StudentShare solutions
Triangle menu

Computer crimes,ethics, and privacy - Research Paper Example

Nobody downloaded yet

Extract of sample
Computer crimes,ethics, and privacy

The advent of computers and internet in our daily life has given rise to computer crimes, illicit activity that is carried out by the help of computers, and these crimes have had a ponderous impact on the moral values of the people, especially adolescents. In this paper we will attempt to highlight some computer crimes and explain how these crimes give rise to ethical issues. Also a detailed discussion will be made on the breach of privacy through computer crimes. The paper talks about computer technology and ethical issues it poses therefore it is perfectly related to the chapter. Computer Crimes Computer crimes are formally defined as crimes that involve a computer and a network (Moore, 4). Crimes that are carried out by the help of a computer or where computer is the target also come under computer crimes. The word cyber crime is also used interchangeably for computer crime. The most common of computer crimes include identity theft, financial theft, spamming, and breach of privacy. There has been seen a surge in cyber crimes mainly due to the increasing reliance on computers and network. Almost everything is run by computers these days and therefore can be targeted by cyber criminals. Malware (short form for malicious software) is the most prevalent form of computer crime where a person controls a computer by planting some malicious code. The attacker can install or plant the code on a system and then can enjoy great access to the computer without authorization of the user (Skoudis & Zeltser, 2). Common types of Malware include Virus, Trojan, and Worm. Malwares are used to gain access to computers, sometimes just for fun. They can delete important files and can also slow down the speed of the system. Identity theft is another computer crime that can make life of a computer user miserable. The effects of this computer crime are more ponderous than Malware as it can financially hurt the individual. Identity theft involves stealing information of extremely personal nature in order to use it for some benefit. Mainly hackers try to gain access to bank account passwords, credit card numbers etc to steal money from the users. The crime of identity theft is extremely prevalent and many people lose their money on a daily basis as a result of it. E commerce has given users opportunity to shop online using credit cards and online merchant accounts. This has in turn increased the chances of identity theft. Other computer crimes include cyber stalking, spamming, and child pornography. Cyber stalking refers to the use of internet for stalking purposes by using personal information of a person. Cyber stalkers use internet to repeatedly harass a person and therefore it is listed as a computer crime (Pot, 1). Spamming refers to the bulk messages that are sent to users. These are unwanted messages that fill the inboxes of users. Spamming is a big business for many people and causes problems for users. Child pornography is also propagated through internet and it is a serious offense. Children are left vulnerable because child pornography has become a business today through internet. Ethical Issues Involving Computer Crimes Computer crimes pose many ethical issues for the society. The main problem of computer crimes is that they are mostly conducted by teenagers or young people in general. This has posed many problems for the society at large. Younger generation is the ...Show more

Summary

Customer Inserts His/her Name Customer Inserts Customer Inserts Grade Course (23, 10, 2011) Computer Crimes, Ethics, and Privacy Introduction The age of technology has made our world cozier to a great extent but at the same technology has negatively affected the moral values of the society in general…
Author : gutkowskicharle
Computer crimes,ethics, and privacy essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"Computer crimes,ethics, and privacy"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Personal Data Privacy
1 Introduction Internet evolution has aided businesses to collect and store data in their databases from online business i.e. from the Internet. Customers visit websites and but products online. In order to do so, they provide information related to their credit cards, banking details, personal details etc.
10 pages (2500 words) Research Paper
Invasion of Privacy
The right to privacy in this context means that no individual or organization has the absolute right to divulge information relating to a person’s private life, which may portray such person in bad light. This is essential especially in protecting vulnerable persons such as celebrities and other public figures that are always under the watchful eye of the media, which is considered as always keen to make business by revealing delicate information which it considers newsworthy.
8 pages (2000 words) Research Paper
Adminstrative Ethics and Patient Privacy
Administrative Ethics and Patient Privacy Summary Overview This paper is going to discuss how administrative ethics, values, beliefs, perceptions, and their interconnection. Furthermore, in the issue statement the discussion dwells on the current administrative ethics that are affecting patient privacy and rights (Cooper, 2011).
5 pages (1250 words) Research Paper
Professional Ethics and Responsibilities in Computer Technology
(2011, August). Legal Ethics. Retrieved February 19, 2012, from http://www.law.duke.edu/lib/researchguides/legale 10 Introduction Every aspect of information and communication technology focuses on at least one ethical dilemma. From email services to Facebook websites, information technology developers and users are unacquainted with the balance between ethics and revenue struck by service providers.
6 pages (1500 words) Research Paper
Communications Surveillance, Privacy and Its Ethical Implications
Communication surveillance is not a new idea. It has been seen in different forms. Organizations have long been used it to monitor their employees whether they are using company time in carrying out business tasks. Organizations pay their staff members for work not for their personal activities.
8 pages (2000 words) Research Paper
Computer-Based Crimes
Today, it is common for individuals to steal personal data from unsuspecting users online or for hackers to take over a website, even for a short time. This research paper not only describes such events, but also explaines terminology of hacking attacks, phishing and prevention and mitigation of computer-based crimes.
4 pages (1000 words) Research Paper
Phishing computer crimes
The concept of the cyber world and the Internet has revolutionized the World to a great extent. Every technology has some pros and cons. The above mentioned are the advantages of computer but there are also some weak points of this technology. The computers have mechanized the whole world too much and people heavily depend too much on computers.
4 pages (1000 words) Research Paper
Computer Hacker
According to the paper despite the fact that technology is of great benefit to humans today, the same technology exposes the human race to considerable danger, especially if used in the wrong manner, and with the wrong motives. Nonetheless, with regard to computer technology, this will benefit and serve people in the most appropriate manner, if it is used with the right motives.
6 pages (1500 words) Research Paper
Computer Crimes
All these innocent victims are regular users of the computer and internet. Companies have all their confidential data stored up in their computers. Companies have
2 pages (500 words) Research Paper
Adminstrative Ethics and Patient Privacy
However, in the issue discussion, the paper aims at understanding recent ethical problems from different perspectives. In conclusion, it supports the concept of penalizing violators of patient privacy. In addition, different forms of
6 pages (1500 words) Research Paper
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment