Examine the key features around the growth, development and policing of cyber crime in the 21st century.

Emma Fields Social Policy and Criminology Examine the key features around the growth, development and policing of cyber crime in the 21st century. The internet was first created in the 1960’s, but it only really started to take off and develop in the last 20 years with big websites such as Google (1998) and YouTube (2005). With the internet developing and people knowing more about it, cybercrime then came about and since then it has grown and gotten more dangerous and more extreme. There are several different types of cybercrime for example one is called cyber violence, this includes stalking and harassment, it can also be bullying people online via social networking sites and chat rooms. Cyber obscenity is another type of cyber crime which is sexual including porn sites. Cyber trespass is the crime of hacking sites and cyber theft is also another cybercrime which is credit card fraud as well as the illegal downloading of movies, music, books etc. Computer hackers are very intelligent, initially they started hacking sites simply because they were able to, and they wanted to explore the sites, at the start it was done just for fun. However it didn’t take long for these hackers to realise their potential and what they could actually be doing, soon it then escalated and they became more educated and more confident in hacking. These hackers could now be described

  • Ranking:
  • Word count: 1265
  • Level: AS and A Level
  • Subject: ICT
Access this essay

William H. Gates.

William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates III is co-founder, chairman and chief executive officer of Microsoft Corporation, the world's leading provider of software for personal computers. Bill Gates was born on October 28, 1955. He and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Mary Gates, their late mother, was a schoolteacher, University of Washington regent and chairwoman of United Way International. Gates attended public elementary school before moving on to the private Lakeside School in North Seattle. It was at Lakeside that Gates began his career in personal computer software, programming computers at age 13. In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, who is now Microsoft's president. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer - the MITS Altair. BASIC was first developed by John Kemeny and Thomas Kurtz at Dartmouth College in the mid-1960s. In his junior year, Gates dropped out of Harvard to devote his energies full-time to Microsoft, a company he had started in 1975 with his boyhood friend Paul Allen. Guided by a belief that the personal computer would be a valuable tool on every office desktop and in every home, they began

  • Ranking:
  • Word count: 728
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Legislation regulating E-Commerce

Data Protection Act 1998 This is the act that deals with the customer details that can be collected or stored on paper and electronically. In e-commerce when the user enters all the personal details such as name, address, telephone number, e-mail address and etc. According to this data protection act, the customer has a right to avoid from sending his/her details to a third party. Computer Misuse Act 1990 This act is a law that works against illegal activities such as: hacking, misuse software's or helping person to get access to someone else's computer. This act prosecutes hacking or attacking a computer with viruses. According to computer misuse act there are three new offences such as: * unauthorised access to computer programs or data * unauthorised access with the intent to commit further offences * unauthorised modification of computer material In an e-commerce website, Computer misuse act can be used to prevent the website getting hacked by hackers. For example when a user gets registered with an e-commerce website such as Amazon where you have to put all the details including the card details. So if someone hacks into the amazons account, he/she can order products and it will add to the customer's account. This can lead to unauthorised crimes. Consumer Credit Act 1974 This is another important act in e-commerce related to payments by the customers and

  • Ranking:
  • Word count: 540
  • Level: AS and A Level
  • Subject: ICT
Access this essay