(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Computer Fraud


"(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, to tall. .
             Definitions of computer crime have changed over the years as the users of computers have expanded into new areas. "When computers were first introduced into businesses, computer crime was defined simply as a form of white collar crime committed inside a computer system."(2600:Summer 92,p.13) Some new terms have been added to the computer criminal vocabulary. "Trojan Horse is a hidden code put into computer programs. Logic bombs are implanted so that the perpetrator doesn"t have to physically present himself or herself."(Phrack 12,p.43) Congress has been reacting to the outbreak of computer crimes. " The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statues."(Markoff, B 13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computer to obtain money, goods or services or classified information. This also applies to computers used by the federal government or used in interstate telecommunication systems. .
             "Computer crime often requires more sophistication than people realize. (Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that disgruntled employees may have victimized them. American businesses wish that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. "It accounted for $53 billion in services in 1993, and in 1998 it was accounted to be $98 billion."(Blumenthal, B 1:2) All this information is vulnerable to greedy employees, nosy- teenagers and general carelessness, yet no one knows whether the sea of computer crimes is "only as big as the Gulf of Mexico or as huge as the North Atlantic.


Essays Related to Computer Fraud


Got a writing question? Ask our professional writer!
Submit My Question