- 04/03/2013
- Posted by: essay
- Category: Free essays
Computer based crimes will be the main topic of this paper, because it is widespread topic in all spheres of our life connected with new innovative computer technologies. Scientific and technical progress allows us to be creative and implement new kinds of technologies everywhere, beginning from school programs and ending with special devices production. Our century is an age of great changes and in short spaces revolutionary transformations had a place, for example, exactly today we can make our business at home and communicate with all necessary people around the whole world using computer technologies. These changes formed the sphere of activity, related to creation, transformation and consumption of information – informative sphere of world association, and in a great deal predetermine further development of public and economic relations in the whole world. Many years ago people try to get access to energy sources, but today information is the main source of power and all people need information. And as not once happened in history of humanity, when drawn on scientific accomplishments not only in blessing but also in harm to people, the new sphere of activity did not become an exception. The main aim of this paper is to discuss questions connected with computer based crimes and to define their main characteristics in the frames of this work. The paper will be structured in several informative parts and each part will be an answer on specific question of this research.
First of all it is necessary to define the information connected with the sense of computer based crimes and explain their specific for today’s society. Development and perfection of information technologies, expansion of hardware production and purview computer technique, availability of similar devices, and main – the presence of human factor as satisfaction of own ambitions or thirst of making money generated new kind of publicly dangerous acts in which computer information is illegally used or it becomes the object of encroachment. System research of some object or phenomenon, as a rule, is begun with the clear getting a clear idea of its place in more large system. A substantial help is herein rendered by the motion through its classification. It touches to a full degree the study of such difficult phenomenon as a crime in the field of computer information.
I think that it is necessary to define the term “computer crimes” right now, because it will help us to continue our research and be more detailed in different questions explanation. According to Benson and Rosenthal (1997) “the rapid emergence of computer technologies has spawned a variety of new criminal behaviors and an explosion in specialized legislation to combat them. While computer crimes include traditional crimes committed with a computer, the term also encompasses offenses against intellectual property and other crimes that do not fall within traditional criminal statutes. The diversity of computer-related offenses thus demands a broad definition. The Department of Justice defines computer crimes as “any violations of criminal law that involve[s] knowledge of computer technology for their perpetration, investigation, or prosecution.”
Since appearance of the World web in it stretched the networks of thousand swindlers and people need to know how to protect their information from computer swindlers. Many cases of criminal activity proved that for ordinary person it is easily to become not only its victim, but even participator, because computer criminals have different schemes of work. In according to above stated facts one of the most actual issues for today is a problem even with the term definition. Generally accepted determination of computer based crime is not yet accepted in science of criminal law. Thus, it should be noted that its absence is not only a theoretical problem; it also considerably complicates activity of law enforcement authorities on counteraction crimes in the field of the use of computer technique.
Leave a Reply
You must be logged in to post a comment.