This website uses cookies to ensure you have the best experience. Learn more

Computer Crime Essay

1950 words - 8 pages

The introduction of computers in to the modern household has brought with it new moral issues. In the last 10 years computers have become increasingly cheaper to buy, due to huge technological advances and fierce competition, driving prices down. It the wake of the computer revolution the internet has followed quickly, becoming faster, cheaper and more accessible. With these technological advances the world has become increasingly smaller enabling piracy and file sharing to become common practice. Society now has many new issues to work through, from invasion of privacy to the copying of movies and hacking.

To define exactly what computer ethics is a difficult task due to it being tied to an evolving technology, the field changes whenever the technology changes.

Computer ethics did not truly exist as an ethical discipline until the 1970’s. Walter Maner was the first to use such a term stating it as “ethical problems aggravated, transformed or created by computer technology” [Maner, 1978]. While new ethical problems have arisen he also stated that old or existing problems have been made worse due to the expansion of information technology. Since then, several people have had different views on what computer ethics actually is.

In 1985 Deborah Johnson wrote a book entitled Computer ethics. It defined computer ethics as the study that “pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms” [Johnson, 1985]. Johnson was similar to that of Maner however; she did not believe computers created new ethical issues. Instead, recommending computers solely altered the existing issues by giving them a “twist”.

The best definition of this field was by James Moor. He stated that “Computers are logically malleable in that they can be shaped and molded to do any activity that can be categorized in terms of inputs, outputs and connecting logical operations” [Moor, 1985]. He suggested that the computer revelation is happening in two stages. The first is the introduction and enhancement phase. This stage has been and gone. The second stage is the implementation of computing into everyday life, in which the world is currently in the process of.

Computers are becoming apart of everyday activities, the threat is, this increases the chance of you becoming a victim of a form of computer crime [Khanna, 2005]. The notion of computer viruses or the thought that someone could hack into your computer from halfway around the world is certainly a major issue in the ideas of Computer Ethics. Where once physical security was the main problem, it appears that ‘logical security’ is considered more important [Khanna, 2005].

Spafford, Heaphy and Ferbrache divided the concept of logical security into five characteristics: Privacy and confidentiality, Integrity, Unimpaired service, Consistency and controlling access [Spafford, 1989].

Privacy was one of the...

Find Another Essay On Computer Crime

Computer crime Essay

1297 words - 5 pages Computer Crime:The Crime of the FutureEnglish II6 April 1996Computer Crimes Explosive growth in the computer industry over the last decade has made newtechnologies cheaper and simpler for the average person to own. As a result, computersplay an intricate part in our daily lives. The areas in which computers affect life areinfinite, ranging from entertainment to finances. If anything were to happen to theseprecious devices, the world would

Computer Crime in society Essay

1458 words - 6 pages Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers

Introduction to Computer Crime

2785 words - 12 pages computer crime Ever since the use of computers have been prevailing throughout the world, the number of computer crimes around the world has been further increased significantly. Computer crimes refer to any criminal activities that involve using computers for criminal activities or targeting other computers. Computers have become cheaper, powerful and much more easier to be used over the years, which attract even more people to use them and even

Computer Crime Investigations

771 words - 3 pages prevention programs are generated after hackers develop a new trick in cyber crime or computer crime. In addition some of the programs generating organizations have installed programs that can be used by the investigative agency. Discussion Board Some of the most important procedures used in collection of information to be used in a court of law include collecting live data from the RAMs images. Such live recovery of information can be

Computer Crime Final

1847 words - 8 pages The issue of Computer Crime has been a major problem that needs to be resolved. Computer Crime is spreading uncontrollably causing massive destruction around the world. In the past 5 years the rate of Cyber Crime has increased by 13 percent and extended to 7 different countries. There are several fallacies/current conditions that are associated with this problem including, Legal, Financial and Social Issues. Right now the police is trying to act

Computer Crime Analysis Report

873 words - 4 pages In order to compile the 2008 report on computer crime and security, The Computer Security Institute (CSI) sent out five thousand surveys to member companies and the organizations of people who had attended security events, such as conferences. Of the five thousand surveys, five hundred and twenty-two were completed and returned. The following is an analysis of CSI’s findings, with particular regard to total respondents and total loss, the top

Computer Crime Investigations Forensics Research

546 words - 2 pages AbstractThe research on Computer Crime Investigations Forensics and Tools and Technology article has covered a short outline from Journal of Forensic Identification. Some parts of the research were interesting and elementary for a non-tech or tech savvy on providing reference on computer forensics and other related computer fields.Computer Crime Investigations Forensics ResearchIntroductionThe Research and Evaluation I - RES/341 course has

Types and Defences of Computer Crime

1561 words - 6 pages systems.Threats and risksThis section gives a brief description about the main threats and risks in the information systems area. The section is divided into three parts. First, threat of accidents and malfunctions are described. The second part describes the threat of computer crime and finally factors that may increase the risks are described. If nothing else is mentioned, the main material content is referred to Alter (D. Eric, 1999).Threat of

The Growing Threat of Computer Crime

3335 words - 13 pages Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to

Processes and Analyses for Computer Crime Investigations

713 words - 3 pages hacker comes up with a new trick in cyber crime or computer crime. In addition, some of the organizations who generate programs have installed some that can be used by investigative agencies. Some of the most important procedures used in collection of information that can be used in a court of law include collecting live data from the RAM’s images. Such live recovery of information can be collected from the F-Response, which can collect data

Computer Crime in the 90's

2338 words - 9 pages -related crime, computer network users and law enforcement officials most distinguish between illegal or deliberate network abuse versus behavior that is merely annoying. Legal systems everywhere are busily studying ways of dealing with crimes and criminals on the internet.TABLE OF CONTENTSPHONE FRAUD..........................................Pg1NETWORK BREAK-INS...........................Pg6INDUSTRIAL ESPIONAGE......................Pg7SOFTWARE

Similar Essays

Computer Crime Essay

1822 words - 7 pages Computer Crime Almost every major political candidate in recent history has used, and often exploited, on of the many facets of crime to attempt to convince American voters that they can feel secure and safe with the candidate at the leadership helm, coveted feelings in a tumultuous world. As a result, we have more policemen patrolling the streets, laws such as the death penalty and “three strikes your out”, proposed increases to defenses

Computer Crime Essay

1796 words - 8 pages A major part of the world today revolves around technology and cyberspace. Almost every day one will use a type of computer in some way, whether it is work related or if it is for personal use such as social networking. Another thing occurring on a daily basis is criminals committing either trivial or major crimes; so it is not hard to imagine that these two actions would start to syndicate into one. Cyber-crime is defined as “unauthorized use

Computer Crime Essay

1239 words - 5 pages declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of

Computer Crime Essay

3116 words - 12 pages ;……………………………………………… 1A. computer crime:………………………………………………………....21. What is a computer crime?. ………………………&hellip