Saturday, June 15, 2019

Computer abuse is subject to taking advantage of electronic media to Assignment

Computer ab utilise is subject to taking advantage of electronic media to gain information and use it against the third party - Assignment good exampleINTRODUCTION Computer abuse is subject to taking advantage of electronic media to gain information and use it against the third party. The evolving technologies such as the expert use of smart phones, tablets, laptops, home computers have added the threat of new crimes every day. The criminal activities are encompassed by excessive use of technology and computer abuse, which have resulted in major social, cultural, and financial losses over the last two decades. The new dimension of criminal activities involves expert use of technology that is intelligent and technical that it behind be even misread by the law enforcement agencies. For warrant, a property crime on a larger scale involves fraud against the property of battalion without involving any physical contact with the people (Denning, 2004). The prevention of such crimes is e ssential for the future of advance technology and criminal investigations undertaken by trained computer experts or forensic individuals. The advancement of technology and awareness of computer abuse possess a serious threat for not only to individual but withal to the nations security in terms of legislative and financial crimes preceded by computer frauds and abuse. It has also resulted in crash of financial markets, the great depressions periods and non-homogeneous money laundering cases, which is a threat for not only the national security but also preceded under anti-terrorism globally. The last three decades have given rise to various hacker groups around the globe who had attacked and invaded the financial market as well as the highly sensitive info regarding the national security. For instance in recent years, the wake of wiki leaks is a big example of computer abuse. It has resulted in releasing secret sensitive information and publishing documents that possess a seriou s national and financial threat globally (National White Collar Crime Centre, 2002). The emerging threats from excessive computer abuse have raised the kitchen range of federal and local legislation in regards to larger crimes. The legislations and penalties are in place to combat the computer abuse and punish the offenders for misuse of information and data (Denning, 2004). DISCUSSION Computer Crimes and Abuse Computer crimes are defined as criminal activities committed in a technological environment in influence to cause damage or derive economic gains from other others (U.S. Department of Justice, 2001). According to the adaption of Cohen Felsons Routine Activities theory, a crime is determine due to the accessibility of a suitable target, lack of backing from any guardian and a serious motive by the offender. It was also stimulated that usage of computer adversely can result in invading the sensitive information and using it for criminal purposes (Gordon et al, 2003). It is a lso confided in law that intentionally or without permission, accessing the computer operate or any device can result in committing a criminal offence (National Security Institute, 2004). The traditional crimes such as fraud, theft and arrange criminal rings are now

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.