Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computers And Crime - School Essays

Computers And Crime


Computers are used to track reservations for the airline industry,
process billions of dollars for banks, manufacture products for industry, and
conduct major transactions for businesses because more and more people now have
computers at home and at the office.
People commit computer crimes because of society's declining ethical
standards more than any economic need. According to experts, gender is the only
bias. The profile of today's non-professional thieves crosses all races, age
groups and economic strata. Computer criminals tend to be relatively honest and
in a position of trust: few would do anything to harm another human, and most
do not consider their crime to be truly ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

computer criminal "often marches to the same drum as the potential
victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual
profile of a computer criminal because they range from young teens to elders,
from black to white, from short to tall.
Definitions of computer crime has changed over the years as the users
and misusers of computers have expanded into new areas. "When computers were
first introduced into businesses, computer crime was defined simply as a form of
white-collar crime committed inside a computer system."(2600:Summer 92,p.13)
Some new terms have been added to the computer criminal vocabulary.
"Trojan Horse is a hidden code put into a computer program. Logic bombs are
implanted so that the perpetrator doesn't have to physically present himself or
herself." (Phrack 12,p.43) Another form of a hidden code is "salamis." It
came from the big salami loaves sold in delis years ago. Often people would
take small portions of ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

B 1:2)
All this information is vulnerable to greedy employees, nosy-teenagers
and general carelessness, yet no one knows whether the sea of computer crimes is
"only as big as the Gulf of Mexico or as huge as the North Atlantic."
(Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by
the turn of the century, "nearly all of the software to run computers will be
bought from vendors rather than developed in houses, standardized software will
make theft easier." (Carley, A 1:1)
A two-year secret service investigation code-named Operation Sun-Devil,
targeted companies all over the United States and led to numerous seizures.
Critics of Operation ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computers And Crime. (2004, April 18). Retrieved November 28, 2024, from http://www.essayworld.com/essays/Computers-And-Crime/6417
"Computers And Crime." Essayworld.com. Essayworld.com, 18 Apr. 2004. Web. 28 Nov. 2024. <http://www.essayworld.com/essays/Computers-And-Crime/6417>
"Computers And Crime." Essayworld.com. April 18, 2004. Accessed November 28, 2024. http://www.essayworld.com/essays/Computers-And-Crime/6417.
"Computers And Crime." Essayworld.com. April 18, 2004. Accessed November 28, 2024. http://www.essayworld.com/essays/Computers-And-Crime/6417.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 4/18/2004 01:39:48 AM
Category: Computers
Type: Premium Paper
Words: 1866
Pages: 7

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime
COMPUTER CRIME Hackers And Secu...
Asimov: Will Computers Control
Will Computers Control Humans I...
Nine Tomorrows: Will Computers ...
Nine Tomorrows: Will Computers ...
Will Computers Control Humans I...
Will Computers Control Humans I...
Computer Crime
Computer Crime 2
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved