Computer Crime


: Prevention and Innovation
Since the introduction of computers to our society, and in the early 80’s the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we approach the year 2000, the turn of the millenium, humanity has already well established itself into the “Information Age.” So much in fact that as a nation we find our selves out of a service economy and into an information based economy. In a matter of only a few years almost all systems are run buy computers in some way, shape, or form. We depend on them for everything. Even the smallest ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

and new businesses taking advantage of perks of an alternate electronic world, this information dimension will only get bigger, more elaborate, provide more services, and we will find society as a whole more and more dependent on it.
However, even in an artificial environment such as the cyberspace, it appears mankind cannot escape from its somewhat overwhelming natural attraction to wrongful behavior or criminal tendencies. In turn this alternative dimension has been infected with the same criminal behavior that plagues our physical reality. The information age has opened the doors to anti social, smart, and opportunistic people to find new and innovative ways to commit old crimes. These people are called hackers. Schamalleger (1999), stated that hackers are people who view and use computers as objects of exploration and exploitation(p. 457).
What is the social Problem?
is the official name given to this criminal phenomenon driven by hackers. Although a solid definition of ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

suggested he history of computer crime and hacking started in the late 1950’s when AT&T first implemented its interstate phone system and direct distance dialing (DDD)(p. 450). Manipulation of the way that the DDD system worked, in order to make free long distance calling, was the objective of this crime. What the early hackers did was duplicate the particularly distinguishable tones that the phone companies used in their early switching devices enabling them to fool the system into thinking that the customer has paid. A person who used any number of devices available for manipulating switch systems in order to explore or exploit is called a phone phreak (Schmalleger, 1999, p. ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime. (2008, March 10). Retrieved September 22, 2017, from http://www.essayworld.com/essays/Computer-Crime/80310
"Computer Crime." Essayworld.com. Essayworld.com, 10 Mar. 2008. Web. 22 Sep. 2017. <http://www.essayworld.com/essays/Computer-Crime/80310>
"Computer Crime." Essayworld.com. March 10, 2008. Accessed September 22, 2017. http://www.essayworld.com/essays/Computer-Crime/80310.
"Computer Crime." Essayworld.com. March 10, 2008. Accessed September 22, 2017. http://www.essayworld.com/essays/Computer-Crime/80310.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 3/10/2008 07:09:40 AM
Category: Technology
Type: Free Paper
Words: 3429
Pages: 13

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime Is Increasing
COMPUTER CRIME Hackers And Secu...
Computer Crime 3
Computer Crime 2
Computer Crime In The 90's
Computer Crime
Computer Crime
Computer Crime
Computer Crime: A Increasing Pr...
Computer Crime
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved