Computer Fraudulent
Individuals use computers to unlawfully access systems or alter electronic data. Computer frauds are comprised of accessing unauthorized computers, data mining through malware and spyware, hacking and sending of worms or viruses. Malicious people send viruses and worms with the intent of destroying another parties system or computer. Hackers use computers to access personal information like medical details or credit cards which are later used to steal or harass owners. In today’s world, robbery has been computerized in such a manner that it’s no longer personal. That phenomenon has made theft in institutions like banks more rampant and untraceable (Fehr et al., 2016). Such occurrences are highly being experienced in the U.S. where individual’s credit information is hacked and used to access their bank accounts.
Copyright Violations
Materials made that are not public domain should not be shared without their holder’s permission. In today’s world where a lot of people are publishing their work online, copyright violations have increased rampantly. Copyright violations extend to sharing of texts copied from other sources or even paraphrasing it with similarities in sentence structure. Plagiarism helps detect copyright violations and individuals could serve time for such actions (Solak, 2015). Computers have helped the acceleration of copyright violations as everything is currently being stored online. An example of copyright violations exists n various sites that people currently download movies and songs from. These individuals do not request permission from files owners before acquiring them.
Delegate your assignment to our experts and they will do the rest.
Money Laundering
Computer technology has heightened the level of money laundering in various countries. Money illegally obtained can be disguised or concealed to look as if it originated from legitimate sources. Through computers, abusing shell companies can move money across the globe. An example of money laundering is that which drug dealers are engaged in (Fehr et al., 2016). Through the aid of computers, these individuals are able to transfer their money into different bank accounts untraced by the federal government.
Cyber-Sabotage
Sabotage can be done over the internet or even installed purposefully. Manufacturers with malicious intents can cause cyber-sabotage on equipment. Computer software’s should be validated before they begin operations to avoid possible cyber-sabotage. In 2007, the United States commercial sector experienced cyber-sabotage where organizations attacked their competitors in order to steal market share (Solak, 2015). By sending or installing contaminated software’s individuals with malicious intents stole information from their competitors.
References
Fehr, C., LiCalzi, C., & Oates, T. (2016). Computer Crimes. Am. Crim. L. Rev., 53, 977.
Solak, D., & Topaloglu, M. (2015). The Perception Analysis of Cyber Crimes in View of Computer Science Students. Procedia-Social and Behavioral Sciences, 182, 590-595.