Computer Fraud Essay

1582 words - 6 pages

Computer Fraud

As much as $40 billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately $2 billion, and about $50 million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporations and international authorities are threatened by these innumerable white collar crimes since such crimes are most difficult to prevent, and/or detect and highly profitable to the offenders ( Stern and Stern 525 ). This ever growing menace to society is assisted by the sophisticated computer technology which has also provided invaluable benefits to mankind. For instance, the advanced computer networks have recently helped to save lives in a faraway Chinese province. From information received through the Internet, a Chinese doctor was able to treat a desperate 13 year old girl, Yang Xiaoxia, of a mysterious flesh eating disease which had also killed eleven people in Great Britain in 1994 ( Turner 54 ). On the other hand, Internet has caused serious and unpreventable legal problems, as passwords can be very easily broken, ideas stolen and wrong doings very difficult, if not impossible to trace ( Meyer and Underwood 44 ). For example hackers in Florida can pass comfortably through another computer in Finland, where they can strip any name and address, and move on to still another computer in Asia, where such piracy is not considered a serious crime ( Meyer and Underwood 45 ). For instance, 25% of computer software is considered pirated in the U.S., (Internet of course making things easy since you could send even large length programs to another user through E-mail) while in China, the rate goes up to 98%. In 1994 only, companies estimated to have lost $8 billion due to piracy ( Hall and Vancura 108 ). Figure 1 How to prosecute offenders? Furthermore, Internet Frauds are very difficult to prevent because a long time is required for most of them to be discovered. For instance, law enforcers need not only at least equal scientific and technical ability as the offenders, but also precious time and energy to examine company books and accounts to unravel such crimes ( Croal 14 ). It is also felt that prosecution is often incorrect and counter productive (Southerland 85). When the crimes are uncovered, the laws are too vague and too limited for proper prosecution ( Stern & Stern 528 ). The complexity of Internet fraud makes it very difficult for legislators to estimate the extent to such offenses, thus leaving many loopholes to be exploited by alert offenders. Moreover, Internet offenses and offenders do appear to enjoy structural advantages, and the outcome of the policies pursued by law enforcers is that many avoid public prosecution and punishment ( Croal...

Find Another Essay On Computer Fraud

Research Essay

1165 words - 5 pages Computer Fraud and Abuse Act Everything is stored on the internet including highly classified government information, and your bank information. How do we make sure no one steals, views, or sells your passwords, and private information? Congress passed a law in 1986 called the Computer Fraud and Abuse Act (CFAA) to protect the government’s information. Many laws have been passed that revises the CFAA. The CFAA has imprisoned many people, and

Fraud: Early Warning Signs of Fraud

2467 words - 10 pages The early warning signs of fraud are, usually, always ignored. There are warning signs for every type of fraud out there. To understand the warning signs of fraud, we must first know what fraud is. Fraud is the intent to trick someone or lie to someone in order to receive financial gain. This definition varies depending of the type of fraud used, but the person committing the fraud is always looking for financial gain. There are many types of

Credit Fraud Overviwe Analysis and Recommendations

1596 words - 6 pages commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law,” (U.S. Department of Justice, 2013). Several United States Codes (U.S.C.) were created to strengthen the Identity Theft and Assumption Deterrence Act. Those acts include: identification fraud statute (18 U.S.C. § 1028), computer fraud statutes (18 U.S.C. §1030), mail fraud statute

Vulnerability of computerised accounting information systems to computer crime

1597 words - 6 pages Computer Crime, crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery and mischief, all of which are generally subject everywhere to criminal sanctions. The computer has also created a host of potentially new misuses or abuses that may, or should, be criminal as well. It has created significant threats in relation to ensuring the security and

Credit Card Fraud

1403 words - 6 pages Journal of Computer Applications, 82(9), 12-15. Jha, S. (2009). Credit card fraud detection with discrete choice models and misclassified transactions. (Unpublished MBA Thesis). University of Chicago, Chicago, IL. MacDonald, J. (2009). Tokenization touted to increae credit card data security. Retrieved from card-id-theft-1282.php Pun, J., Lawryshyn, Y. (2012

Fraudulent Banking: Where’s My Money?

