Cyber crime Essay

Cyber crime

Cyber crimes can be defined as any form of crime which involves computer networking and the internet. Cyber crime takes several forms which include but not limited to child pornography, hacking, and copy right violation. It still accommodates any intentional access to personal confidential information. This paper is written with an intention of discussing the prevalence of cyber crime as compared to traditional crimes.

Computer crimes are becoming more common than the traditional crimes and are related to a number of illegal activities. This includes the crimes which are directly linked computer network crimes and crimes which are facilitated by the computer network indirectly. For instance, the issue spam is becoming a common thing in life.[1] Spam refers to the sending of several numbers of emails to several people without their intention purposely to achieve commercial purposes.  It is an unlawful act applied to emails but laws to eliminate this act are still new.

Fraud is another form of computer crime which happens more often than traditional crimes.[2] Computer fraud is defined as intentional interpretation of information which is intended at making people to do or fail to do something hence resulting to loss. This form of computer crime is evidenced in the society where employers for example changes, deletes or steals data from a computer with a malicious intention. Still to be noted here is that offensive contents in the internet is becoming accessible to children and this is a crime.

Cyber crimes can be stopped and a lot of effort has been put to eliminate computer related crimes. For instance, FBI has come up with a mission of eliminating serious computer crimes and the spread of bulk malicious information.[3] It has also come up with a plan of eliminating sexual abuse to children by identifying the information on the internet and the people who use internet to exploit children. Lastly, the FBI is working on a program to handle cyber terrorism and criminal organizations involved in internet fraud.

References

Balkin, J., Cybercrime: Digital Cops in a Networks Environment. New York University Press, New York, 2007.

Lovet, G., Fighting Cybercrime: Technical, Judicial and Ethical Challenges, 2009, retrieved 14 August, 2010, <http://www.fortiguard.com/papers/VB2009_Fighting_Cybercrime_-_Technical, Juridical_and_Ethical_Challenges.pdf>

[1] Balkin, J., Cybercrime: Digital Cops in a Networks Environment. New York University Press, New York, 2007.

[2] Lovet, G., Fighting Cybercrime: Technical, Judicial and Ethical Challenges, 2009, retrieved 14 August, 2010, <http://www.fortiguard.com/papers/VB2009_Fighting_Cybercrime_-_Technical, Juridical_and_Ethical_Challenges.pdf>
[3] Lovet, G., Fighting Cybercrime: Technical, Judicial and Ethical Challenges, 2009, retrieved 14 August, 2010, <http://www.fortiguard.com/papers/VB2009_Fighting_Cybercrime_-_Technical, Juridical_and_Ethical_Challenges.pdf>