EXECUTIVE SUMMARY The availability of electronic resources has increased in the last three decades and has given rise to various new criminal activities…
Author : gracielaharris
Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party"
with a personal 20% discount.
Grab the best paper

Related Essays

Health Information Technology: Electronic Medical Records System
One of these improvements is the health information technology, particularly the employment of electronic medical records in healthcare institutions. According to Elekwachi (2008), electronic health records (EHR) pertains to the broad term for the patient records, whereas, electronic medical records (EMR) pertains to records operating within an organization.
3 pages (750 words) Assignment
Electronic and Digital Media Industry Paper
Examples of these roles include using internet to market products of the companies, shop for needed items, through satellite, people are able to view many programs aired from all over the world, and technology through the electronic media provides direction to new places (which is especially useful to strangers) through the GPRS.
3 pages (750 words) Assignment
Computer Use
Later when it was opened no body can handle it properly. The staff also at that time was less, there were only four people working in the branch then. The business also at that time was easily managed and as such there was no requirement of any automated system.
10 pages (2500 words) Assignment
Advocacy campaign against child abuse
According to the Public Health Agency of Canada child abuse occurs when a parent, guardian, or caregiver mistreats or neglects a child, resulting in injury, significant emotional or psychological harm, or serious risk of harm to the child.Child abuse can take many forms, the most common and well-known of which is physical abuse.
3 pages (750 words) Assignment
Electronic and Digital Media Industry
Electronic media is that which requires an electronic device to be accessed while digital media is a type of electronic media but its data is stored in a digital and not analog form. Other than technology aiding in the production of the electronic and digital media, it performs other roles including assisting in marketing.
3 pages (750 words) Assignment
Subject: Crime and Criminal Behavior / Paper Topic: Crimes against Persons
They were eventually robbed of their things and thrown out of the bus after the rape incident. As revealed, “as well as counts of
2 pages (500 words) Assignment
Solutions problem of computer information system
It acts as the most critical point in ensuring that the currently executing programs are provided with ample space to perform preferred sets of services. In essence,
2 pages (500 words) Assignment
Media use forecast
In the workplace I read magazine during lunch time and focus much on social issues in marriage and relationships, healthcare and technology. After work when I go home where I have a complex
1 pages (250 words) Assignment
Successful Implementation of Electronic Health Information Technology
“The integration of electronic health records (EHR) has become a major organizational change objective in health care because of its promise of major improvements from paper records” (Boswell, 2011, p. 138). Some of the main benefits observed by
2 pages (500 words) Assignment
Information and computer security
The two potential applications for this iris based key generation method for cryptography include: One of the suitable applications for iris based key generation method for cryptography is
6 pages (1500 words) Assignment
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation