Professor Gregorio Chavarria
CIS Information Technology and Crime
15 January 2012
Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011)
The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. ...view middle of the document...
The third category, computer is incidental to other crimes, the computer is not essential for the crime to occur, but it is related to the criminal act. This means that the crime could occur without the technology; however, computerization helps the crime to occur faster, permits processing of greater amounts of information, and makes the crime more difficult to identify and trace. Such crimes of this matter are unlawful banking transactions, money laundering, child pornography, and criminal enterprise.
The fourth and final category, crimes associated with the prevalence of computers, is the technical industry itself and its customers as well. Software piracy/counterfeiting, copyright violation of computer programs, counterfeit equipment, black market computer equipment and programs, and theft of technological equipment are all examples of this final category. (Computer Crime)
Of the four categories of computer crime I believe the greatest overall threat at the present time is crimes in which a computer is the target. As we can see with our history now of 9/11 and our military being the best in the world, the United States weak link is our critical infrastructure and that can be easily disrupted with our wonderful technology of computers. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it.
The government has enacted the USA...