Computer Crime

Submitted by: Submitted by

Views: 175

Words: 1087

Pages: 5

Category: Business and Industry

Date Submitted: 04/23/2013 06:49 AM

Report This Essay

Computer Crime

Since the World Wide Web and social media sites became popular almost a decade ago, computer crime has spiked to an all time high. Whether it be identity theft, spreading viruses, or storing illegal information on your computer, it is all considered a crime that can put you behind bars. “The most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity” (TechTerms, 2012). Personally, I was affected by cybercrime when a worker at Domino’s stole my name and credit card information to purchase computer software. Luckily the company reacted quickly and refunded me my money.

What problems does the technology cause? The main problem with cybercrime is that anyone can do it. You don’t need to be a mastermind or an evil technical whiz. “Reports of alleged computer crime have been a hot news item of late. Especially alarming is the realization that many of the masterminds behind these criminal acts are mere kids. In fact, children no longer need to be highly skilled in order to execute cyber crimes” (CyberCitizenship, 2011). Anyone could type up an email and send it to random addresses asking for donations for charity and come away with tons of money. To go even further, the victim’s credit card numbers could be recorded and then scammed even further. Another problem with cybercrime is that the criminal is very hard to trace. There are many situations where there could be a widespread scam, but not “fingerprints” left at the scene. There is endless technology to hide...