Fraud and Fraudulent Instruments

Masters
Essay
Technology
Pages 4 (1004 words)
Download 0
The advancements of computer technologies where on one hand has created ease for us, on the other hand, this technology has produced many criminal minds for which it is necessary to develop and implement law and legislations. According to Benson et al, "Congress has treated computer-related crimes as distinct federal offenses since 1984 after passage of the Counterfeit Access Device and Computer Fraud and Abuse Law (CFAA)" (Benson et al, 1997)

Introduction

In 1996, the CFAA was amended by the National Information Infrastructure Protection Act. This Act amends all computers joined to the Internet and all computer activities, whether they occur locally or nationally". (Ferrera et al, 2001, p. 308)
The Act was introduced and amended in Title 18 of the United States Code (Ferrera et al, 2001, p. 309) for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping. "Since it is hard to prohibit criminals from the market, as can be done in some areas of white-collar crime or, increasingly via the civil law, from stores or even private shopping malls, the damage caused even by individual acts of computer fraud or vandalism may be entirely disproportionate to offenders' assets and income, far more so than in shop theft or fraud". (Bamfield, 1997)
According to Wall, "The term 'cyber crime' does not actually do much more than signify the occurrence of a harmful behaviour that is somehow related to a computer. It has no specific referent in law, and it is a concept that has been largely invented by the media. (Wall, 2001, p. ...
Download paper
Not exactly what you need?

Related papers

Data Hack at Monster.com
The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.…
The Security Risks to Online Banking
Though, the Internet has made it possible for businesses to carry out their activities in a more efficient and cost-effective manner but at the same time, it has proved to be more insecure than traditional ways of trade because practically, it is much more difficult and expensive to tackle fraudulent activities that cyber-criminals and hackers carry out aggressively to steal confidential;…
Fraud and Fraudulent Instruments
In 1996, the CFAA was amended by the National Information Infrastructure Protection Act. This Act amends all computers joined to the Internet and all computer activities, whether they occur locally or nationally". (Ferrera et al, 2001, p. 308)…
Controlling the Internet
However, with the free and unlimited power of the Internet comes great responsibility not only for our leaders but to each and everyone. Since the Internet has also become the haven for offensive and detestable content and gateway for malicious and destructive activities, there have been calls to control and police the use of the Internet in the name of protecting the members of our community…
Internet Security Article
All these threats are linked to global internet security. I aim to research on the topic of global internet security.…
Global Internet Security
All these threats are linked to global internet security.…
Identity Cards
However, debate continues as to how well a smart identity card containing a biometric will actually address the problems of terrorism, illegal immigration and working, benefit fraud, abuse of public services and identity theft. The terrorist attacks in London have stoked up the debate over the UK Government's identity card scheme, and highlighted the central issue of whether they would actually…