This website uses cookies to ensure you have the best experience. Learn more

The Growing Threat Of Computer Crime

3335 words - 13 pages

Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to manipulate information and access computers by telephone, increasing numbers of crimes--electronic trespassing, copyrighted-information piracy, vandalism--have been committed by computer hobbyists, known as "hackers," who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programming. It was a challenge to all hackers, and an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result.

The Growing Threat of Computer Crime
Do you think your company’s computer systems are secure? Think again. Billions of
dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal.
Crimes such as embezzlement, fraud and money laundering are not new. However, each of these crimes now has a new partner in crime-the computer. Crimes that have become unique due to the availability and widespread use of computers include:

a. unauthorized use, access, modification, copying, and destruction of software or
b. theft of money by altering computer records of theft of computer time;
c. theft or destruction of hardware;
d. use or conspiracy to use computer resources to commit a felony;
e. intent to obtain information or tangible property, illegally through use of the
computer. (Fraud Survey Results, 1993)

Although incidents in this second category of crimes do present a serious problem, embezzlement is by far the major threat to small businesses. This is evident by the frequency of reports in the local media. Cash is the most vulnerable asset as it is the easiest for the perpetrator to convert to personal use. Firms most vulnerable to theft of money are firms that must rely on one individual to perform the duties of office manager and bookkeeper. Having more than one employee in the office provides an opportunity to effect certain internal...

Find Another Essay On The Growing Threat of Computer Crime

The Threat of China Essay

925 words - 4 pages The Threat of China With the end of the Cold War emerged two superpowers: The United States and the Soviet Union. The international system then was considered bipolar, a system where power is distributed in which two states have the majority of military, economic, and cultural influence both internationally and regionally. In this case, spheres of influence developed, meaning Western and democratic states fell under the influence of U.S

Types and Defences of Computer Crime

1561 words - 6 pages systems.Threats and risksThis section gives a brief description about the main threats and risks in the information systems area. The section is divided into three parts. First, threat of accidents and malfunctions are described. The second part describes the threat of computer crime and finally factors that may increase the risks are described. If nothing else is mentioned, the main material content is referred to Alter (D. Eric, 1999).Threat of

Computer Crime in the 90's

2338 words - 9 pages -related crime, computer network users and law enforcement officials most distinguish between illegal or deliberate network abuse versus behavior that is merely annoying. Legal systems everywhere are busily studying ways of dealing with crimes and criminals on the internet.TABLE OF CONTENTSPHONE FRAUD..........................................Pg1NETWORK BREAK-INS...........................Pg6INDUSTRIAL ESPIONAGE......................Pg7SOFTWARE

The Growing Threat of Corporate Surveillance

1676 words - 7 pages In 1948, George Orwell wrote about a society in which individual privacy was nonexistent. In this society, which he imagined would become a reality in the 1980s, surveillance was foremost. Everything one did was under surveillance by “Big Brother”, an unseen figure who was always watching you. Surveillance in this society was imposed and malicious. Although this type of society has never fully become a reality in the Western world, changes in


2178 words - 9 pages threats to our cyber security include China, Russia, and North Korea, respectively. Russia and China pose to be America’s most preexisting threat for a cyber attack. Russia has been accused to be behind multiple cyber attacks involving both Kyrgyzstan, Lithuania, while China has previously been accused of attacking Americas’ IT security. CHINA’S THREAT "Numerous computer systems around the world, including those owned by the U.S. government

the threat of nuclear proliferation

1253 words - 5 pages One of the foremost growing concerns in the modern globalized world is the increasing rate of nuclear proliferation. Coupled with the burgeoning number of nuclear devices is the threat of a terrorist possibly obtaining a weapon of such magnitude. While one could argue that the rising number of states with nuclear capability is a disturbing prospect, particularly as many pursue such capabilities without the approval of the “traditional” nuclear

The Threat of Anne Hutchinson

1231 words - 5 pages the accusations that men were present at the meetings. This was forbidden under Puritan law. Women were allowed to teach other women, almost always younger girls, but were strictly forbidden against revealing the beliefs or sermons to men. Remember, alone, Anne was not a threat to the Puritan establishment in Massachusetts Bay. However, as a woman leading a growing number of men, as well as women, she was a threat to their authority and

The threat of biological warefare

2359 words - 9 pages weapons. Biological warfare is the use of disease to harm or kill an adversary's military forces, population, food sources, and livestock ( Biological weapons have slowly evolved into a cheap and deadly way of exterminating human beings. The threat of bioterrorism to every country in the world has been increasing. As can be seen from the above: biological weapons are extremely dangerous and the threat of using them in war and

Computer Crime, discusses the proposition that computer crime has increased dramatically over the last 10 years

1387 words - 6 pages resulted in losses of tens of millions to billions of dollars and all these crimes were facilitated by computers.BibliographyBequai, August, Techno Crimes (1986).Mungo, Paul, and Clough, Bryan, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (1993).Norman, Adrian R. D., Computer Insecurity (1983).Parker, Donn B., Fighting Computer Crime (1983).Dodd S. Griffith, The Computer Fraud and Abuse Act of 1986: A MeasuredResponse to a Growing Problem, 43 Vand. L. Rev. 453, 455 (1990).

The Growing Epidemic of Cyberbullying

1172 words - 5 pages under other people’s names. Second characteristic, is that research has shown that these incidents tend to entertain an audience. Such audience could then turn bullying into verbal bullying or even continue the cyber bullying making it a bigger threat for the victim. By now the victim is already scared to death and psychologically abused. In a lot of cases the abuse escalates to physical abuse. Third characteristic is prevalent sexual and

The Threat of the Haqqani Network

2267 words - 10 pages In the current 21st century, Foreign Terrorist Organizations (FTO’s) have arisen in abundance throughout the world. These organizations do not only wreak havoc in their own region, but they proceed to terrorize the lives of civilians and political figures in foreign nations as well. An organization that the United States could consider a terroristic threat may not be considered a threat to another nation; this international dilemma generally

Similar Essays

The Future Of Computer Crime In America

840 words - 3 pages and areoften motivated by deviant and illegal means. It is said that at any given time the averageAmerican has his name on an active file in over 550 computer information databases ofwhich nearly 90% are online, and of the 550 databases the number comes no where closeto how many time your personal information is listed in some database in an unactivefile. The 'Average American' could simply sit in his/her home doing nearly nothing allday long and

Growing Industrialism Of The Gilded Age A Threat To American Democracy?

796 words - 3 pages The growing industrialism of the Gilded Age was indeed a threat to American Democracy. The American Government stood idly by as the Industrialists became more and more powerful. The Preamble of the document that is the foundation of this great country, The Constitution of the United States, reads:'We, the people of the United States, in order to form a perfect Union, establish Justice, insure domestic tranquillity, provide for the common defense

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1509 words - 6 pages of computer spending on computer control and securities are increasing in recently years, as well as the larger proportion of companies suffers computer related losses (Bagranoff & Moscove & Simkin 2003). Therefore, we can believe that the connection between growing dependence on information technologies and computer crime is positive correlated. The main objectives of this essay are to explain what is computer crime and look at the

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1916 words - 8 pages expenditures of computer spending on control and securities are increasing in recently years, as well as the larger proportion of companies suffers computer related losses (Bagranoff & Moscove & Simkin 2003). Therefore, we can believe that the connection between growing dependence on information technologies and computer crime is positive correlated. The main objectives of this essay are to explain what computer crime is and look at the