This website uses cookies to ensure you have the best experience. Learn more

Cyber Crime: Investigating High Technology Computer Crime Essay

2678 words - 11 pages

Cybercrime: Investigating High-Technology Computer Crime
Robert Moore’s Cybercrime: Investigating High-Technology Computer Crime is an informative text that supplies the reader with basic understandable knowledge of increasing cybercrimes and strategies that law enforcement are taking in order to catch cyber criminals. Moore’s work has a total of thirteen chapters that are full of information that help the reader better understand the different cybercrime threats such as, hacking, identity theft, child pornography, and financial fraud. Moore also goes into detail on different law enforcement tactics that help catch cyber criminals such as, the seizing of digital evidence, executing search warrants for digital evidence, computer forensics, and cybercriminology. Moore’s main goal is to help the reader grasp a better understanding of cybercrime that faces the world today. Through reading this book, I can validly say that Moore’s thorough work, perspectives, and examples helped me better understand high-technology computer crime and investigative strategies as well.
Throughout our class this semester we have learned about different types of ways that cyber criminals can invade someone’s privacy such as, hacking, phishing, and spamming. In addition we have also briefly discussed some major cyber-attacks. Moore’s work looks more closely at these features. Some of the important cybercrime topics that Moore covers are digital child pornography and the abuse of children in cyber space, online harassment and cyber stalking, and identity theft. In addition to these, it is important to also look at the strategies law enforcement must take to stop cyber criminals. Furthermore, some important law enforcement topics throughout the text are seizing of digital evidence, computer forensics, and cyber criminology. Even though all chapters are beneficial in learning more about cybercrime, these topics struck more of an interest because we hadn’t elaborately discussed them in class. Therefore, this report will cover these topics more closely and include references from Moore’s work.
Digital child pornography has become an increasingly all too familiar occurrence in the cyber world. Adults who are pedophiles prey the Internet looking for sites that exploit children in a sexual manner. These sexual predators seek a form of non-violent sexual contact with a child that degrades their integrity and human worth. Child pornography has become one of the most distinguished forms of crimes against children. Child pornography is believed to have come from China in the late 1400’s, but over the decades it has changed its meaning and ability to reach a broader audience because of the Internet. With the click of a button a pedophile can have access to many copies of child pornography and also swap and share it with others. Moore describes the phases of the grooming process that takes place with child pornography. These phases include the friendship, secrecy,...

Find Another Essay On CyberCrime: Investigating High-Technology Computer Crime

Bad Effects of The Internet: Cyber Crime

903 words - 4 pages Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first ever recorded cybercrime. Today computers have come a long way, with neural networks and Nano-computing promising to turn every atom in a glass of water into a computer capable of performing a Billion operations per second. Cyber crime is an

Susan W. Brenner’s CyberCrime: Criminal Threats from Cyberspace

2881 words - 12 pages , and the ease for someone to become involved in cyberspace (Brenner, 2010, p. 7). Before Brenner could get deep into cybercrime, the term must first be defined. What is cybercrime? Cybercrime is “engaging in conduct that is outlawed because it threatens order” (Brenner, 2010, p. 10). The main difference between cybercrime and crime is in the tools used; cybercriminals use computer technology instead of guns. With the increase of technology

The Effects of Cybercrime

1692 words - 7 pages Today in present, with the improvements in technology and science new concepts are integrated in our lives. Cyber crime is among those concepts that did not exist 15 to 20 years ago. In the old days only conventional crime was discussed, which refers to those traditional, illegal behaviors that most people think of as crime. In today one has to be careful not only against conventional crime but also cybercrime also known as “faceless crime

cyber crime and its use in modern times - university - assigment

1300 words - 6 pages classified in mainly two categories one in were the crime cannot be committed in any other way or against a specific victim. An example of using the computer to commit the crime will be when another computer is the target or offence i.e. unauthorised access to system, planning viruses, in some cases criminal offences may enclose both categories i.e. terrorism can involve qualitatively new offend done by high technology or alternatively they may use

Different Methods of CyberCrime and Their Effects on Modern Society

1363 words - 5 pages Different Methods of Cybercrime and Their Effects on Modern Society The world we live in is more technologically advanced than ever before, with newer developments coming every year. Men, women, and children worldwide rely on the Internet for work, school, play, socialization, and any number of other reasons. Yet, despite the great advantages technology gives to us, with our increased reliance and connectivity comes an increased risk of crime

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will

Cyber Criminals

669 words - 3 pages Cyber Criminals The link between technology and crime has always been fairly close. Criminals find new ways to commit crimes with the advances of technology, while law enforcement quickly utilizes this technology to counteract with cybercriminals. Over time technology advances and with it new behavior patterns form and it is certain that the crimes of today will be different tomorrow. The definition of a cybercrime is any crime that involves a

Crime in the Cyber Realm

1032 words - 5 pages cybercrime is based on a deficiency in moral or ethical behavior on the part of the perpetrator (Joseph Migga Kizza, 2011, p.8). The technical aspect is the technology that is used to commit or prevent the crime. Under Kizza’s theory of cybercrime, Anonymous and the GoDaddy/PayPal hacker are both to blame for their crimes because they have a lack of moral/ethical foundation which would prevent them from committing their respective crimes. Lawrence

cybercrime solutions

694 words - 3 pages . Developing more strictly technology is another approach to solve cybercrime. Technology of encryption and anonymity can be designed and developed strictly in order to protect computer infrastructure so that cyber terrorists cannot attack and destroy the infrastructure of any nation. This can avoid from resulting in huge losses of infrastructure. Besides that, thinking about nature of crime can stop this problem. There are different kinds of

Cyber Crime and Cyber Law

2705 words - 11 pages factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008). Cyber crime has become an important concern for not only the business firms

High-tech Crimes

954 words - 4 pages that I believe would best explain the crimes of the high-tech offenders using my own ideas along with the researches from credible sources to support the ideas. The three theories that I will be discussing are, Strain Theory, Subcultural Theory and Rational Choice Theory. First, what is a high-tech crime? High-tech crime is also known as cybercrime and according to (Schmalleger, 2011), cybercrime is defined as, “Crime committed with the use of

Similar Essays

The Dark Side Of The Internet

1357 words - 5 pages are at. Technology, being used worldwide, gives these criminals numerous victims to target. The profits obtained by cybercrime is high because of the rapidly expanding internet and technological use, and low standards of cybercrime. The low levels of criminal investigation and prosecution allure to those who wish to stay at the leading edge of low risk crime. Sir Bernard Hogan-Howe, Britain’s Metropolitan Police commissioner, voiced, “Criminals

Cyber Crime Essay

2955 words - 12 pages Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the

Cyber Hacking And Types Of Hackers

984 words - 4 pages ". Professional Penetration Testing. Syngress Press. p. 503.ISBN 978-1-59749-425-0. Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Andress, Mandy; Cox, Phil; Tittel, Ed (2001). CIW Security

Legal Essay About Cybersecurity Research Paper

1642 words - 7 pages in cyber world in an effective way. Although certain governments do not view the problem seriously, developed countries like the U.S. have established mechanisms like Computer Crime and International Property Section to take fast action against cybercrime. The Model Law on Electronic Commerce adopted by the United Nations Commission on Trade Law is an example to statutory provisions, which was followed by the Information Technology Act. The