Computer Crimes.edited.docx - Surname 1 Name Course Instructor Date Computer Crimes Computer crimes is defined as an offense done through the use of a

Computer Crimes.edited.docx - Surname 1 Name Course...

This preview shows page 1 - 3 out of 6 pages.

Surname 1 Name Course Instructor Date Computer Crimes Computer crimes is defined as an offense done through the use of a computer. An individual might engage in criminal activities such as hacking or fraud using their computers. There are two types of computer crime laws. Substantive computer crime law protects the use of a computer for committing a crime; on the other hand, procedural computer crime law protects the gathering of evidence from a laptop ( Kerr, p. 1). The paper will discuss the causes of computer crime, its effect on society, and solutions to prevent this crime. In regards to the types of computer crimes, substantive computer crimes further have their categories, namely traditional crimes and misuse crimes. Traditional crimes involve frauds from the internet, like money schemes or identity theft. Misuse crimes are crimes done intentionally to harm a company or an individual. The misuse crime involves the use of a computer virus to attack a company’s mainframe to destroy data maliciously. These crimes have severe effects on an individual or a company as well. For companies whose databases are computerized, can be easily hacked if their mainframe is not fully secured with encryption codes.
Image of page 1
Surname 2 Due to advances in technology, computer crimes have been on the rise in the past few years, especially internet fraud. In this case, an individual might receive an email requesting monetary assistance or suggesting a business deal which eventually goes wrong once a person trusts the end-user and sends them money for the business transaction. By the time an individual realizes this, it is too late because their money is gone, and so is the individual. Most of these fraudsters use pseudo accounts with fake background information to fool the victim that they are legit. In an article by Orrin Kerr ( Kerr, p. 4), the author asks questions in regards to this case. Can the internet fraudster be punished in the same likeness with a criminal who committed a similar offense but by robbing a jewelry store with violence? Will a new law be formed to accommodate internet fraudsters and hackers?
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '19
  • theft, Orrin Kerr

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes