• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access

Extracts from this document...


In this day and age, computer security means to provide confidentiality, integrity and prevention against misuse, accidents and malfunctions, with respect to both computer system and the type of information that it contains. The definitions that I have chosen are: "Computer Misuse Act 1990 "An Act to make provision for securing computer material against unauthorized access or modification; and for connected purposes". It states 3 offenses." [LexisNexis, 2008] Convention on Cybercrime: "The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception." [Convention on Cybercrime 2008] Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access "Under the Convention, damaging, deletion, deterioration, alteration or suppression of computer data without right comprises the 'data interference' offense which can be limited to conduct resulting in serious harm." [LexisNexis, 2008] The three definitions used, for explaining the term computer misuse are quite different from each other. ...read more.


[LexisNexis, 2001] For example, the case involving cybercrime was when "Gary Glitter, whose misdeeds were discovered when he took his computer in for repair. The problem of pornography is an international one and this was illustrated in November 2001 when police in 19 countries carried out 130 arrests and search warrants that targeted Internet users who download and distribute child pornography. The NCIS and the Internet also played a role in the arrest of Jonathan King who was convicted of child abuse at the end of 2001." [LexisNexis, 2001]. This is one of the most common type of cybercrime, "British Association for the Advancement of Science estimated that almost half of all searches made using internet search engines were seeking pornographic materials" (Ian J., Lloyd 2008) However many laws have been placed to prevent that from happening again, laws that have been placed to tackle cyber crime are Computer Misuse Act 199, The Regulation of Investigatory Powers (RIP) Act 2000, Online privacy laws, Copyright, Designs and Patents Act 1998, Malicious Communications Act 1988, Protection of Children Act 1978, The Obscene Publications Act 1959 & 1964, Protection of Children Act 1978. ...read more.


Another source that I used was Journal Articles; I used LexisNexis for this research. I found a lot of information on computer crime and cyber crime in the journal article is that I looked at. After that, I decided to add 'computer crime and cyber crime' as part of my three definitions and it certainly helped me to find different law cases and other computer misuse related examples. For Government Publication I used the official website of 'Parliament Office of Science and Technology' and LexisNexis. I have to say is a good self-help website for many reasons, not the least of which is that it is mostly up-to-date. It also offered access to thousand articles and explaining the application of all kind of computer related crimes. For newspaper article, I used Guardian Newspaper, which I found online on WebCT. It was easy and simple to use as it is updated every weekday. The newspaper was the most interesting application to use, as it had all kind of law related example's of people, which I didn't use in my essay however it gave me lot of idea's and knowledge, on how to do the essay correctly and in a logical structure. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    Other types of attacks include Worms, Network Scanning and Key Loggers. Argot is a type of language used for hacking sites and known by all highly skilled hackers. There are three different types of hackers they are; Black hat hacker, white hat hacker and grey hat hacker.

  2. Peer reviewed

    William H. Gates.

    4 star(s)

    The paperback second edition also has become a bestseller. Gates is donating his proceeds from the book to a non-profit fund that supports teachers worldwide who are incorporating computers into their classrooms. In addition to his passion for computers, Gates is interested in biotechnology.

  1. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    all of them can afford themselves to spend money on the CD albums. In spite of this, everyone is entitled to an opportunity of cultural development, whether it is modern or classic music or other arts. Moreover, as the Guardian newspapers article claim "information technology gives people the potential to

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Money would driven into combating hacking in the future which means that Teign and Tow would be spending the money somewhere else rather than using it to profit the business. This then could potentially lead to a lack of interest from the customer.

  1. Download services

    * If users register (purchase) the program, users will often receive a password key to remove shareware "nag" screens or users will be mailed a diskette/CD. General Public License - The licenses for most software are designed to take away user freedom to share and change it.

  2. Crime and crime prevention

    you have lost or had stolen important documents such as your passport or driving licence post expected from your bank has not arrived or you are receiving no post at all you identify entries on your personal credit file from organisations you do not normally deal with a mobile-phone contract

  1. Free essay

    Reduce Damage to organisations

    Disaster Recovery Disaster recoveries are basically methods which can be put in place to recover from any disaster such as virus attack, fire, earth quakes, explosions, flood, hardware failure, power failure and sabotage. As you can see below are the main ways to recover from disasters:- 1)

  2. High-tech crime (computer crime) is the use of technology to commit a crime. It ...

    Cyber-stalking includes making threats, gathering information about the victim, encouraging others to harass, false accusations, requesting minors for sex, false victimization, and ordering good/services in the victim?s name. Hacking is when a person accesses a computer or a network without the owner?s consent.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work