Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Crime 2 - School Essays

Computer Crime 2


Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in nature--sometimes recorded, more often not--occurring only on the Internet, with the only record being electronic impulses.
Before discussing Internet crimes, we can expect to see in the years ahead, let's look at the good news: The most-dreaded types of offenses--crimes such as ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

and physically violent offenders under control.
But computer criminals--ranging in age from preteen to senior citizen--will have ample opportunities to violate citizens' rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But increasingly, the "hacker" is being replaced by the menacing "cracker"--an individual or member of a group intent on using the Internet for illegal profit or terrorism.
Access to the Internet has begun to expand geometrically, and technology is making the Internet even more friendly and affordable for millions of users. But foolproof protective systems can probably never be developed, although some high-tech entrepreneurs are certainly trying. Even if a totally secure system could ever be developed, it would likely disrupt the free flow of information--an unacceptable ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

a phone company tried to institute a call-forwarding program, crackers quickly defrauded the system of more money than the company stood to make in legal profits.

In the future, the opportunities for hacking and cracking will escalate, with telephones, computers, faxes, and televisions interconnected to provide instantaneous audiovisual communication and transmission of materials among individuals. The wide appeal of new multimedia communication systems will likely create such a huge volume of subscribers that the price will plummet and make access by all possible. But if billions of dollars of losses are to thieves, compounded by billions more required to repair damages created ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime 2. (2005, July 12). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Computer-Crime-2/29970
"Computer Crime 2." Essayworld.com. Essayworld.com, 12 Jul. 2005. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Computer-Crime-2/29970>
"Computer Crime 2." Essayworld.com. July 12, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Crime-2/29970.
"Computer Crime 2." Essayworld.com. July 12, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Crime-2/29970.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 7/12/2005 08:53:13 PM
Category: Technology
Type: Premium Paper
Words: 2800
Pages: 11

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» COMPUTER CRIME Hackers And Secu...
» Computer Crime
» Computer Crime
» Computer Crime
» Computer Crime
» Computer Crime In The 90's
» Computer Crime: A Increasing Pr...
» Computer Crime
» Computer Crime
» The Future Of Computer Crime In...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved