Fraud and Fraudulent Instruments - Essay Example

Only on StudentShare

Extract of sample
Fraud and Fraudulent Instruments

In 1996, the CFAA was amended by the National Information Infrastructure Protection Act. This Act amends all computers joined to the Internet and all computer activities, whether they occur locally or nationally". (Ferrera et al, 2001, p. 308)
The Act was introduced and amended in Title 18 of the United States Code (Ferrera et al, 2001, p. 309) for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping. "Since it is hard to prohibit criminals from the market, as can be done in some areas of white-collar crime or, increasingly via the civil law, from stores or even private shopping malls, the damage caused even by individual acts of computer fraud or vandalism may be entirely disproportionate to offenders' assets and income, far more so than in shop theft or fraud". (Bamfield, 1997)
According to Wall, "The term 'cyber crime' does not actually do much more than signify the occurrence of a harmful behaviour that is somehow related to a computer. It has no specific referent in law, and it is a concept that has been largely invented by the media. (Wall, 2001, p. ...
Download paper


The advancements of computer technologies where on one hand has created ease for us, on the other hand, this technology has produced many criminal minds for which it is necessary to develop and implement law and legislations. According to Benson et al, "Congress has treated computer-related crimes as distinct federal offenses since 1984 after passage of the Counterfeit Access Device and Computer Fraud and Abuse Law (CFAA)" (Benson et al, 1997)
Author : legrospansy

Related Essays

Data Hack at
The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.
11 pages (2761 words) Case Study
The Security Risks to Online Banking
Though, the Internet has made it possible for businesses to carry out their activities in a more efficient and cost-effective manner but at the same time, it has proved to be more insecure than traditional ways of trade because practically, it is much more difficult and expensive to tackle fraudulent activities that cyber-criminals and hackers carry out aggressively to steal confidential; financial data of online-businesses for their own benefit.
40 pages (10040 words) Coursework
Controlling the Internet
However, with the free and unlimited power of the Internet comes great responsibility not only for our leaders but to each and everyone. Since the Internet has also become the haven for offensive and detestable content and gateway for malicious and destructive activities, there have been calls to control and police the use of the Internet in the name of protecting the members of our community predominantly the innocent children. "For success in any field of human activity leads to crime that needs mechanism to control it" (Singh, 2005, p.1) and "technology is a human activity" (Williams, 1997,...
10 pages (2510 words) Essay
Internet Security Article
All these threats are linked to global internet security. I aim to research on the topic of global internet security.
1 pages (251 words) Article
Global Internet Security
All these threats are linked to global internet security.
14 pages (3514 words) Essay
Identity Cards
However, debate continues as to how well a smart identity card containing a biometric will actually address the problems of terrorism, illegal immigration and working, benefit fraud, abuse of public services and identity theft. The terrorist attacks in London have stoked up the debate over the UK Government's identity card scheme, and highlighted the central issue of whether they would actually make such incidents less likely. Yet it is not just core privacy activists who continue to argue that any benefits will be outweighed by the growth of surveillance and snooping that would inevitably in...
9 pages (2259 words) Assignment
Got a tricky question? Receive an answer from students like you! Try us!