Criminal Justice Distinguish between computer crime computer
Criminal Justice- Distinguish between computer crime, computer-related crime, and cybercrime. Can these crime terms be permanently defined and completely understood? Why or why not?
Solution
This course provides an overview of cyber crime and computer-related crime issues facing the American criminal justice system, particularly law enforcement. The course looks at law enforcement’s ability to respond and discusses law enforcement problems in dealing with computer crime. Students will learn about government response to cyber crime problems, especially from a law enforcement perspective. Future trends of cyber crime and computer-related crime will also be discussed.
Much has been written about the phenomenon of \"computer crime,\" but there is little agreement on its definition. Statistics on the scope of the problem vary widely. Clearly, the hacker who breaks into a computer and destroys files would, if guilty of any offense, be guilty of a \"computer crime.\" But what about the bank employee who uses a computer to create a fictitious bank account into which she funnels embezzled bank funds? Or the telemarketing executive who uses a computer\'s word-processing and mail merge features to send out -- either by \"snail mail\" or by electronic mail -- fraudulent solicitations.
Computers and computer bulletin boards have been used to facilitate child pornography and child abduction rings, software piracy, theft of cable services, theft of telephone services, computerized stalking, terrorist rings, narcotics dealing, as well as other forms of criminal activities including plain theft. As more white collar businesses become computerized, the process of collection of evidence -- through search warrants, subpoenas and other discovery devices -- even in the non-computer crime field, has increasingly required a detailed knowledge of the technology involved in the collection, storage and retrieval of information. Indeed, virtually every type of crime which can be committed can be facilitated through the use of computer or information technologies. In many cases, the use of the computers does not alter the fundamental character of the offense -- bribery remains the same even if accomplished through e-mail or electronic funds transfers, although the use of the computer may affect the degree of the offense.