1865 words - 7 pages Every day we make purchases, use our credit cards, write checks, and shop online. Money becomes bigger each day and so does greed. As technology continues to improve and change over the years, so has banking fraud. Despite banks and businesses finding new ways to protect their customers from fraud, it still occurs all around the world. The main types of fraud can be classified as check fraud, credit and debit card fraud, identity theft, and

Identity Fraud. What is it? How does it impact over 33 Million Victims since 1990? How does a person protect themselves from it?

2584 words - 10 pages . With the rapid increase in Identity Fraud, many new-sophisticated technologies are being used to help people protect and secure their personal information while on the computer and internet. Some popular computer basics in protection are Cryptography and Encryption, Cookies and Smart Cards.Many people do not know or do not think about the content of their email being monitored by someone else. The origin, recipient and sender can be tracked and

Cyber Criminals

669 words - 3 pages used primarily by the military. The remote access to targeted machines is another path called computer trespass. Cybercriminals also create computer viruses in infiltrate computers and secretly steal data. A type of high-technology fraud is called phishing, which involves the use of official looking e-mail messages to steal valuable information. As technology advances it becomes more and more like a double-edged knife, because while technology

This paper talks about Identity Fraud: The causes of Identity Fraud and how to deal with it

673 words - 3 pages password, they can make purchases online without you knowing. The way spy ware works is that it can log your keystrokes and what websites you access. The way spy ware gets into your computer is by the websites you visit. The way spy ware can be detected is by having a spy ware removal program.Opinion on Identity FraudMy opinion on identity fraud on the internet is that it makes it harder to trust doing any online transactions. There are many programs

Computer Crimes

1101 words - 4 pages traditional crimes are fraud, theft, blackmail, forgery, and embezzlement when the computers or networks are used to facilitate the illicit activity. There are a lot of different criminal activities that can be considered computer crime. Some examples of these activities are misuse of devices, forgery (theft id), electronic fraud, illegal access (unauthorized access), Trojan horses, cyberterrorism, email abuse/harassment, and data interference

Check Fraud and Check Washing

1553 words - 7 pages fraud that I thought was no longer taking place. The statistics of check fraud and check washing are absolutely astronomical. So often today, in the newspapers and on the news, we only hear about the different ways that criminals are committing electronic fraud such as hacking in to somebody’s computer and stealing their credit or debit card information. There are also cases where peoples identities have been stolen and whole other lives have

Similar Essays

Avoiding Computer Fraud In An Age Of Technology

764 words - 4 pages time, and each time the employee goes back into the computer enter information, he has to log back in. This is not just frustrating to the employee, and consumes more time to get work done; it is a good example of where the cost may outweigh the benefits for the company, if they choose to continue with this internal control. Again, each company has different weaknesses and loopholes that need to be filled in, to dissuade computer fraud from

Compute Fraud Essay

707 words - 3 pages Computer fraud, which is the act of fraud committed via the use of information technology, is a rising concern globally. The various acts that constitute this white-collar crime have grown quickly in the last century. Additionally, investigating and taking legal action against computer fraud perpetrators requires time, money, and knowledge in computer processes, which has made it significantly harder to identify and prosecute computer fraud

Cyber Crimes Essay

996 words - 4 pages . Just because these criminals hide behind a computer screen does not mean they are not dangerous. Law enforcement says that they are "crooks" and that they are as dangerous as any other criminal.Internet Fraud affects the entire economy. On average Internet fraud cost the average American Five-hundred and twenty one dollars. According to the Computer Security Institute between the five hundred and three organizations surveyed they reported a four

Credit Card Fraud Essay

1267 words - 6 pages aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law,” (U.S. Department of Justice, 2013). Several United States Codes (U.S.C.) were created to strengthen the Identity Theft and Assumption Deterrence Act. Those acts include: identification fraud statute (18 U.S.C. § 1028), computer fraud statutes (18 U.S.C. §1030), mail fraud statute (18 U.S.C