Paper Details  
 
   

Has Bibliography
9 Pages
2309 Words

 
   
   
    Filter Topics  
 
     
   
 

Delving Into Computer Crime

formula), which is then sent to the receiving party. They have the decoding(4) key to transform the data back into understandable data. Encryption works very well, as long as the key doesnt fall into the wrong hands. Firewalls, a safety computer placed between a network and outside systems(4), can deter break-ins from external systems using usernames and passwords, but as we know they can be cracked with some effort.The current laws and regulations against crime do not apply to computer crimes. Although some laws are twisted and contorted to apply to new situations as they arise, I feel that new legislation needs to be put into place to apply to the crimes and criminals. Cyberstalking is a good example of a computer crime that needs its own legislation to govern what is to be considered stalking and what are not over the Internet. Stalking without a computer is clearly defined, both what stalking is and what the penalties are for committing it, but communication over the Internet isnt as clearly regulated. Are 2 E-Mails to a person that didnt want them considered stalking, and if so then why isnt unwanted E-Mail from organizations considered soliciting? Statues need to be presented to clearly outline what is wrong and what is okay. Instead of trying to apply unrelated laws to fast-growing criminal opportunities, we should establish a basis for which all computer crimes can be tried and prosecuted.It has been said that the Internet is the first empirically lawless domain of modern life. Even with the most carefully crafted legislation, enforcing a law in a virtual community creates unique problems never before faced by law enforcement agencies.(6). Since the means of committing the crimes is different, should we consider different punishments? In the past, convicted computer criminals have served generally light terms for their crimes. Shouldnt embezzlement done by a machine, which a human caused it to do, be the same as em...

< Prev Page 7 of 9 Next >

    More on Delving Into Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA