SlideShare uma empresa Scribd logo
1 de 4
v                                  See more essay samples onESSAYSHARK.COM




           Research Paper Sample




         COMPUTER СRIME


    EssayShark.com - Online Academic Assistance
v                                                          See more essay samples onESSAYSHARK.COM




The widespread occurrence of computer crime has given rise to abundant research and
investigation on the subject. The incidence of criminal behavior on the internet is directly
related to the increase in time users spend at the computer. That is, the longer people spend
working, communicating, doing business, or seeking entertainment on their computers, the
more likely they are to encounter – or attempt – criminal behaviors (Jaishankar 27). Any
endeavor to research this subject must include data, findings, and studies from the early days
of the internet to the present day, because changes and innovations occur rapidly and
constantly.

It is not difficult to find recent works that treat the subject of cyber criminality. A number of
excellent books have been written by Information Technology (IT) experts, and there are also
some very comprehensive law books, which enumerate the aspects of crimes that take place
online, how they are dealt with, and the legislation put into place to control them.

Robert Moore (2010), in his recent book Cybercrime, Second Edition: Investigating High-
Technology Computer Crime,introduces researchers, and those whose job it is to investigate
online misconduct, to existing and emerging hi-tech crimes. He explores legal issues, digital
evidence and how it is presented; and shows how criminal justice responds to cyber
criminology. As new ways of breaking the law using computers are devised by those with
malice in mind, new ways must be found to fight them (Moore 15). This IT expert explains
how certain terms, such as „hacker‟, came about, what online criminals do and how they
think, and how investigators at agencies such as the Federal Bureau of Investigation (FBI) go
about understanding, investigating and controlling their ill deeds (Moore 24). The book also
treats data manipulation, denial-of-service attacks, the creation of Trojan horses and other
viruses, and goes on to describe the language and ethics of hackers.

“In less than 15 years, cybercrime has moved from obscurity to the spotlight of consumer,
corporate and national security concerns.” (Florencio and Herley, 2012) So starts an article in
a New York Times earlier this year. The article goes on to give some statistics about the
frequency and growth of online crime and how the only reason incidences are not more
massive is that pickings are necessarily limited and exhausted quickly. The writers assert that
although many respondents to surveys exaggerate their losses, it would be a „mistake not to
consider cybercrime to be a serious problem.‟ (Florencio and Herley, 2012).
v                                                         See more essay samples onESSAYSHARK.COM


In their latest book Computer Crime, Investigation, and the Law, C. Easttom and J. Taylor
(2010) write that the online world is awash „in identity theft, online child predators, and even
cyber espionage‟. They enumerate cases of unauthorized access, phishing, auction fraud,
session hijacking, brute force attacks, foot-printing, and website hacking that are becoming
harder to predict, prepare for, or counter. Hacking techniques are becoming more
sophisticated and difficult to fight (Easttom and Taylor 209). Identity theft techniques, for
instance, are doubling in efficiency every week, and because the consequences for the victims
can be very severe and difficult to reverse, hundreds of thousands of people are affected.

In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, the editor K.
Jaishankar (2011) has collected articles by a number of noted authors on the subject of
computer crime, with topics that include the criminal subculture of the internet, deviants‟ and
perpetrators‟ perspectives, how hackers regard identity construction, digital piracy, and cyber
stalking. This interesting book has an important conclusion by the editor that shows how
location has become irrelevant, and that crime on the internet can have no real limits or
borders. It is no longer a question whether cyber criminology will emerge as a separate
discipline, but rather when this will be established in colleges, universities and the courses
run by crime fighters in this all-important field (Jaishankar 411).

One of the most important findings that appear in these books is that computer crime is
committed by those to whom online anonymity seems to mean identity flexibility, and is
related to dissociative behavior (Jaishankar xxix). If one commits a crime online, the
likelihood of criminal behavior offline is increased. This does not bode well for the future,
and seems to indicate that everyone must be more security-conscious and mindful of
cybercrime and its implications.
v                                                     See more essay samples onESSAYSHARK.COM


     References


Easttom, C., and Taylor, J.,Computer Crime, Investigation, and the Law Course
     TechnologyPTR, 2010.

Florencio, D., and Herley, C., The Cybercrime Wave that Wasn’t New York Times Sunday
     Review, April 14, 2012 Retrieved August 20, 2012
     http://www.nytimes.com/2012/04/15/opinion/sunday/the-cybercrime-wave-that-
     wasnt.html

Jaishankar, K (Editor) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior
     CRC Press, 2011.

Moore, R. Cybercrime, Second Edition: Investigating High-Technology Computer Crime
     Anderson Publishing, 2010.

