Abstract

Computer crime is a form of criminal behavior in which the use of computer technology and information systems is manifested as a mode of crime or the computer is used as a means or purpose of perpetration with which is producing some relevant criminal consequence. Computer crime is also an unlawful violation of property in which computer data is intentionally altered (manipulated by a computer), destroyed (computer sabotaged) or used in conjunction with hardware (theft of time). Objective of this paper is consideration of using new computer technology in everyday life. Unfortunately, some users using new technology for criminal acts. For Analysis, author use official resources from books, scientific papers and online resources. Even though it is a new technology, police and justice successfully deal with different types of computercrimes.

Highlights

  • It is not surprising that a large number of studies and specialized schools have been opened with a view to achieving IT literacy, and its standardization and even development within the borders of individual geographical regions, whether it is only in the territory of a particular country or in an area covering more than one country

  • Computer crime is a kind of inevitable active participant in the exponential development of information or computer technology especially in the digitized electronic networks in all areas of life

  • Computer crime is a crime which is directed against the security of computer systems in order to gain some benefit or harm to others

Read more

Summary

1- Introduction

The most common passwords are “12345” and “password.” Internet dating sites and chat rooms are popular venues to obtain personal information In response to this growing criminal activity, in 1998 Congress passed the Identity Theft and Assumption Deterrence Act, making identity theft a federal crime. Computer crime is a kind of inevitable active participant in the exponential development of information or computer technology especially in the digitized electronic networks in all areas of life It differs from the known forms of crime because of his common facility incorporeal digitized data, computer main tool of unlawful activity or purpose of his execution, and the invisible computer to do a specific area of action at a distance that in earlier periods was virtually unthinkable. It is modern society must oppose with all available methods and means, including legal protection is certainly one of the most important [20]

11- Conclusion
12- Funding and Acknowledgments
13- Conflict of Interest
Findings
14- References
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call