Wednesday, May 6, 2020
The Common Forms Of Cyber Theft - 1373 Words
Introduction Discussing the terms of cybercrimes can be founded in several sources. Many schoolers have defined the term of cybercrimes in general sense and narrow sense. The term cybercrime in a narrow sense is ââ¬Å"Any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by themâ⬠(Gercke, 2012). Also it has been defined in a broader sense as ââ¬Å"illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or networkâ⬠(Gercke, 2012). Also it has been defined as a criminal activity including the information technologyâ⬠¦show more contentâ⬠¦These devices cause trouble to the victim. The. B. cyber harassment is similar in general to cyber-bullying. However, the criminal who use cyber harassment sends unwanted emails to the victim. These emails usually are se nt to the victimââ¬â¢s junk mail. C. cyber-stalking simply when the victim protect firms from harassment. D. hacking is always related to the internet. The unauthorized closure of victimsââ¬â¢ sensitive and confidential information is related to hacking. The unauthorized accesses is usually done by a user who knows the organization system vluerbitities. E. virus are designed to destroy victimsââ¬â¢ confidential data in their computers. Hackers usually use virus as a tool to reach victims (Moafa, 2014) This paper focuses on the cybercrime that have been charged in 2010 and received a sentence. In focusing on these crimes, the consequences of the crimes are analyzed and other features such as the extent of the cybercrime, the sources of the crime, target of the crime, the harms inflicted, the economic impact of the crimes and the possible punishment. The structure of this paper paper includes three parts which are literature review, data collection, and the presentation of the results and discussing the conclusion. Figure: 1 shows the paper Procedure of Study. Figure 1: Procedure of Study Literature Review: Cybercrime has developed from simple to complex situations over the years, and those in charge of the investigations have done everything
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.