Fraud and Fraudulent Instruments - Essay Example

Only on StudentShare

Extract of sample
Fraud and Fraudulent Instruments

In 1996, the CFAA was amended by the National Information Infrastructure Protection Act. This Act amends all computers joined to the Internet and all computer activities, whether they occur locally or nationally". (Ferrera et al, 2001, p. 308)
The Act was introduced and amended in Title 18 of the United States Code (Ferrera et al, 2001, p. 309) for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping. "Since it is hard to prohibit criminals from the market, as can be done in some areas of white-collar crime or, increasingly via the civil law, from stores or even private shopping malls, the damage caused even by individual acts of computer fraud or vandalism may be entirely disproportionate to offenders' assets and income, far more so than in shop theft or fraud". (Bamfield, 1997)
According to Wall, "The term 'cyber crime' does not actually do much more than signify the occurrence of a harmful behaviour that is somehow related to a computer. It has no specific referent in law, and it is a concept that has been largely invented by the media. (Wall, 2001, p. ...Show more

Summary

The advancements of computer technologies where on one hand has created ease for us, on the other hand, this technology has produced many criminal minds for which it is necessary to develop and implement law and legislations. According to Benson et al, "Congress has treated computer-related crimes as distinct federal offenses since 1984 after passage of the Counterfeit Access Device and Computer Fraud and Abuse Law (CFAA)" (Benson et al, 1997)
Author : legrospansy
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Fraud and Fraudulent Instruments"
with a personal 20% discount.
Grab the best paper

Related Essays

Data Hack at Monster.com
"The remote server held over 1.6 million entries with personal information belonging to several hundred thousands candidates, mainly based in the US, who had posted their resumes to the Monster.com Web site." (news.bbc.co.uk, 2007, para 5). The company provides recruitment services and has a number of related services, including a career centre.
11 pages (2750 words) Case Study
The Security Risks to Online Banking
But with this rapid growth, a number of risks are exposed to the online services, this is due to several reasons; the ubiquitous and global nature of electronic networks, the incorporation of legacy systems in e-banking platforms, reliance of banks on third party ISPs, and that is just to name a few.
40 pages (10000 words) Coursework
ENGINEERING HYDROLOGY
Such processes include surface runoff and infiltration, rainfall and snowfall, surface water evaporation, surface water exchange (between streams and lakes, etc), and groundwater storage. In this study, I have chosen to analyze, compare and contrast the recorded flow data from two catchments.
6 pages (1500 words) Assignment
Controlling the Internet
In general, our society has a positive attitude and discernment with regards to the Internet. They see it as vital, constructive, motivating, convenient, and indispensable tool for the realization of economic development for the local and global community.
10 pages (2500 words) Essay
Internet Security Article
Because of internet, there are many global internet security concerns. Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, threat to data protection and computer misuse.
1 pages (250 words) Article
Global Internet Security
With every beneficial invention, there are also disadvantageous aspects. Because of internet, there are many global internet security concerns. Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, threat to data protection and computer misuse.
14 pages (3500 words) Essay
Fires in the Built Enviornment
Mortality due to fire accidents have also increased. Burns are one among the serious injuries. Many people have lost their because of fatal fire accidents. Fire accident may occur at an open space or a building. The severity of the accident depends on the place and the cause of the accident.
10 pages (2500 words) Essay
Identity Cards
This could pave the way for the publication of a draft bill during 2004. For some, the announcement of measures to create a national identity card system marks a major breakthrough, which could put smart card technology into the pockets of millions of UK citizens.
9 pages (2250 words) Assignment
SPSS Software
According to the author of the text, the SPSS software will also be used to perform the correlation analysis (both Pearson’s r statistics and Spearman’s rho statistics) so as to establish the relationship between the variables in the study. And this will make it possible to test the study hypotheses.
1 pages (250 words) Research Proposal
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT