Tuesday, February 11, 2020
Computer abuse is subject to taking advantage of electronic media to Assignment
Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party - Assignment Example INTRODUCTION Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party. The evolving technologies such as the expert use of smart phones, tablets, laptops, home computers have added the threat of new crimes every day. The criminal activities are encompassed by excessive use of technology and computer abuse, which have resulted in major social, cultural, and financial losses over the last two decades. The new dimension of criminal activities involves expert use of technology that is intelligent and technical that it can be even misread by the law enforcement agencies. For instance, a property crime on a larger scale involves fraud against the property of people without involving any physical contact with the people (Denning, 2004). The prevention of such crimes is essential for the future of advance technology and criminal investigations undertaken by trained computer experts or forensic individuals. The advancement of tec hnology and awareness of computer abuse possess a serious threat for not only to individual but also to the nationââ¬â¢s security in terms of legislative and financial crimes preceded by computer frauds and abuse. It has also resulted in crash of financial markets, the great depressions periods and various money laundering cases, which is a threat for not only the national security but also preceded under anti-terrorism globally. The last three decades have given rise to various hacker groups around the globe who had attacked and invaded the financial market as well as the highly sensitive data regarding the national security. For instance in recent years, the wake of wiki leaks is a big example of computer abuse. It has resulted in releasing secret sensitive information and publishing documents that possess a serious national and financial threat globally (National White Collar Crime Centre, 2002). The emerging threats from excessive computer abuse have raised the scope of feder al and local legislation in regards to larger crimes. The legislations and penalties are in place to combat the computer abuse and punish the offenders for misuse of information and data (Denning, 2004). DISCUSSION Computer Crimes and Abuse Computer crimes are defined as criminal activities committed in a technological environment in order to cause damage or derive economic gains from other others (U.S. Department of Justice, 2001). According to the adaption of Cohen Felsonââ¬â¢s Routine Activities theory, a crime is determine due to the availability of a suitable target, lack of backing from any guardian and a serious motive by the offender. It was also stimulated that usage of computer adversely can result in invading the sensitive information and using it for criminal purposes (Gordon et al, 2003). It is also confided in law that intentionally or without permission, accessing the computer services or any device can result in committing a criminal offence (National Security Ins titute, 2004). The traditional crimes such as fraud, theft and organised criminal rings are now
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.