Thursday, May 2, 2019
Computer abuse is subject to taking advantage of electronic media to Assignment
Computer ab utilisation is survey to taking advantage of electronic media to gain information and use it against the third party - Assignment physical exertionINTRODUCTION Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party. The evolving technologies such as the safe use of smart phones, tablets, laptops, home computing devices have added the threat of refreshed crimes every day. The criminal activities are encompassed by luxuriant use of applied science and computer abuse, which have resulted in major social, cultural, and financial losses over the last two decades. The new dimension of criminal activities involves expert use of technology that is intelligent and technical that it can be even misread by the fair play enforcement agencies. For instance, a property crime on a big scale involves fraud against the property of passel without involving any physical contact with the people (Denning, 2004). The p revention of such crimes is essential for the future of advance technology and criminal investigations undertaken by trained computer experts or forensic individuals. The advancement of technology and awareness of computer abuse possess a serious threat for not only to individual but too to the nations security in terms of legislative and financial crimes preceded by computer frauds and abuse. It has overly resulted in crash of financial markets, the great depressions periods and various money laundering cases, which is a threat for not only the national security but also preceded under anti-terrorism globally. The last three decades have stipulation rise to various hacker groups around the globe who had attacked and invaded the financial market as well as the highly sensitive data regarding the national security. For instance in recent years, the wake of wiki leaks is a galactic example of computer abuse. It has resulted in releasing secret sensitive information and publishin g documents that possess a serious national and financial threat globally (National White Collar Crime Centre, 2002). The emerging threats from excessive computer abuse have raised the scope of federal and local legislation in regards to larger crimes. The legislations and penalties are in place to combat the computer abuse and punish the offenders for misuse of information and data (Denning, 2004). DISCUSSION Computer Crimes and Abuse Computer crimes are defined as criminal activities committed in a technological environment in order to cause damage or derive economical gains from other others (U.S. Department of Justice, 2001). According to the adaption of Cohen Felsons Routine Activities theory, a crime is determine due to the approachability of a suitable target, lack of backing from any guardian and a serious motive by the offender. It was also stimulated that usage of computer adversely can result in invading the sensitive information and using it for criminal purposes (Gord on et al, 2003). It is also confided in law that intentionally or without permission, accessing the computer go or any device can result in committing a criminal offence (National auspices Institute, 2004). The traditional crimes such as fraud, theft and organised criminal rings are now
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.