• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Growth of cybercrime and how_society can deal with it

Extracts from this document...


The Growth of Cyber Crime and How Society Can Deal With It In this essay, I will be looking at the Computer Misuse Act 1990, the effects of cybercrime, how cybercrime can be prevented and I will be discussing some real life stories that have been caused by cybercrime. ICT has developed dramatically over the last few years. Computers and the internet have now become a personal essential with almost 800 million computers in the UK. Internet facilities have also being developing over the recent years. At large the development of ICT has mainly had a positive effect on society; however, the development of ICT also has a negative side. As ICT has been developing, so has Cyber Crime. In 1990, the government enforced the Computer Misuse Act 1990. This meant that any one who: * Planted or transferred viruses onto computers systems with malicious intent (e.g. causing serious damage to software/ programs/ data...) * Carry's out unauthorised work or hacks into another ICT system in order to view or alter the information on an organisations computers * Commits various frauds using a computer Can face a hefty sentence or fine. There are three different sections to the computer misuse act, Section 1: * A person uses a computer with intent to get access to any data or programs held on the computer * The area the person intends to access is unauthorised and they are ...read more.


Thirdly, if an e-mail is received requesting bank details, they should check that their name is at the top of the e-mail, if it isn't then this usually means the e-mail isn't legit. If the e-mail asks the person to enter their details on a website of which the link is provide, check the URL to see if it matches the official website (this can be found on Google or on any documents that have been received from the organisation), and also check that there is a padlock at the bottom left hand side of the internet page. If there is one their then it means its safe. Finally, if the person still doubts the authenticity of an e-mail, they should contact the organisation the e-mails claims to have come from to see whether or not it is genuine. Over recent years, the amount of people who use social network has increased dramatically. The most popular of them all is Facebook which has an estimated 500 million user's world wide. However, not everyone who uses it is who they say they are. As a member of Facebook myself I am aware that it clearly states you must be 16 or over to become a member, however, it is clear that there is a huge number of children under the age of 16 using Facebook. This makes Facebook an ideal place for paedophiles to find their next victims. ...read more.


This means they have the potential to get their bank details, change their bank details, get utility bills... One woman; Victoria Sennitt, from South West London had provided a lot of personal information on her profile such as her phone number, home town, e-mail... An identity thief then got hold of these details and set up a mobile phone contract using Victoria's details. It was only when Victoria received a letter in the post about a new mobile contract; under her name and containing all her personal details that she realised what had happened. Although this is less severe case of identity theft when compared to some cases, a highly experienced identity thief could easily of got Victoria's bank details... using the information the had listed on her profile. (My identity was stolen on Facebook, 2007) Although this is an old story, the method behind retrieving the person details is still the same today. People should either stop using Facebook or hold back on the information they give on their profile. Doing this could potentially save them a lot of hassle and reduce the risk of having their identity stolen. Overall I believe cybercrime has a huge effect on society and that the punishments for committing cybercrime are not severe enough. Also, Cybercrime has a huge effect on society and there is still lots left to be done to try and reduce the level of cybercrime that goes on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    new customers, because there are exclusive only positive reviews without even a single negative point. Although this could mean that the website is very positive, it could also be that they only show the positive reviews and do not display any negative reviews.

  2. Marked by a teacher

    Information Age

    3 star(s)

    Below that are different sections that customers are willing to browse. On the bottom of the page is the help link given through which customer can access if they are confused, and just next to it are given the options of TV's various channel.

  1. Peer reviewed

    Computer Crime

    5 star(s)

    data stored on the I-Phone and routed to a remote sever with ease and without the user noticing. To get his point across, Seriot created a spyware dubbed "SpyPhone". This shook the world of the Apple Company, as this one innocent looking applet, running in the background or even under

  2. The Impact of Mobile Phones on social Interaction

    has commented that there are nearly 400 million mobile phones in use globally with another 250,000 being added everyday. Similarly, a 1999 House of Commons science and technology report (2) predicted that by 2000, 50% of all calls would be made using mobile phones.

  1. ict as level coursework

    of product in stock, you to it in the same method as above. Operating the system User form 1 As you can see there are options available for the user on the menu page. They layout it pretty simple and only requires you to pick the relevant button.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    The correct procedures to identify whether the person calling has the right to access the information. 4. The staff members are made aware of the dangers of misleading people into believing they are somebody else, in the attempt to gain information, i.e.

  1. The Growth of Cybercrime

    Over 1 billion people are now using social networking sites making it an easy target for hackers and thieves to get most of the personal details they need to steal a person's identity. The main social networking site used is Facebook holding over 500 million active users!

  2. Wjec alevel ict creating a website

    to the RAC route planner website this was so people who didn't know how to get there would be able to plan a route to the venue of the washout promotion. To create the hyperlink, I highlighted the text and in the link box I copied and pasted the web address for the RAC route planner site.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work