Mais conteúdo relacionado

Destaque

Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research PaperDraizelle Sexon
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolDenni Domingo
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about BullyingDarlene Enderez
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its partsDraizelle Sexon
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paperQueene Balaoro
 
Correct Use of Sources
Correct Use of SourcesCorrect Use of Sources
Correct Use of Sourcesdrgcuny
 
Stroopeffect
StroopeffectStroopeffect
Stroopeffectmikemod
 
Revisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperRevisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperDr. Alex Rinehart
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research PaperJacqui Brauman
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paperChristopher Swires
 
Research proposal approval sheet
Research proposal approval sheetResearch proposal approval sheet
Research proposal approval sheetmegan0913
 
Research Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKResearch Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKSamantha Schultz
 

Destaque (18)

Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research Paper
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about Bullying
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paper
 
ThesisWritingSample
ThesisWritingSampleThesisWritingSample
ThesisWritingSample
 
Correct Use of Sources
Correct Use of SourcesCorrect Use of Sources
Correct Use of Sources
 
Stroopeffect
StroopeffectStroopeffect
Stroopeffect
 
Revisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis PaperRevisiting the Diet Heart Disease Hypothesis Paper
Revisiting the Diet Heart Disease Hypothesis Paper
 
Death and Social Media Research Paper
Death and Social Media Research PaperDeath and Social Media Research Paper
Death and Social Media Research Paper
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paper
 
Internet Addiction Disorder
Internet Addiction DisorderInternet Addiction Disorder
Internet Addiction Disorder
 
sample thesis powerpoint2
sample thesis powerpoint2sample thesis powerpoint2
sample thesis powerpoint2
 
Research proposal approval sheet
Research proposal approval sheetResearch proposal approval sheet
Research proposal approval sheet
 
Research paper 2010
Research paper 2010Research paper 2010
Research paper 2010
 
Research Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINKResearch Paper_Schultz (2) BULLYING LINK
Research Paper_Schultz (2) BULLYING LINK
 
Stroop Effect
Stroop EffectStroop Effect
Stroop Effect
 

Mais de ESSAYSHARK.com

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films ESSAYSHARK.com
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!ESSAYSHARK.com
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesESSAYSHARK.com
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSESSAYSHARK.com
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed ESSAYSHARK.com
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National CuisineESSAYSHARK.com
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipESSAYSHARK.com
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on GlobalizationESSAYSHARK.com
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyESSAYSHARK.com
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting StyleESSAYSHARK.com
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book ReviewESSAYSHARK.com
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book ReportESSAYSHARK.com
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That RocksESSAYSHARK.com
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeESSAYSHARK.com
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing ExercisesESSAYSHARK.com
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different LanguagesESSAYSHARK.com
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]ESSAYSHARK.com
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student TripsESSAYSHARK.com
 

Mais de ESSAYSHARK.com (20)

The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films The Evolution of Female Representation in Disney Princess Films
The Evolution of Female Representation in Disney Princess Films
 
Happy 10 years, EssayShark!
Happy 10 years, EssayShark!Happy 10 years, EssayShark!
Happy 10 years, EssayShark!
 
The Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female EmployeesThe Pay Gap Between Male and Female Employees
The Pay Gap Between Male and Female Employees
 
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESSSCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
SCHOOL UNIFORM: THE KEY TO A SUCCESSFUL LEARNING PROCESS
 
Are Antidepressants Overprescribed
Are Antidepressants Overprescribed Are Antidepressants Overprescribed
Are Antidepressants Overprescribed
 
Geographical Conditions and National Cuisine
Geographical Conditions and National CuisineGeographical Conditions and National Cuisine
Geographical Conditions and National Cuisine
 
The Most Iconic Examples of Censorship
The Most Iconic Examples of CensorshipThe Most Iconic Examples of Censorship
The Most Iconic Examples of Censorship
 
Presentation on Globalization
Presentation on GlobalizationPresentation on Globalization
Presentation on Globalization
 
What is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX CenturyWhat is the Significance of Civil Rights Movements in the Middle of XX Century
What is the Significance of Civil Rights Movements in the Middle of XX Century
 
APA Formatting Style
APA Formatting StyleAPA Formatting Style
APA Formatting Style
 
MLA Formatting Style
MLA Formatting StyleMLA Formatting Style
MLA Formatting Style
 
Chicago Formatting Style
Chicago Formatting StyleChicago Formatting Style
Chicago Formatting Style
 
«Crime and Punishment» Book Review
«Crime and Punishment» Book Review«Crime and Punishment» Book Review
«Crime and Punishment» Book Review
 
«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report«Young Doctors Notebook» Book Report
«Young Doctors Notebook» Book Report
 
How to Write a Resume That Rocks
How to Write a Resume That RocksHow to Write a Resume That Rocks
How to Write a Resume That Rocks
 
Tricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew beforeTricks about effective studying you wish you knew before
Tricks about effective studying you wish you knew before
 
