Buy essay on Computer based crimes

It is impossible to let pass on that in scientific literature a term interpreting “computer crimes” sufficiently wide: under computer crimes often people understand crimes which have as a subject or as a method of crime computer technique, information and electronic information treatment. According to Balkin, Grimmelmann, Katz, Kozlovski, Wagman, & Zarsky, (2006) we see that coming from such determination, any crime can be consider computer crime and among them we see a theft, espionage, illegal collecting of information which make a commercial secret, et cetera, if it is accomplished with the use of computer. Such understanding of computer crimes is wrong because it does not allow reflecting their essence and specific, delimit from other crimes in which a computer is only a mean or object.
According to information presented by Grabosky (2006) we see that “The absence of, or inadequate provision for, documentation and access controls for computer installations, facilitates computer crime.

buy essay

Unauthorized access to software and hardware is almost exclusively the means of crime perpetration. With authorized access, but with criminal collusion, two or more persons may commit crimes unnoticed, until financial audits, inventories, and computer operation system checks uncover the fraud or misuse. In the case of theft of intangible properties such as computer-stored patents of engineering, chemical or other designs, processes, or marketing and strategic data, the crime is exposed, if at all, by inferences drawn from the activities, products or knowledge shown by competitors” Above stated knowledge gives us possibility to make a conclusion that we people who don’t want to be a victim of computer crime must be attentive and protect own information. For example, antivirus programs are a first point in your computer protection form different harmful programs and viruses, because viruses took the first place among computer crimes in sphere of information technologies. The next step is don’t believe to different request to send your personal information somewhere, because it is a method how criminals receive information about you, your personal possibility and in such way they can hurt you anytime. I strongly believe that for protection from the harmful programs and computer swindle exist and used different methods of fight against them. It is methods presented in different directions; among them we see legal (constabularies), educational and technical methods. In my opinion the best variation is use all of them (I mean their complex), because it is much better to prevent crime than to fight against its outcomes in future.
In spite of variety of computer crimes, practically all methods of their feasance have the individual, inherent only by it signs on which it is possible to recognize and classify them on separate general groups:
1. Withdrawal of facilities of computer technique.
2. Illegal access to computer information:
– Crimes, accomplished in regard to computer information, being in global computer networks or at an address to them.
– Crimes, accomplished in regard to computer information, being in computer, being not a computer in the classic understanding of this word (such, as a pager, cellular telephone, cash register and so on).
3. Making or distribution of the harmful programs (viruses, the programs – housebreakers and others).
4. Intercept of information.
5. Violation of copyrights (computer piracy).



Author: essay
Professional custom essay writers.

Leave a Reply