Crimes against Computer System Analysis
Looks at high-tech crime, a new kind of white-collar crime, usually involving the theft of information, resources or funds.
# 152671 | 1,265 words | 4 sources | APA | 2013 |
Published on Apr 14, 2013 in Business (Information Mgmt. and Systems) , Criminology (Public and Crime) , Computer and Technology (General)
$19.95 Buy and instantly download this paper now
This paper explains that computer and other high-tech crimes cost consumers billions of dollars every year, which will increase in the future. Next, the paper reviews types of high-tech crimes, techniques used to commit these acts, protective legislation and the agencies that enforce these laws. The paper stresses that people, who illegally copy software, violate the Criminal Copyright Infringement Act, which punishes copying and distribution of software for financial gain or advantage.
From the Paper:"Although most of these types of crime involve using computers for personal gain, the last category typically involves activities that are motivated more by malice than by profit. When computers themselves are the target, criminals are typically motivated by revenge for some perceived wrong; a need to exhibit their technical prowess and superiority; a desire to emphasize the exposure of computer security systems; a need to spy on other people's confidential monetary and personal information called computer voyeurism; or a philosophy of open access to all systems and programs. Several common techniques are used by computer criminals. In fact, computer theft has become so common that experts have created their own jargon to describe theft styles and methods.
"The first is the Trojan horse and with this one computer is used to reprogram another for illicit purposes. Another is the salami slice which is when an employee sets up a dummy account in the company's computerized records. A small amount, even a few pennies, is subtracted from customer's accounts and added to the account of the thief. Even if they detect the loss, the customers won't complain. The pennies picked up here and there eventually amount to thousands of dollars in losses."
Sample of Sources Used:
- Branscomb, A. (1990). "Rogue computer programs and computer rogues: Tailoring punishment to fit the crime", Rutgers Computer and Technology Law Journal, 16, 24-26.
- Larson, E. (1985, January 14). "Computers turn out to be valuable aid in Employee crimes", Wall Street Journal, p.1.
- Raskin X. & Schaldach-Paiva, J. (1995). "Computer crimes", American Criminal Law Review, 33, 541-573.
- Swanson, M. & Terriot, J. (1980). "Computer crime: Dimensions, types, causes and investigations", Journal of Political Science and Administration, 8, 305-306.
Cite this Analytical Essay:
Crimes against Computer System Analysis (2013, April 14) Retrieved September 18, 2020, from https://www.academon.com/analytical-essay/crimes-against-computer-system-analysis-152671/
"Crimes against Computer System Analysis" 14 April 2013. Web. 18 September. 2020. <https://www.academon.com/analytical-essay/crimes-against-computer-system-analysis-152671/>