Cyber Crimes Essay

1489 words - 6 pages

Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers, cyber porn and various other crimes that have a drastic affect on the society and the institutions that each of us hold to keep our global society running.
To first understand computer crime one must understand first what crime is. According to Diana ...view middle of the document...

To start with is the integrationist perspective looks at of society as the sum of the interactions of individuals and groups" (Kendall; 17). Many of those that commit computer crimes are hackers or people who hack into computer systems for both fun and for gaining access to information. They have formed their own subcultures and hold many different beliefs about the information that is stored in personal computers. Said best by J. Thomas McEwen in the article Computer Ethics many hackers believe that "computerized data [is] free and should be accessible to anyone (McEwen 1991; 8-11). A subculture is a group a group of people who share a different set of beliefs that differ significantly from the larger society (Kendall; 604). Besides forming subcultures, many hackers have learned their behavior from other hackers. The behavior they learn seems to lend credibility to Edwin Sutherlands Differential Association Theory "which states that individuals are more likely to deviate from societal norms when they frequently associate with persons who are more favorable toward deviance than conformity (Kendall; 165). According to McEwen most "young computer hackers beliefs come from association with other hackers, not family members and teachers (McEwen 1991; 8-11). Besides the fact that many hackers learn, their ways from other hackers many after arrested are formally labeled as a hacker and a deviant, those who violate cultural norms and beliefs (Kendall; 598) The labeling theory suggests that deviants are those have been labeled as such by others (Kendall; 166). In theory than, after the person has been arrested they than assume that label and act accordingly. As written by David Pitchford in the London magazine, Focus, one hacker after being arrested was not deterred, he instead became a more active and in "92 became cyberspaces first megastar Pitchford; pages 10-13)." It was only after his second arrest that he stopped offences.
Besides the interactionist, perspective on computer crime is the conflict theory. "The conflict theory states that people in power maintain their advantage by using the law to protect their own interest." (Kendall; 168). Under the conflict perspective, hackers and other computer criminals are seen as deviant because many hackers break into large companies for the "mindless desire for glory (Pitchford; pages 10-13). " However besides hackers lack of any real criminal desires they are still seen as deviant because they blatantly while doing their hacking.
Since the Internet is a global tool, many of the crimes that are committed extend beyond national borders. For this reason the advent of computer crime have made the global community smaller. What one hacker does on his computer in another country affects you and I. This can be seen with the recent virus "Love bug", this virus disabled computer systems world-wide (Washington Times, 5/18/2000). Yet, because of the quickly advancing computer technology a cultural lag has been...

Other Papers Like Cyber Crimes

Cyber Security And Its Challenges To Society

3707 words - 15 pages Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY

Cyber Bullying Essay

1314 words - 6 pages prejudice in areas such as race, religion or sexuality, stress that could have harmful effects on your health, and a decrease in performance and attendance in school [5]. Due to these effects, many jurisdictions are deliberating over cyber bullying laws. Cyberbullying Legislation Cyber bullying is a relatively new phenomenon, but that does not mean that the crimes committed in the process are not punishable under legislation. It has

Cyber Crime

1366 words - 6 pages committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime. DEFINITION • Cybercrime is any illegal act committed using a computer network (especially the Internet). • Criminal activities that take place in cyberspace (the Internet). CATEGORIES • Cyber crimes against persons. • Cyber crimes against

Th Importance of Deleting Cyber-Bullying

723 words - 3 pages becoming more sophisticated, allowing us immediate access to information, which could greatly benefit our lives, it could also potentially provide individuals with the means to exploit personal information, commit cyber-crimes, or even inflict injury to others. One type of cyber-crime in particular is Cyber-bullying. Fact is, that an overwhelming majority of teenagers believe that this type of bullying is a joke, not realizing the devastating

Law Enforcement Challenges

808 words - 4 pages how people interact, how banking services are provided and even how crimes are committed. Cyber crimes have developed in volume and substance over the years, and this has posed a great challenge, especially to law enforcement agencies. This paper seeks to give a detailed explanation of the utmost challenges facing the jurisdiction systems against cyber crime, as well as the possible solutions to these challenges. Challenge facing law

Cyber Law of Bd

708 words - 3 pages Efficiencies of Cyber law in Bangladesh জুন 26, 2011 0 inShare Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people. Cyber law in

Computer Crime

1301 words - 6 pages researchers and 25 support staff – total 55 Cyber crime research Research questions • • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles

Cyber Crime in the World

1824 words - 8 pages which improves the production of business or any other activity you may be doing. Computation Calculations can be done in milliseconds as well as worldwide connectivity and communication. Along with the introduction of the computer a new form of crime was born. These crimes are referred to as cyber crimes or computer crimes. They are varied with some being a lot more serious than others. Cyber crime refers to any crime that involves a computer


1730 words - 7 pages attacks. There are reports of suicides, other forms of self-harm, vandalism, bodily threats and even death threats. If something isn’t done soon cyber bullying will become the next form of hate crimes except without the consequences. According to the United States Department of Education, recent years have had to bring about local school systems and state departments of education taking steps to reduce cyber bullying. They believe that

Cyber Crime

647 words - 3 pages Topic Outline Crime and Cyber Risk RMI 4300-Klein Distinctive Features of Crime Risk Common Crimes • Burglary • Robbery • Shoplifting • Fraud • Embezzlement • Forger and Counterfeiting • Vandalism • Arson • Espionage • Computer Crime Fraud • Fraud involves inducing another to act to his or her detriment. • Examples of fraud • A merchant collects payment in advance for good that will not be delivered or will be greatly inferior


255 words - 2 pages involves more than $1000, attempt is not considered a crime, and civil lawsuits are not permitted. Federal, state, and local statutes apply to the phenomenon of cybercrime by more and more cybercrimes happening and being taken into court proceedings. For example there was a case recently where the US government charged 8 people in a cyber-crime scene that netted close to $45 million dollars in just a few hours. Many of these crimes do not have clearly drawn lines on what charges will be applied to what crime so statutes must be followed to decide the severity of the crime and the punishment.

Related Essays

Cyber Crimes Essay

548 words - 3 pages CYBER CRIMES Cybercrime has been one of the cases that rise nowadays. Some of us may do not know what cybercrime is. Cybercrime is activity with criminal motive and with intention to harm others or stealing something (such as personal information, money, etc.) that using computer or network as its media. The scope of cybercrime could be very narrow, such as stealing examination questions from school’s bank data. It also could be on a very big

Cyber Crimes A Diabolic Jeopardy Essay

542 words - 3 pages Cyber-crimes - a diabolic jeopardy The idea of crime has a long history. With the passing of each day, the periphery of criminal activity has increased. With the technology striking its chord hard, there has been a great new twist to the crime world in the form of “CYBER CRIMES”. Over the last fifteen years and until recently, the amelioration in the state of technology and the usage of computers in both personal and business sector has

Categories Of Cyber Crimes Essay

581 words - 3 pages CJ243 Categories of Computer Crimes Richard Riggins 3/10/2014 Categories of Computer Crimes There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual

Cyber Crime Team Essay

1543 words - 7 pages -crimes. Law enforcement faces issues with cyber-crime, such as privacy, confidentiality, determining the location the crime initiated, and locating the perpetrator(s). Courts face issues, such as loss of evidence and loop holes in laws. Correctional facilities face internal cyber-crimes and overcrowding as a result of cyber-crimes. The following information will discuss the issues within each division of the criminal justice system and provide