Computer Crime

Computer Crime

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: r individual frame of reference Computer crime itself is not restricted by conventional or physical borders Many communities have a role in the commission and investigation of computer crime Computer Crime Definition Computer Crime Definition Why is the term computer crime problematic? The global nature of these crimes causes problems when you try to place a boundary around the term Challenged by “What if…” scenarios Calculator used by a drug dealer? Person attacked with a keyboard? Egypt Cutoff… Egypt Cutoff… In order to try and curb violent protest against President Mubarak, Egyptian authorities shut down access to the Internet overnight. Internet infrastructure owned by 4 providers­ all shut down. Attempting to limit access to social media networks such as Twitter and Facebook Egypt Internet shut down­ CNN Egypt Shows How Easily Internet Can Be Silenced Egypt Cutoff… Egypt Cutoff… Does the use of social media networks like Facebook and Twitter to spread dissent constitute computer crime? Why or why not? What would be the consequences if something like this happened in the United States? Could it even happen? Computer Involvement Computer Involvement Taylor’s Definition of Computer Crime: Computer itself is the target Intrusion Hacking Data alteration Denial of service Computer vandalism Website defacement Co...
View Full Document

This note was uploaded on 01/22/2014 for the course JUST 405 taught by Professor Staff during the Fall '08 term at New Hampshire.

Ask a homework question - tutors are online