• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society.

Extracts from this document...


Tariq Ameer #116 ITGS 11-H Sept. 15, 2011 Write a 2-page essay about what is biggest technology related threat to the society. High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society. According to the 2011 Norton Cybercrime Report, in 2010 more than 430 million adults were victimized at a cost of US$388-billion in direct and indirect losses from computer crime world wide. The direct financial losses from cybercrime stood at US$114 billion, while US$274 billion was the value of time that victims spent in solving the crimes [1]. High-tech crimes include identity theft, cyber-stalking, hacking confidential systems, pyramid schemes, planting harmful viruses, and many others. ...read more.


Medical Identity theft is using a person?s name or insurance information to get medical services/goods or just to make false claims. Child identity theft on the other hand is using a child?s Security Number for personal gains. Identity cloning on the other hand is to assume the identity of another person for daily life. Cyber-bullying is the use of modern technology (mostly the internet) to harm people on purpose. New bullying statistics revealed that around half of teens with Internet access have been the victims of cyber bullying [2]. Cyber-bullying can lead to depression and even suicide. Unlike physical bullying, cyber-bullies can remain anonymous and the bullying can continue all day every day. Many think cyber-bullying only happens to children, but it also happens to adults, which is known as cyber-stalking. ...read more.


Others hack bank security systems to illegally obtain money (also known as defrauding). Other reasons for hacking are creating public attention for oneself, illegal subscription, and altering or obtaining classified information. And even though security systems are being improved, so is hacking. Other major high tech-crimes include drug trafficking, cyber terrorism, and cyber warfare. Drug dealers are taking advantage of the Internet and other technologies to sell illegal drugs. And the lack of face-to-face communication causes an increase of Internet drug trade. Cyber terrorism is the act of terrorism through the use of cyberspace. Cyber warfare, which is considered one of the most controversial and threatening high-tech crimes, is the act of sabotage and espionage through politically motivated hacking. These examples and many more are the reason why high-tech crime is the biggest threat to society when it comes to technology. Sources: 1. 1. http://business.financialpost.com/2011/09/07/cyber-crime-cost-canadians-5-5-billion-in-2010-study-finds/ 1. 2. http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html 2. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    It will look very genuine to service users and often many of them fall into the trap. E-Mail bomb is another type of attack that can be made, hundreds of emails are sent to a service in order to shut it down.

  2. Peer reviewed

    William H. Gates.

    4 star(s)

    in the world - a comprehensive digital archive of art and photography from public and private collections around the globe.

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    sending important data in which hackers will not get through to the data at all. This would mean more capital being spent on security but Teign and Tow would have to think long term if they are to remain a successful company.

  2. Download services

    Programmers who release the freeware often want to "give something to the community", but also want credit for their software and to retain control of its in future development. Sometime when programmers decide to stop developing a freeware product, they might give the source code to another programmer or release the product's source code to the public.

  1. Crime and crime prevention

    has been set up in your name without your knowledge financial institutions that you do not normally deal with contact you to chase an outstanding debt. Statistic show that the latest estimate is that identity fraud costs the UK economy �1.7 billion in 2006.

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    the 'Prestel System' operated by BT, which provided subscribers with both email facilities and access to number of database service." (D.Rowland & E. Macdonald, 2005) so even they did not mean to do that but they tricked BT operates and as a result they were caught and a prosecution was bought under Forgery and Counterfeiting Act 1981.

  1. The Sullivan's matrix report

    "Essential for the success of any information management strategy is the existence of an appropriate 'information culture'. An information culture can be defined as the values, attitudes and behaviours that influence the way employees at all levels in the organization sense, collect, organize, process, communicate and use information."

  2. Building Local Area Networks

    Netsh.exe also allows the administrator to configure the WINS addresses by use of the command prompt. The command is shown below, again with the command to show the settings to confirm the changes have taken place. Below is show a way of configuring the DNS address by use of the

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work