13 Creative Writing Exercises
13 Creative Writing Exercises13 Creative Writing Exercises
13 Creative Writing Exercises
 
7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages7 English Idioms That Sound Funny in Different Languages
7 English Idioms That Sound Funny in Different Languages
 
EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]EssayShark in Numbers: 2016 Roundup [Infographic]
EssayShark in Numbers: 2016 Roundup [Infographic]
 
6 Tips for Student Trips
6 Tips for Student Trips6 Tips for Student Trips
6 Tips for Student Trips
 

Último

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Último (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Research Paper Sample

  • 1. v See more essay samples onESSAYSHARK.COM Research Paper Sample COMPUTER СRIME EssayShark.com - Online Academic Assistance
  • 2. v See more essay samples onESSAYSHARK.COM The widespread occurrence of computer crime has given rise to abundant research and investigation on the subject. The incidence of criminal behavior on the internet is directly related to the increase in time users spend at the computer. That is, the longer people spend working, communicating, doing business, or seeking entertainment on their computers, the more likely they are to encounter – or attempt – criminal behaviors (Jaishankar 27). Any endeavor to research this subject must include data, findings, and studies from the early days of the internet to the present day, because changes and innovations occur rapidly and constantly. It is not difficult to find recent works that treat the subject of cyber criminality. A number of excellent books have been written by Information Technology (IT) experts, and there are also some very comprehensive law books, which enumerate the aspects of crimes that take place online, how they are dealt with, and the legislation put into place to control them. Robert Moore (2010), in his recent book Cybercrime, Second Edition: Investigating High- Technology Computer Crime,introduces researchers, and those whose job it is to investigate online misconduct, to existing and emerging hi-tech crimes. He explores legal issues, digital evidence and how it is presented; and shows how criminal justice responds to cyber criminology. As new ways of breaking the law using computers are devised by those with malice in mind, new ways must be found to fight them (Moore 15). This IT expert explains how certain terms, such as „hacker‟, came about, what online criminals do and how they think, and how investigators at agencies such as the Federal Bureau of Investigation (FBI) go about understanding, investigating and controlling their ill deeds (Moore 24). The book also treats data manipulation, denial-of-service attacks, the creation of Trojan horses and other viruses, and goes on to describe the language and ethics of hackers. “In less than 15 years, cybercrime has moved from obscurity to the spotlight of consumer, corporate and national security concerns.” (Florencio and Herley, 2012) So starts an article in a New York Times earlier this year. The article goes on to give some statistics about the frequency and growth of online crime and how the only reason incidences are not more massive is that pickings are necessarily limited and exhausted quickly. The writers assert that although many respondents to surveys exaggerate their losses, it would be a „mistake not to consider cybercrime to be a serious problem.‟ (Florencio and Herley, 2012).
  • 3. v See more essay samples onESSAYSHARK.COM In their latest book Computer Crime, Investigation, and the Law, C. Easttom and J. Taylor (2010) write that the online world is awash „in identity theft, online child predators, and even cyber espionage‟. They enumerate cases of unauthorized access, phishing, auction fraud, session hijacking, brute force attacks, foot-printing, and website hacking that are becoming harder to predict, prepare for, or counter. Hacking techniques are becoming more sophisticated and difficult to fight (Easttom and Taylor 209). Identity theft techniques, for instance, are doubling in efficiency every week, and because the consequences for the victims can be very severe and difficult to reverse, hundreds of thousands of people are affected. In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, the editor K. Jaishankar (2011) has collected articles by a number of noted authors on the subject of computer crime, with topics that include the criminal subculture of the internet, deviants‟ and perpetrators‟ perspectives, how hackers regard identity construction, digital piracy, and cyber stalking. This interesting book has an important conclusion by the editor that shows how location has become irrelevant, and that crime on the internet can have no real limits or borders. It is no longer a question whether cyber criminology will emerge as a separate discipline, but rather when this will be established in colleges, universities and the courses run by crime fighters in this all-important field (Jaishankar 411). One of the most important findings that appear in these books is that computer crime is committed by those to whom online anonymity seems to mean identity flexibility, and is related to dissociative behavior (Jaishankar xxix). If one commits a crime online, the likelihood of criminal behavior offline is increased. This does not bode well for the future, and seems to indicate that everyone must be more security-conscious and mindful of cybercrime and its implications.
  • 4. v See more essay samples onESSAYSHARK.COM References Easttom, C., and Taylor, J.,Computer Crime, Investigation, and the Law Course TechnologyPTR, 2010. Florencio, D., and Herley, C., The Cybercrime Wave that Wasn’t New York Times Sunday Review, April 14, 2012 Retrieved August 20, 2012 http://www.nytimes.com/2012/04/15/opinion/sunday/the-cybercrime-wave-that- wasnt.html Jaishankar, K (Editor) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior CRC Press, 2011. Moore, R. Cybercrime, Second Edition: Investigating High-Technology Computer Crime Anderson Publishing, 2010.