StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crime Issues - Research Paper Example

Cite this document
Summary
The paper "Computer Crime Issues" focuses on the critical analysis of the major issues in the case of computer crime. The Dangerous Connections video illustrates the role that computer internet sources play in flaring suicidal endeavours of distressed victims…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Computer Crime Issues
Read Text Preview

Extract of sample "Computer Crime Issues"

The Dangerous Connections video illustrates the role that computer internet sources play in flaring suicidal endeavours of distressed victims. Cecilia Blay, a former teacher, seeks to explain the connection between suicidal victims and their online suicide motivators. This follows a report of a successful suicide of a college girl called Nadi Kajouji. Investigations show that a friend she meets online entices her into committing suicide. The friend is a purportedly young nurse with the username, Cami D.

Cecilia discovers that there are over seven thousand websites that directly link to suicides. She also discovers websites with people struggling to commit suicide. Cecilia then establishes an online chat with a 17-year-old suicidal girl from South America. The girl is on a suicide trail with the enticement of a purportedly young nurse by the username, Li Dao. They make a concord to hang themselves together at a specific time in front of a webcam. As Cecilia later realizes, the nurse turns out to be a middle-aged man named William. William masks himself as Cami D, Falcon Girl, and Li Dao. The evidence provides a platform for inquiry into one of the most alarming computer crime syndicates.

The section expounds on the basic connection between interactive motivational typology and the crimes perpetrated by the computer. On a wider scale, the section elaborates the elements of humanity that can be enticed to motivate a suicide attempt. The motives for any criminal activity are dependent on a particular technology. There are psychological behavioural motives that motivate criminal activity.

Power assurance is a behavioural motive that restores the poise of low-confidence individuals. They perpetrate criminal activities through online molestation and blackmailing of their victims. Andrew Archambeau, a 32-year-old male stalker, molests a lady she meets through an online dating site. They meet personally and after the romance goes bad, Andrew molests her via emails. Profit-driving motives are the source of most computer crimes. Offenders seek to gain from computer crimes by defrauding their victims. In a case study, Vladimir Levin, a computer guru, defrauded a major bank of Russia funds through a fraud system. The motivators of suicidal computer crimes suffer from rage punitive, atrocious and devious behavioural motives.

The case of Andrew reaches the police's attention. The police warn Andrew to seize her actions. However, he proceeds with the behaviour. The assistant county prosecutor charges Andrew under the law of prowler as malfeasance. Vladimir Levin's case falls under the state laws of access for falsified drives. Computer crimes attract fines, probation and to a severe extreme, jailing. The penalty for computer crimes depends on the nature of the crime. Computer crimes against the state are a felony and attract severe penalties. Minor crimes, for instance, misdemeanours, attract a considerable amount of fine in most states.

Computer crimes are on the rise with the technological advancements in the current world. Courts require computer forensics to retrieve evidence for computer crime cases. Computer forensics decodes data in computer systems to act as evidence for computer crimes. This evidence is requisite in the court of law for the sentencing of perpetrators of computer crimes. Technological advancement empowers criminals with the skill to use encryption techniques to cover their tracks. However, armature criminals with diminutive technological know-how fail to cover their trail. This provides the law with the upper hand in utilizing computer forensics to retrieve evidence for sentencing.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652122-research-papaer-1
(Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words)
Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652122-research-papaer-1.
“Research Papaer 1 Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652122-research-papaer-1.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crime Issues

Computer Crimes, Ethics, and Privacy

The word cyber crime is also used interchangeably for computer crime.... Malware (short form for malicious software) is the most prevalent form of computer crime where a person controls a computer by planting some malicious code.... Identity theft is another computer crime that can make life of a computer user miserable.... The effects of this computer crime are more ponderous than Malware as it can financially hurt the individual....
6 Pages (1500 words) Research Paper

Computer-Based Crimes

Consequently, there is less emphasis on how criminal undertake computer crime and how their action affect stakeholders such as users, online businesses, and system developers.... computer crime refers to any criminal activity where criminals target a computer, or use computers to violate the law (Mooney, Knox, & Schacht, 2011).... These strategies are essential in preventing and in some cases limiting the above threats, which create ethical issues in computers....
4 Pages (1000 words) Research Paper

Computer laws in US. Computer Fraud and Abuse Act

This served as the first federal computer crime statute it was entitled Computer Fraud and Abuse Act of 1984 (CFAA).... This law was first amended in 1986 with the aim of writing effective computer crime legislation.... This law is very important in the US because all other laws about computer crime are drafted from it.... “Trespassers Will be Prosecuted: computer crime in the 1990's.... rg/issues/privacy/ecpa86/...
5 Pages (1250 words) Research Paper

Computer Crime and Safety Issues among Companies and Organization

The author of the following paper "computer crime and Safety Issues among Companies and Organization" will begin with the statement that in the past few years, we have witnessed remarkable developments in the capabilities of computerized information systems.... There is a high level of interest in computer crime and safety issues among companies and organization.... he use of computer as a repository evidence is another form of computer crime....
4 Pages (1000 words) Essay

Criminology Computer Crime Issues

This paper "Criminology – Computer Crime Issues" focuses on the questions and answers for the computer crime class, for example: Which crime scene is the most complex to investigate?... CRIMINOLOGY Multiple choice Question Answers computer crime Q&A exams three (3 Which crime scene is the most complex to investigate?... What factors have limited the ability of local law enforcement agencies to respond to the growing threat of computer crime?...
13 Pages (3250 words) Assignment

Comparison and Contrast of Federal and State Power over Computer Crimes

After the establishment of such provisions, the federal government is able to investigate about several impacts of cyber crime and also evaluate several issues pertaining to computer crime.... In this regard, the White House as well as the Senate in the year 1985 had introduced potential computer crime bills for controlling several kinds of criminal issues relating to computer crimes (Jarrett & Bailie, 2014).... More specifically, the urban areas of the US including New Jersey, Maryland, New York, California as well as Virginia are recognized to be most infected states due to the conduct of more computer crime related frauds....
14 Pages (3500 words) Research Paper

Computer Crime and Legal Regulation within England and Wales and Future Reforms

The paper "computer crime and Legal Regulation within England and Wales and Future Reforms" states that international cooperation to enhance legislation on computer crimes has been approached.... UNNING HEAD: computer crime and Legal Regulation within England and Wales and Future Reforms ... Amongst the fundamental issues of concern is the development of evidentiary and commercial laws suitable for e-commerce, the creation of new substantive computer crime offences, as well as procedural provisions which permit effective investigations and prosecutions in respect of computer data....
15 Pages (3750 words) Essay

The Role of Ethics in Security of a Community

Cybercrime protection not only helps the youths within the nation but also the people engaged in online businesses, the government institutions as well as industries that are directly affected by Computer Crime Issues. ... he existence of a national body that oversees that oversees the security issues in Australia faces many threats that interfere with its ability to properly deal with security issues.... Among the security threats that Australia faces is the interference by foreign nations, terrorism, propagation of weapons of mass destruction, organized crime and instability within the underdeveloped states....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us