This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: b.) embezzlement 2.) What some real instances? b. how much damage can this cause if you are victim of this type of computer crime? c. what are legal ramifications? d. How do prevent such an attack? 3. Computer as an incidental to crime a. computer used to facilitate a crime b. What's the difference between this one and the other ones? 1.)Examples a.) Child Pornography b.) Money Laundering 2.) What some real instances? c. what's the damage caused? d. legal ramifications e. prevention 4. Crimes associated with the prevalence of computers a. definition has to do with mainly the industry, or corporate businesses 1.) Examples a.)Napster-giving copyrighted music away freely on the internet b. what's the damage caused? c. legal ramifications d. prevention III. Conclusion...
View Full Document
This note was uploaded on 05/16/2011 for the course CIS 330 taught by Professor Mancini during the Fall '10 term at DeVry Cincinnati.
- Fall '10