Paper Details  
 
   

Has Bibliography
10 Pages
2463 Words

 
   
   
    Filter Topics  
 
     
   
 

Computers and crime

uses security devices, will be met by counter measures, and all that our law enforcement agencies will be able to do, is take a report. Jay S. Albanese states that changes in our technology will generate more of an opportunity for thefts which will be exploited by criminals for financial gains. Albanese states that "theft has traditionally been a crime of stealth, requiring speed and agility. The aging of North American population has forced criminals to use fraud as a means of thefts since the now lack this speed and agility and are more educated than their predecessors." As the article continues, Generation X, having grown up with computers, will use this talent to commit more serious crimes than society has seen. Some of the excerpts used by Coutorie includes the USA Today, which highlighted some of the crimes that have been committed by computers. Some of these crimes are as follows: computer hackers breaking into Equifax, one of the largest credit reporting agencies; two Cornell Universities that created a computer virus that infected computers, Macs" around the world, which wiped out their operating systems; hackers that filed false IRS tax returns, once indicating a retrun, were able to procure a loan; and disgruntled employee who planted a "logic bomb", which would destroy a computer program months after he was let go, hoping to be brought back as a hero to save the day. The article states that only training and recruiting more individuals who understand the high technology of today, will law enforcement agency's be able to cope with this future problem.There are three criminological theories that can account for crimes with computers. These theories are as follows: conflict theory, social control theory and, social-learning theory. The following paragraphs will explain what these three theories mean, and then how they apply to the focus of this paper.Conflict theory, which emerged after the labeling theory, has two p...

< Prev Page 6 of 10 Next >

    More on Computers and crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA