scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 1,353
Over the last twenty years a technological revolution has occurred as computers are now an essential element of todays society Large computers are used to track reservations for the airline industry process billions of dollars for banks manufacture products for industry and conduct major transactions for businesses because more and more people now have computers at home and at the office People commit computer crimes because of societys declining ethical standards more than any economic need According to experts gender is the only bias The profile of todays non-professional thieves crosses all races age groups and economic strata Computer criminals tend to be relatively honest and in a position of trust few would do anything to harm another human and most do not consider their crime to be truly dishonest Most are males women have tended to be accomplices though of late they are becoming more aggressive Computer Criminals tend to usually be between the ages of 14-30 they are usually bright eager highly motivated adventuresome and willing to accept technical challengesShannon 162 It is tempting to liken computer criminals to other criminals ascribing characteristics somehow different from normal individuals but that is not the caseSharp 183 It is believed that the computer criminal often marches to the same drum as the potential victim but follows and unanticipated pathBlumenthal 12 There is no actual profile of a computer criminal because they range from young teens to elders from black to white from short to tall Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas When computers were first introduced into businesses computer crime was defined simply as a form of white-collar crime committed inside a computer system2600Summer 92p13 Some new terms have been added to the computer criminal vocabulary Trojan Horse is a hidden code put into a computer program Logic bombs are implanted so that the perpetrator doesnt have to physically present
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA