Friday, January 3, 2020

Computer Fraud Essay - 1185 Words

Computer Fraud As much as $40 billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately $2 billion, and about $50 million were stolen from various companies such as GTE Corp., ATT, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporations and international authorities are threatened by these innumerable white collar crimes since such crimes are most difficult to prevent, and/or detect and highly profitable to the offenders ( Stern and Stern 525 ). This ever growing menace to†¦show more content†¦In 1994 only, companies estimated to have lost $8 billion due to piracy ( Hall and Vancura 108 ). Figure 1 How to prosecute offenders? Furthermore, Internet Frauds are very difficult to prevent because a long time is required for most of t hem to be discovered. For instance, law enforcers need not only at least equal scientific and technical ability as the offenders, but also precious time and energy to examine company books and accounts to unravel such crimes ( Croal 14 ). It is also felt that prosecution is often incorrect and counter productive (Southerland 85). When the crimes are uncovered, the laws are too vague and too limited for proper prosecution ( Stern Stern 528 ). The complexity of Internet fraud makes it very difficult for legislators to estimate the extent to such offenses, thus leaving many loopholes to be exploited by alert offenders. Moreover, Internet offenses and offenders do appear to enjoy structural advantages, and the outcome of the policies pursued by law enforcers is that many avoid public prosecution and punishment ( Croal 91). Furthermore, it is widely believed that so little has been done to prevent such computer crimes although adequate defensive technology is available for such preven tion because computer owners and governments are arrogant and apathetic ( Schwartau 313-314 ). Nevertheless, at some point in the very near future, they will not afford any longer to be so.Show MoreRelatedComputer Fraud And Abuse Act ( Cfaa ) And Cyberbullying Essay1665 Words   |  7 PagesEmily Jessep Intellectual Property Crimes Professors Dreyfuss and First November 15, 2016 INCOMPATIBLE: The Computer Fraud and Abuse Act (CFAA) and Cyberbullying I. Introduction The Computer Fraud and Abuse Act (CFAA) does not cover cyberbullying done via social networking websites and should not be used to prosecute it. Application of the CFAA to cyberbullying prosecutions is inconsistent with the intended scope of the statute and the existing interpretations of its provisions. PracticallyRead MoreThe Computer Fraud And Abuse Act1489 Words   |  6 Pagessendmail program and a flaw in the fingered network service. The worm was designed to go to every computer to check if it’s affected, and duplicate itself automatically. The self-duplication expedited loads of systems and finally crashed them, and of course, this feature would also alarm system administrators. Robert Morris got arrested 1989, and became the first person to be indicted under the Computer Fraud and Abuse Act. However this punishment didn’t hurt his career too much, he is now tenure in MITRead MoreTypes Of Computer Fraud, The Association It Has With A Legalisation Of Uk And Th e Effectiveness Of Each1903 Words   |  8 Pagesdescribing three types of Computer Fraud, the association it has with a legalisation in UK and the effectiveness of each legalisations for prosecution. Each fraud mentioned are associated with the categories of fraud mentioned below. â€Å"They look upon fraud as a greater crime than theft† (Swift, 1838) Fraud is defined by Oxford English Dictionary as â€Å"the use of false representations to obtain an unjust advantage or to injure the rights or interests of another† (OED, 1956). Computers are an advanced aidRead MoreMitigating Computer Fraud in the Online Environment2273 Words   |  10 PagesMitigating Computer Fraud in the Online Environment Introduction Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledgeRead MoreThe Computer Fraud And Abuse Act897 Words   |  4 PagesThe Computer Fraud and Abuse Act does have is befits when protecting people though. The act itself is completely necessary and has made the United states a safer place. The act protects user information from companies and hackers. In September of 2000 America Online won its case against the National Health Care Discount corporation for violation of the Computer Fraud and Abuse Act. The National Health Care Discount corporation hired emailers to send bulk emails to the internet service provide r AmericaRead MoreThe Computer Fraud And Abuse Act1898 Words   |  8 PagesIn 1986, Congress enacted the Computer Fraud and Abuse Act (CFAA). This act has been amended numerous times, up until even recently in January of 2015 when President Obama brought forth a proposal to expand the CFAA in his attempt to modernize law enforcement authorities to combat cyber crime. This act has 7 different prohibitions. In the 2014 case, Facebook, Inc. v. Grunin, the Computer Fraud and Abuse Act was brought into question. The prohibition that was violated includes that relating toRead MoreComputer Fraud And Identity Theft1705 Words   |  7 PagesAbstract In today’s world where computers, cellular phones, wireless internet connections and electronic transactions are common place norms, maintaining ones identity can be a challenge. In 2012 the United States population was 314.1 million people, in the same year, 75.6 percent of households reported having a computer. (Government Census, 2012) With this high population and electronic use, one could extrapolate that there is high risk for computer fraud and identity theft. For example considerRead MoreComputer Fraud and Abuse Act Essay861 Words   |  4 PagesComputer Fraud and Abuse Act Everything is stored on the internet including highly classified government information, and your bank information. How do we make sure no one steals, views, or sells your passwords, and private information? Congress passed a law in 1986 called the Computer Fraud and Abuse Act (CFAA) to protect the government’s information. Many laws have been passed that revises the CFAA. The CFAA has imprisoned many people, and many people want changes to the CFAA today. The CFAARead MoreThe Accounting Fraud Case At Computer Associates1080 Words   |  5 PagesAs requested I have completed an analysis of the accounting fraud case at Computer Associates (CA) in preparation of your speech at the American Accounting Associations annual meeting. I have structured my analysis to correspond to six key questions that arose from the case and Stephen Richards actions while Head of Global Sales at Computer Associates. How serious were Stephen Richards’ actions? Why? Stephen Richards’ actions were plain and simply criminal, and therefore very serious. RichardsRead MoreModern Cyber Attack And Its Effects On Society932 Words   |  4 PagesTraditional crimes, otherwise known as street crimes, violate state and federal laws without the use of a computer and/or internet. Rape, homicide, distribution/using of illegal substance, assault, burglary, breaking and entering, possession of unregistered firearm, etc. are some examples of traditional crime. Just like traditional crime, cybercrime is inevitable and unavoidable as long as computers and the internet are around. It can pick and choose its victims at random and although there are ways

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.