L07 - TEP1281 Ethics and Professional Conduct Session 2,...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia TEP1281 Ethics and Professional Conduct Lecture 7 Cybercrime And Cyber- Related Crimes Session 2, 2011/2012
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Contents 1. Cybercrime definition 2. Cyber-related crimes 3. Programs designed to combat cybercrime in the US 4. National and International Laws to combat cybercrime 5. Tools and techniques to combat cybercrime
Background image of page 2
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Crime • Are all crimes involving the use or presence of a computer necessarily computer crimes? – Gotterbarn asks whether a murder committed with a surgeon’s scalpel is an issue for medical ethics or just an ordinary crime. • Some crimes have involved technologies, but do not require separate categories of crime. • For example, people: – steal televisions, but we don't have a category of television crime; – use automobiles to commit crimes, but we don't have a category of automobile crime. 1
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Criteria for Computer Crime • Consider three hypothetical scenarios: Scenario 1 : Lee steals a computer device (e.g., a printer) from a computer lab; Scenario 2 : Lee breaks into a computer lab and then snoops around; Scenario 3 : Lee enters a computer lab that he is authorized to use and then places an explosive device, which is set to detonate a short time later, on a computer in the lab. 1
Background image of page 4
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Criteria for Computer Crime • Each of the acts described in the scenarios is criminal in nature. – But should they be viewed as computer crimes ? • One might argue that it would not have been possible to commit any of the three crimes if computer technology had never existed. • But these criminal acts can easily be prosecuted as ordinary crimes involving theft, breaking and entering, and vandalism. 1
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Crime Definition • Forester and Morrison (1994) define a computer crime as: – a criminal act in which a computer is used as the principal tool . • This definition rules out the crimes committed in our three scenarios as “computer crimes.” • Is Forester and Morrison's definition of computer crime adequate? 1
Background image of page 6
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Crime Definition • Consider Scenario 4 : Lee uses a computer to file a fraudulent income-tax return. • Arguably, a computer is the principal tool used
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/03/2012 for the course IT 1281 taught by Professor Ain during the Spring '11 term at Multimedia University, Cyberjaya.

Page1 / 47

L07 - TEP1281 Ethics and Professional Conduct Session 2,...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online