Jump to content

Computer crime: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
JackCoke (talk | contribs)
No edit summary
 
(31 intermediate revisions by 22 users not shown)
Line 1: Line 1:
#REDIRECT [[Cybercrime]]
'''Cybercrime''' contains all criminal offences which are committed with the aid of communication devices in a [[network]]. This can be for example the [[Internet]], the [[telephone line]] or the [[mobile network]].


{{Redirect category shell|1=
==Overview==
{{R from alternative name}}
An international legal definition of cybercrime that is used by most of the countries in Europe and North America as well as South Africa and Japan was agreed to in the [[Convention on Cybercrime]], and entered into force on [[1 July]] [[2004]].
{{R from merger}}

}}
Although the term ''cybercrime'' is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.

:Examples of cybercrime which the computer or network is a tool of the criminal activity include [[spamming]] and [[copyright]] crimes, particularly those facilitated through [[peer-to-peer]] networks.

:Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating [[access control]]s), [[malware|malicious code]], and [[denial-of-service]] attacks.

:Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, [[phreaking|telecom fraud]]) and certain financial frauds.

:Finally, examples of traditional crimes facilitated through the use of computers or networks include [[Advance fee fraud|Nigerian 419]] or other gullibility or [[social engineering]] frauds (e.g., [[hacking]] "[[phishing]]", [[identity theft]], [[child pornography]], [[online gambling]], [[securities fraud]], etc.). [[Cyberstalking]] is an example of a traditional crime -- harassment -- that has taken a new form when facilitated through computer networks.

Additionally, certain other information crimes, including [[trade secret]] theft and [[Industrial espionage|industrial]] or [[Economic Espionage Act of 1996|economic]] espionage, are sometimes considered cybercrimes when computers or networks are involved.

Cybercrime in the context of national security may involve [[hacktivism]] (online activity intended to influence policy), traditional [[espionage]], or [[information warfare]] and related activities.

One of the recent researches showed that a new cybercrime is being registered every 10 seconds in [[uk|Britain]]. During [[2006]] the computer crooks were able to strike 3.24 million times. Some crimes performed on-line even surpassed their equivalents in real world. In addition, experts believe that about 90% of cybercrimes stay unreported.

According to a study performed by Shirley McGuire, a specialist in psychology of the [[University of San Francisco]], the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area of [[San Diego]]. Her results were presented at
the [[American Psychological Association]] conference:
* 38% of teenagers were involved in software piracy;
* 18% of all youngsters confessed of entering and using the information stored on other personal computers or websites;
* 13% of all the participants mentioned they performed changes in computer systems or computer files.
The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement. Many cyber police are getting more complaints about [[Orkut]] these days as many fake profiles are being created and thus facilitating crimes.

Most internet crimes are international crimes. This scenario makes cooperation between different law enforcement officials in other countries a must. Those relationships should be efficient enough to be able to move much faster than with the average investigation due to the fact that computer evidence can “disappear” very quickly.<ref>{{cite web|accessdate=2008-07-18|url=http://www.internetevolution.com/author.asp?section_id=670&doc_id=156701&f_src=flffour|publisher=www.InternetEvolution.com|title=Unprepared to Fight Worldwide Cyber Crime|author=Dempsey, Patrick J.|date=[[February 27]] [[2008]]}}</ref>

==Cyber criminology==

The [[neologism]] of '''cyber criminology''' is increasingly used to describe an area of study for [[criminology|criminologists]] which is separate from [[cyber forensics]].

==See also==
*[[Internet police]]

==References==

#Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
#Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm
#Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351
#Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18.
#McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html
#Mann, David and Sutton, Mike, (1999). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, vol. 38, no. 2, Spring 1998.
#Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge.
#Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge: Polity
#Yar, M. (2005) The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity Theory European Journal of Criminology, Volume 2 (4): 407–427:

==Further reading ==
* Brenner, S.W. (2007) ''Law in an Era of Smart Technology'', New York: OUP
* McQuade, S. (2006) ''Understanding and Managing Cybercrime'', Boston: Allyn & Bacon
* Pattavina, A. (ed.) (2005) ''Information Technology and the Criminal Justice System'', Thousand Oaks, CA: Sage
* Wall, D.S. (2007) ''Cybercrime: The transformation of crime in the information age'', Cambridge, UK: Polity
* Williams, M. (2006) ''Virtually Criminal: Crime, Deviance and Regulation Online'', London, UK: Routledge

==External links==
*[http://www.bluecoat.com/doc/7993 The Alarming Shift in Cybercrime]
{{wikinewshas|news related to this article|
* [[Wikinews:UK nears US in cyber-crime, ahead of Nigeria, Romania|UK nears US in cyber-crime, ahead of Nigeria, Romania]]}}
{{wikibooks|Legal and Regulatory Issues in the Information Economy}}
*[http://politicalhacking.blogspot.com/ Politically Motivated Computer Crime and Hacktivism]
*[http://www.infoniac.com/hi-tech/british-cybercrooks-moving-crime-per-seconds-speed.html British Cybercrooks Moving at One-Crime per 10 Seconds Speed]

===Academic links===
*[http://cybercrimes.net/ Cybercrimes.net] and [http://steeplemedia.com/blogs/cyb3r_crim3/ Cyb3rCrim3.org] Susan W. Brenner
*[http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm Cybercrime - High Tech crime] JISC Legal Information Service
*[http://www.lib.msu.edu/harris23/crimjust/cybercri.htm Criminal Justice Resources - Cybercrime]
*[http://information-retrieval.info/cybercrime/ Cybercrime NYLS]
*[http://www.cybercrimelaw.org/ Cybercrime Law]
*[http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm Council of Europe's Cybercrime Convention]
*[http://www.crime-research.org Computer Crime Research Center]

===Government resources===
*[http://www.cybercrime.gov/ Cybercrime.gov] US Department of Justice CCIPS
*[http://www.us-cert.gov/ US CERT] United States Computer Emergency Readiness Team (US-CERT)
*[http://www.fbi.gov/cyberinvest/cyberhome.htm FBI Cyber Investigations Home Page]
*[http://www.ustreas.gov/usss/financial_crimes.shtml#Computer US Secret Service Computer Fraud]
*[http://onguardonline.gov/index.html On Guard] OnGuardOnline.gov
*[http://www.consumer.gov/idtheft/ ID Theft]
*[http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html FindLaw Computer Crime]
*[http://www.rcmp-grc.gc.ca/scams/ccprev_e.htm RCMP Computer Crime Prevention] Royal Canadian Mounted Police
*[http://www.dc3.mil Department of Defense Cyber Crime Center]

===Commercial resources===
*[http://www.e-crimecongress.org Annual e-Crime Conference] : International Conference for Public & Private Security Specialists

[[Category:Cybercrime| ]]
[[Category:Crime by type]]
[[Category:Computer security procedures]]
[[Category:Computer network security]]

[[de:Internetkriminalität]]
[[fr:Cybercrime]]
[[id:Kejahatan dunia maya]]
[[ja:サイバー犯罪]]
[[th:อาชญากรรมไซเบอร์]]

Latest revision as of 20:37, 8 June 2017

Redirect to: