Computers as Accessories to Crime Term Paper by scribbler

A brief overview of computer and cyber crime.
# 152105 | 839 words | 3 sources | APA | 2012 | US
Published on Dec 30, 2012 in Computer and Technology (General) , Criminology (General)


$19.95 Buy and instantly download this paper now

Description:

This paper first explains that there are many various forms of cyber crimes and that they can be widely classified into four major categories of computer crimes: computer as a target, computer as the crime device, computer as a subsidiary for other crimes and crimes linked with the popularity of computers. The paper also examines several examples where a computer may be classified as an instrument of crime together as well as examines the impact of cyber crime and the invovement of the Federal government in preventing it.

Outline:
"Computer as the Instrument of Crime" Category
Impact of Computer Crimes and the Federal Government

From the Paper:

"Credit card frauds, fraudulent use of ATMs, theft of money from transfer accounts, telecommunications frauds and internet transactions' frauds are some of the examples where the computer is used as a means for committing crime ("Different Types of Computer Crimes" n.d.). In the category where computer is a subsidiary for other crimes, the computer is not necessary for the occurrence of the crime. Though the computer accelerates the occurrence of the crime, it would happen without the technology. For crimes linked with the prevalence of computers, the technological advancements essentially creates new crime targets such as counterfeiting or piracy of software, copyright infringement of computer programs, counterfeiting of computer equipment and theft of technological equipment. The objective of crimes where computer is a target is basically to spoil or steal data from a computer at distant location."

Sample of Sources Used:

  • Akhter, F. (2006, February 16). Computer Crimes. Retrieved March 28, 2010, from http://ezinearticles.com/?ComputerCrimes&id=146198
  • Lasar, M. (2009, November 19). An introduction to the FBI's anti-cyber crime network. Retrieved March 28, 2010, from http://artstechnica.com/web/news/2009/11/an-introduction-to-the-fbis-anti-cybercrime-network.ars
  • "What are Different Types of Computer Crimes" (n.d.). Legalcybertips.com. Retrieved March 28, 2010, from http://www.legalcybertips.com/criminal-law/computer-crime/What-Are-Different-Types-Of-Computer-Crimes.html

Cite this Term Paper:

APA Format

Computers as Accessories to Crime (2012, December 30) Retrieved July 15, 2020, from https://www.academon.com/term-paper/computers-as-accessories-to-crime-152105/

MLA Format

"Computers as Accessories to Crime" 30 December 2012. Web. 15 July. 2020. <https://www.academon.com/term-paper/computers-as-accessories-to-crime-152105/>

Comments