Saq12: Computer Crimes
1.From the cases summarized above, explain what constitutes a computer crime.
For me, ones they abuse their right as a user, access files which he/she is not allowed to access and damage ones file so as he/she stored data, retrieve or intercept, defraud, harm, alter data or computer software, delete files from the origin then it constitutes a computer crime. If the action affects many users so as to incur stolen services, money, property and ones right it will also constitute computer crimes. Ones a user begun to be selfish, their mind is full of evil thoughts and think only their own benefits so us to revenge and to gain money then it will be considered a crime. In short if one user is affected by other users’ action and damage things, then it will constitute a computer crime because it will violate the law in the land.
2. Discuss at least three other examples of computer crimes.
Child Pornography
Through the use of spam email nude photos can be sent trough attachment and transferred it to the innocent victims without knowing who send it. It degrade one’s personality ones it is published in the internet. Many websites appear to contain child pornography and even adult pornography. Both known and unknown women are abused. They are published in nude photos even it is altered. I know women are degraded in this situation, they been harassed, but I know they can handle the situation as far as I’m concern. Now we will talk about child pornography or Child Erotica” (i.e. children photographed nude or partially nude posed in a manner that does not meet the criteria for sexual conduct.) Child Erotica is definitely illegal and very unethical. They are very innocent to be published in the internet.
Child pornography as “any image depicting a minor engaged in sexual conduct.” Sexual conduct is defined as “actual or simulated sexual intercourse, deviate sexual intercourse, sexual bestiality, masturbation, or sadomasochistic abuse; actual lewd exhibition of the genitals; actual physical contact with a person's clothed or unclothed genitals, pubic area, buttocks, or, if such person is a female, breast with the intent to arouse or gratify the sexual desire of either party; or any act or conduct which constitutes sexual battery or simulates that sexual battery is being or will be committed.” http://www.flsenate.gov
The children are innocent to be published in the internet. Do they have future ones they are published in nude photos? I doubt it, because I think they will suffer a lot of pain. They will be in traumatic experience, and so it’s too hard to forget what is past.
Cyberstalking
Cyberstalking as "engaging in a course of conduct to communicate, or to cause to be communicated, words, images, or language by or through the use of electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person and serving no legitimate purpose. This is used for blackmail or entrapment. Stalking of any kind creates serious danger and trauma for its victims. Frequently, stalking or cyberstalking takes place as part of a continuum of other crimes of sexual violence or interpersonal violence. Stalking is used to gain information about a victim that gives the perpetrator a sense of power and helps the perpetrator plan opportunities to commit other assaults. Stalking is also used by perpetrators to harass and intimidate victims. Often stalking precedes kidnapping, homicide or sexual battery, so intervention and safety planning are essential for stalking victims.
Phishing
Phishing is the distribution of 'spoofed' e-mail messages with return addresses, links, and branding which appear to come from banks, insurance agencies, retailers, credit card companies, and other legitimate businesses but it is just a faked one. Many are deceived because at first it is just like an original one. “Parang Totoo”. That’s why some have trust to do these things. But they don’t know it is a strategy to steal. Phishing is done to get the things, money and information they needed to a particular user or victim. These fraudulent messages are designed to trick the recipients into disclosing personal information authentication data such as account usernames, passwords, credit card numbers, social security numbers, and home addresses. Most of these e-mails look “official,” and as a result, recipients often respond to them, resulting in financial losses, identity theft, and other fraudulent activity.
4 comments:
Thank you for describing what "Phishing" is. I would see it described on Message Boards and not know what they were talking about! LOL.
Jacquelyn
nike roshe, ugg boots, michael kors, vanessa bruno, lacoste pas cher, michael kors, hermes, nike blazer, mulberry, ray ban uk, michael kors outlet, air force, hollister, abercrombie and fitch, michael kors outlet, north face, true religion outlet, michael kors outlet, true religion jeans, ray ban pas cher, sac guess, north face, nike air max, vans pas cher, hogan, coach purses, kate spade handbags, true religion jeans, tn pas cher, true religion jeans, timberland, lululemon, nike air max, michael kors outlet, replica handbags, michael kors, burberry outlet online, oakley pas cher, michael kors, coach outlet, new balance pas cher, burberry, coach outlet, michael kors outlet, ralph lauren uk, converse pas cher, hollister pas cher, ugg boots, nike air max, nike free run uk
baseball bats, converse outlet, nike roshe, nike huarache, ralph lauren, soccer shoes, nike trainers, lancel, gucci, asics running shoes, bottega veneta, birkin bag, celine handbags, insanity workout, timberland boots, valentino shoes, ray ban, nfl jerseys, louboutin, herve leger, instyler, reebok shoes, lululemon, hollister, wedding dresses, oakley, beats by dre, new balance, nike air max, babyliss, longchamp, north face outlet, abercrombie and fitch, p90x workout, north face outlet, ghd, hollister, ferragamo shoes, mont blanc, iphone cases, mac cosmetics, soccer jerseys, giuseppe zanotti, nike air max, mcm handbags, chi flat iron, vans shoes, hollister, jimmy choo shoes, vans
louis vuitton, coach outlet, louis vuitton, montre pas cher, moncler, replica watches, ugg,ugg australia,ugg italia, marc jacobs, canada goose, canada goose outlet, ugg,uggs,uggs canada, doudoune canada goose, sac louis vuitton pas cher, moncler, toms shoes, pandora charms, thomas sabo, canada goose, hollister, pandora jewelry, moncler, pandora jewelry, links of london, canada goose uk, ugg pas cher, karen millen, pandora charms, ugg boots uk, louis vuitton, moncler, moncler, swarovski, canada goose, moncler outlet, bottes ugg, louis vuitton, wedding dresses, canada goose outlet, moncler, canada goose, swarovski crystal, moncler, juicy couture outlet, juicy couture outlet, supra shoes
Post a Comment