Preview

Computer Crime Hackers and Security Measures from Research Assistance

Powerful Essays
Open Document
Open Document
4490 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime Hackers and Security Measures from Research Assistance
Abstract

A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.

Introduction

It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today 's technology. The Internet can be used for criminal purposes in different ways: from a simple ‘blackmail ' to the most perplex crime like money laundering.
"Technology can be applied as easily by the criminal and terrorist as it can by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves" .
Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and



Bibliography: Barrett N (1996) The state of the cybernation: cultural, political and economic implications of the Internet. Kogan page, London. Barrett N (1997) Digital crime: policing the cybernation. Kogan Page, London. Bequai A (1987) Technocrimes. Lexington Books, Lexington, Mass. Doswell R T and Simons G L (1986) Fraud and abuse of IT systems. Ncc, Manchester. Forester T and Morrison P (1994) Computer ethics: cautionary tales and ethical dilemmas in computing.(2nd) MIT Press, Cambridge, Mass. Guisnel J (1997) Cyberwars: espionage on the Internet. Plenum Press, New York. Lobbecke C Content providers on the Internet: A dicussion paper on opportunities, limits and impacts. Mandell S L (1992) Computers and information processing: concepts and applications.(6th) West Publishing, St Plant S (1997) Zeros + ones: digital women + the new technoculture. Fourth Estate, London. Porter D (1996) Internet culture. Routledge, London. Sieber U (1986) The international handbook on computer crime: computer related economic crime and the infringements of privacy. Wiley, Chichester. Taylor P (1999) Hackers: crime the digital sublime. Routledge, New York. Wasik M (1990) Crime and the computer. Oxford university press, Oxford.

You May Also Find These Documents Helpful

  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perscriptives in the Social Sciences, 240-259.…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    Bibliography: Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    <br><li>Jordan, T. (1999) Cyberpower: the culture and politics of cyberspace and the Internet London: Routledge.…

    • 1736 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    capstone analysis

    • 535 Words
    • 2 Pages

    Cybercrime is an issue that should not be taken lightly. Crimes that are committed online can damage an individual’s life or cause major chaos. This paper will discuss what cybercrime is and how it has contributed to the overall rise in crime rates over the last ten years. This paper will also discuss recommendations to combat cybercrime and crimes associated with cybercrime and hackers, along with how cybercrime will affect the future of the criminal justice system.…

    • 535 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Best Essays

    Digital Privacy

    • 2212 Words
    • 9 Pages

    Litt, R. S. (2013). PRIVACY, TECHNOLOGY AND NATIONAL SECURITY. Vital Speeches Of The Day, 79(10), 313-321.…

    • 2212 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    Ethical Hacking

    • 1563 Words
    • 7 Pages

    Lesson 1: Introduction to Ethical Hacking | Problem Definition -Why Security? Essential Terminologies Elements of Security The Security, Functionality and Ease of se Triangle Case Study What does a Malicious Hacker do?…

    • 1563 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Disadvantages Of Internet

    • 2142 Words
    • 7 Pages

    Across the modern world, internet is practically used by lots of people because it’s really accessible and fast to use especially for college students, to apply its main purpose of convenience to do a specific task. The problem is how it really affects the academic learning of each student that perhaps instead of gaining advantages it causes bad effects for its user. As it with all new development, the Internet has its own downside. Likewise with the unpredictable developing of the World Wide Web openly mindfulness and expanding in measure of data it takes in, the Internet is not thoroughly secure and burglary is one of the various threat it postures, specialists individual data is at danger of being access by rebel persons (Inoue, 2006).Formally, that is in the school, our youth utilize the Internet for occasion, when hunting down data and when finishing tests. Casually, that is in their extra time, they talk with companions, play online PC diversions and are included in fan fiction, i.e. utilizing distributed material to make pictures and movies and so on. (Olin-Scheller & Wikström 2010).The Internet is the conclusive innovation of the Information Age, presently motor was the vector of mechanical change of the Industrial Age. This worldwide system computers, to a great extent construct these days with respect to stages of remote correspondence, gives universal limit of multimodal, intuitive correspondence in picked time, rising above space (Castells 2014).Today we live in a world in light of integration and communication, in which a thriving system of electronic frameworks and gadgets helps us explore our days (Sharma 2014).The Internet can be an excellent study resource, and is progressively being…

    • 2142 Words
    • 7 Pages
    Best Essays