Computer Crimes Essay

1006 words - 5 pages

An Idaho State University student received a parking ticket. He was infuriated with the officer and so he asked for his full name. The next day, the officer received an email,
“Check next time you want to give a ticket. Have fun with your classes.”
He was baffled and so he went to his University to find out what he meant. He was shocked to find that his personal records had been manipulated; he had outstanding fees, lost his financial aids and scholarships and his classes had been dropped. After reporting it to the police, he was able to clear everything up. (Myers, Cale. 2005) What if this happens to you? It’s a very scary thing; you don’t want somebody to have that type of access to ...view middle of the document...

Technology, especially the computers, has changed people’s lives around the world. We can learn new and interesting things on the internet, yet there is always a price for such benefits. There are many crimes involving computer, one of them being the Internet Sex Predators. Almost 1 billion people uses the Internet, at least 24 million are children and teens. Young people are easy targets for this type of predator, mostly because children and teens tend to trust adults that they meet on the Internet. The danger to Internet Predators is that most of them get what they want by force. They use tricks and do really horrible things on the Internet. The scariest thing of all is that most predators seem like everyone else; normal.
Alicia Kozakiewicz was 13 years old when she was tricked by predator Scott Tyree. He was 38 years old. She had no idea Tyree wanted a “sex slave”. Alicia agreed to meet Tyree one night in January 2002. An online buddy of Tyree was worried and called the Federal Bureau of Investigation to search for Alicia. Four days passed, and they found Tyree’s address in Virginia. There, they found Alicia chained in a bedroom. She had a collar around her neck and was beaten and terrified. Her biggest challenge would be to find a way to get over what had happened. (Allman, Toney. ©2007) He was like many other predators. No one has guessed what he was really like until it was too late.
There are six strategies to help decrease the rate of computer crimes: making the crime less likely to occur, increasing the difficulty of successfully committing the fraud, improve detection methods, prosecuting and incarcerating perpetrators, and using forensics accountants and reducing the losses. (Allen 1977) When all else fails, call in the law. Society is partly to be blamed for Computer Crimes. For example, according to HealthDay Reporter Sherry Baker, most internet sex offenders target teens, not kids. Teens nowadays often take “inappropriate” pictures that can provoke Internet...

Other Papers Like Computer Crimes

Assignment 1: Digital Computer Crimes

1527 words - 7 pages Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a

Property and Computer Crimes Paper

1210 words - 5 pages Property and Computer Crimes Paper John Samaniego, CJA354 May 22, 2011 Property and Computer Crimes Paper In today’s society because of the economic stress and high unemployment rate many crimes exist. The criminal justice system has become overwhelmed with various crimes. Summarizing and defining these crimes society will have a better understanding of these crimes as well as the effect these crimes may have on the community in a

Categories of Cyber Crimes

581 words - 3 pages CJ243 Categories of Computer Crimes Richard Riggins 3/10/2014 Categories of Computer Crimes There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual

Computer Crime

1185 words - 5 pages have access, computer crimes have become more frequent. Everyone with a computer and a modem can commit a computer crime if so inclined. Anyone, conceivably, could become a "white collar" computer criminal. When the term "white collar" crime came into wide spread use several decades ago, it was thought that certain crimes were committed by persons whom no one would normally suspect of criminal behavior: professional, "white collar" workers. In the

Blue Collar vs White Collar Crimes

583 words - 3 pages of crimes at the same high rate as blue collar workers. White Collar Crimes Opposite of blue collar crimes, white collar criminals are typically the high class people who inherited money or earn a lot of money at upper level jobs, such as management, business or corporate bigwigs, et cetera. The types of crimes committed are generally technical or money- related in nature, such as computer-based crimes or embezzlement, and these crimes are steadily increasing as more people discover the negative aspects of doing business primarily online.

Cyber Crime

1235 words - 5 pages Argumentative Essay -DISCURSIVE ESSAY COMPUTER CRIME When people hear the word computer crime, they often think of some bad pictures from the Internet that show crimes involving computers. Those tapes of crime are no different from crimes without computers. The computer is only a tool that a criminal uses to commit a crime. There are no precise, reliable statistics on the amount of computer crime and the economic loss to


255 words - 2 pages Cybercrime There are approximately 40 federal statutes that govern the prosecution of computer-related crimes. Some of the most prominent are the Copyright Act, the National Stolen Property Act, mail and wire fraud statutes, the Electronic Communications Piracy Act, the Communications Decency Act of 1996, the Child Pornography Prevention Act, and the Child Pornography Prevention Act of 1996. Congress recognized computer related computer

Computer Forensics And Criminal Justice

997 words - 4 pages system and computer crimes is a key factor in the investigation of those crimes. It is important for the investigator to know how to work his/her investigation within the system and not to overlook an element that might hinder or terminate the investigation. Paying attention to the criminal justice system when, dealing with computer crimes results in success in investigation's procedures.Once a criminal act is suspected on a computer or via the

Cyber Crime Team

1543 words - 7 pages activity and seek financial gain. (” Combating Cyber-Crime To improve the global fight against cyber-crime, law enforcement officers should be trained rigorously and continued training should be implemented. Because new computer and high-technology crimes arise frequently, they need to be trained and educated on what is going on and ways to combat it. To enforce substantive laws that apply to online conduct effectively, law

Digital Crime

1003 words - 5 pages considered as such a crime was recognized and included as a separate crime. With the development of information and communication technology, in twenty first century, the essentiality of computer and internet is increasing rapidly. It is that, in the near future, almost all the crime in the world will be Computer based or related crimes and documents will be Computer based documents. In the meantime, we must keep in mind that Computer related systems

Computer Crime in a Digital Age

1185 words - 5 pages businesses and much of our government is virtually becoming paperless. With this increase of internet use there is potential for computer crimes. Computer crime prevalence is continuing to grow and at an extremely fast pace. Computer crimes can be described as the unauthorized access, sabotage, theft of data, or theft of services. He states that within cyber space there is more criminal activity that most organizations would like to admit. The purpose

Related Essays

Computer Crimes Essay

819 words - 4 pages Computer Crimes Andy Berg Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor

Computer Crimes Essay

1582 words - 7 pages Computer Crimes It's the weekend; you have nothing to do so you decide to play around on your computer. You turn it on and then start up; you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really? Obviously it

Categories Of Computer Crimes Essay

2285 words - 10 pages Categories of Computer Crimes CIS 170 – Information Technology in Criminal Justice Dr. Nicole L. Gray Marilyn T. Hawkins October 16, 2012 Computer Crimes are criminal activities, which involve the use of information technology to gain an illegal or an unsanctioned access to a computer system with volition of damaging, deleting or alter computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices

Delving Into Computer Crimes Essay

2480 words - 10 pages White-collar crime, specifically computer crime, is becoming more popular as computers become more readily available. Crimes using computers and crimes against computers are usually committed without fear of being caught, due to the detachment of the offender from the victim. Computer crime is defined as, "Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another