Tuesday, March 08, 2005

Saq12: Computer Crimes

Saq12: Computer Crimes

1.From the cases summarized above, explain what constitutes a computer crime.

For me, ones they abuse their right as a user, access files which he/she is not allowed to access and damage ones file so as he/she stored data, retrieve or intercept, defraud, harm, alter data or computer software, delete files from the origin then it constitutes a computer crime. If the action affects many users so as to incur stolen services, money, property and ones right it will also constitute computer crimes. Ones a user begun to be selfish, their mind is full of evil thoughts and think only their own benefits so us to revenge and to gain money then it will be considered a crime. In short if one user is affected by other users’ action and damage things, then it will constitute a computer crime because it will violate the law in the land.

2. Discuss at least three other examples of computer crimes.

Child Pornography

Through the use of spam email nude photos can be sent trough attachment and transferred it to the innocent victims without knowing who send it. It degrade one’s personality ones it is published in the internet. Many websites appear to contain child pornography and even adult pornography. Both known and unknown women are abused. They are published in nude photos even it is altered. I know women are degraded in this situation, they been harassed, but I know they can handle the situation as far as I’m concern. Now we will talk about child pornography or Child Erotica” (i.e. children photographed nude or partially nude posed in a manner that does not meet the criteria for sexual conduct.) Child Erotica is definitely illegal and very unethical. They are very innocent to be published in the internet.
Child pornography as “any image depicting a minor engaged in sexual conduct.” Sexual conduct is defined as “actual or simulated sexual intercourse, deviate sexual intercourse, sexual bestiality, masturbation, or sadomasochistic abuse; actual lewd exhibition of the genitals; actual physical contact with a person's clothed or unclothed genitals, pubic area, buttocks, or, if such person is a female, breast with the intent to arouse or gratify the sexual desire of either party; or any act or conduct which constitutes sexual battery or simulates that sexual battery is being or will be committed.” http://www.flsenate.gov
The children are innocent to be published in the internet. Do they have future ones they are published in nude photos? I doubt it, because I think they will suffer a lot of pain. They will be in traumatic experience, and so it’s too hard to forget what is past.

Cyberstalking

Cyberstalking as "engaging in a course of conduct to communicate, or to cause to be communicated, words, images, or language by or through the use of electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person and serving no legitimate purpose. This is used for blackmail or entrapment. Stalking of any kind creates serious danger and trauma for its victims. Frequently, stalking or cyberstalking takes place as part of a continuum of other crimes of sexual violence or interpersonal violence. Stalking is used to gain information about a victim that gives the perpetrator a sense of power and helps the perpetrator plan opportunities to commit other assaults. Stalking is also used by perpetrators to harass and intimidate victims. Often stalking precedes kidnapping, homicide or sexual battery, so intervention and safety planning are essential for stalking victims.

Phishing


Phishing is the distribution of 'spoofed' e-mail messages with return addresses, links, and branding which appear to come from banks, insurance agencies, retailers, credit card companies, and other legitimate businesses but it is just a faked one. Many are deceived because at first it is just like an original one. “Parang Totoo”. That’s why some have trust to do these things. But they don’t know it is a strategy to steal. Phishing is done to get the things, money and information they needed to a particular user or victim. These fraudulent messages are designed to trick the recipients into disclosing personal information authentication data such as account usernames, passwords, credit card numbers, social security numbers, and home addresses. Most of these e-mails look “official,” and as a result, recipients often respond to them, resulting in financial losses, identity theft, and other fraudulent activity.