Saturday, June 1, 2019

Computer Crime :: essays research papers fc

Computer Crime Problems with FormatBillions of dollars in losses eat already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computing device crime offender. Worst of all, anyone who is information processing system literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in nature-- slightlytimes recorded, more often not--occurring only on the Internet, with the only record being electronic impulses. Before discussing Internet crimes, we can expect to see in the days ahead, lets look at the good news The most-dreaded types of offenses--crimes such as murder, rape, assault, robbery, burglary, and vehicle theft--will be brought under control in the years ahead by a combination of technology and proactive community policing. Creation of the cashless society, for example, will eliminate m ost of the rewards for robbers and muggers, while computer-controlled smart houses and cars will thwart burglars and auto thieves. Implanted natural function monitors and chemical drips (such as sober-up drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control. But computer criminals--ranging in age from preteenager to senior citizen--will have ample opportunities to violate citizens rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge intimately these lawbreakers Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But increasingly, the hacker is being replaced by the menacing snapper--an individual or member of a group intent on using the Internet for illegal profit or terrorism. Access to the Internet has begun to explode geometrically, and technology is making the Internet even more friendly and affordable for milli ons of users. But foolproof protective systems can probably never be developed, although some high-tech entrepreneurs are certainly trying. Even if a totally secure system could ever be developed, it would likely disrupt the free flow of information--an unimaginable intrusion to most users. In fact, it is the ease of access that is driving this rapidly expanding field of crime. What are the major computer crimes being committed, how, and by whom? More importantly, where is computer crime headed in the twenty-first century? Lets look at five crime categories communications, government, business, stalking, and virtual crimes. COMMUNICATIONS CRIMES Already, cellular theft and phone fraud have become major crimes.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.