• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access

Extracts from this document...

Introduction

In this day and age, computer security means to provide confidentiality, integrity and prevention against misuse, accidents and malfunctions, with respect to both computer system and the type of information that it contains. The definitions that I have chosen are: "Computer Misuse Act 1990 "An Act to make provision for securing computer material against unauthorized access or modification; and for connected purposes". It states 3 offenses." [LexisNexis, 2008] Convention on Cybercrime: "The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception." [Convention on Cybercrime 2008] Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access "Under the Convention, damaging, deletion, deterioration, alteration or suppression of computer data without right comprises the 'data interference' offense which can be limited to conduct resulting in serious harm." [LexisNexis, 2008] The three definitions used, for explaining the term computer misuse are quite different from each other. ...read more.

Middle

[LexisNexis, 2001] For example, the case involving cybercrime was when "Gary Glitter, whose misdeeds were discovered when he took his computer in for repair. The problem of pornography is an international one and this was illustrated in November 2001 when police in 19 countries carried out 130 arrests and search warrants that targeted Internet users who download and distribute child pornography. The NCIS and the Internet also played a role in the arrest of Jonathan King who was convicted of child abuse at the end of 2001." [LexisNexis, 2001]. This is one of the most common type of cybercrime, "British Association for the Advancement of Science estimated that almost half of all searches made using internet search engines were seeking pornographic materials" (Ian J., Lloyd 2008) However many laws have been placed to prevent that from happening again, laws that have been placed to tackle cyber crime are Computer Misuse Act 199, The Regulation of Investigatory Powers (RIP) Act 2000, Online privacy laws, Copyright, Designs and Patents Act 1998, Malicious Communications Act 1988, Protection of Children Act 1978, The Obscene Publications Act 1959 & 1964, Protection of Children Act 1978. ...read more.

Conclusion

Another source that I used was Journal Articles; I used LexisNexis for this research. I found a lot of information on computer crime and cyber crime in the journal article is that I looked at. After that, I decided to add 'computer crime and cyber crime' as part of my three definitions and it certainly helped me to find different law cases and other computer misuse related examples. For Government Publication I used the official website of 'Parliament Office of Science and Technology' and LexisNexis. I have to say is a good self-help website for many reasons, not the least of which is that it is mostly up-to-date. It also offered access to thousand articles and explaining the application of all kind of computer related crimes. For newspaper article, I used Guardian Newspaper, which I found online on WebCT. It was easy and simple to use as it is updated every weekday. The newspaper was the most interesting application to use, as it had all kind of law related example's of people, which I didn't use in my essay however it gave me lot of idea's and knowledge, on how to do the essay correctly and in a logical structure. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    Other types of attacks include Worms, Network Scanning and Key Loggers. Argot is a type of language used for hacking sites and known by all highly skilled hackers. There are three different types of hackers they are; Black hat hacker, white hat hacker and grey hat hacker.

  2. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    all of them can afford themselves to spend money on the CD albums. In spite of this, everyone is entitled to an opportunity of cultural development, whether it is modern or classic music or other arts. Moreover, as the Guardian newspapers article claim "information technology gives people the potential to

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    in extract the valuable data chips inside which then can be inputted in many different processers and other hard drives. This would be another devastating occurrence to Teign and Tow, as this would bring this business in disrepute. The aftermath would be spent trying to comeback from this.

  2. Download services

    * If users register (purchase) the program, users will often receive a password key to remove shareware "nag" screens or users will be mailed a diskette/CD. General Public License - The licenses for most software are designed to take away user freedom to share and change it.

  1. Crime and crime prevention

    you have lost or had stolen important documents such as your passport or driving licence post expected from your bank has not arrived or you are receiving no post at all you identify entries on your personal credit file from organisations you do not normally deal with a mobile-phone contract

  2. Free essay

    Reduce Damage to organisations

    Disaster Recovery Disaster recoveries are basically methods which can be put in place to recover from any disaster such as virus attack, fire, earth quakes, explosions, flood, hardware failure, power failure and sabotage. As you can see below are the main ways to recover from disasters:- 1)

  1. implementation of an ITC system

    (Network: A computer system attached to a LAN that runs a Network Operating System, NOS, allowing a community of workstations connected to the LAN to access resources available on the file server such as disk storage and printers. Also known as a Client/Server relationship.)

  2. High-tech crime (computer crime) is the use of technology to commit a crime. It ...

    Cyber-stalking includes making threats, gathering information about the victim, encouraging others to harass, false accusations, requesting minors for sex, false victimization, and ordering good/services in the victim?s name. Hacking is when a person accesses a computer or a network without the owner?s consent.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work