Haven't found the Essay You Want?
For Only $12.90/page

Cyber Crime Research Paper Essay

Can anyone who uses a computer be a victim to cybercrime? Yes, anyone who uses a computer has a chance of being a victim of cybercrime. Cybercrime has become a big issue in today’s society. Cybercrime is defined as crimes committed on the internet using a computer as either a tool or a targeted victim(Razali). Cybercrime can be committed by many people like computer geeks looking for bragging rights to businesses trying to gain an upper hand in the marketplace by hacking competitor websites, Rings of criminals wanting to steal your personal information and sell it on black markets, or spies and terrorists looking to rob our nation of vital information or to launch cyber strikes(Computer Intrusions). Cybercrime can be used many ways.The two main cause of cybercrime are identity theft and internet stalking. Cybercrime is very bad and and can hurt many people physically and mentally, people need to be more aware of the ways to get around cybercrime. Identity theft is one of the main cause of cybercrime. Identity theft, also know as ID theft is a crime in which a criminal obtains key pieces of personal information, such as social security numbers or driver’s license numbers, to pose as someone else(Razali).

There are many kinds of identity theft. There is Criminal identity theft(posing as another person when apprehended for a crime), Financial Identity theft(using anothers identity to obtain credit, goods and services), Identity cloning(using anothers information to assume his or her identity in daily life),Medical identity theft(using anothers identity to obtain medical care or drugs), and Child identity theft(Wikipedia). Many people out in the worlds try to steal peoples wallets, phone, purses and other belongings in plain site or while you are away from your belongings, But what are people trying to steal from you on the internet. Identity thefts on the internet can be stealing many of things. They can be taking bank accounts, credit card numbers, or anything else that is someones personal information. Identity theft is bad and shouldn’t be committed. There are many ways of obtaining this information.

People will rummage through rubbish for personal information(dumpster diving), Retrieve personal data from redundant IT equipment and storage media including PCs,servers,PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly. They are many more ways to also do this. Identity theft is bad because it can cause many people harm. The victims of identity theft can suffer from adverse consequences if they are held responsible for the perpetrators actions(Wikipedia). They could be sent to jail, prison or if it is really that bad they could die over identity theft. If you were associated in takeover identity theft, than the imposter just used stolen information to gain access to the persons existing accounts(Razali). If you were associated in true name identity theft then the imposter used personal information to open new accounts( Razali). The imposter might open a new credit card account, phone account, etc.

Some may however say that Identity theft is good, and they would be right. Identity theft is good for the government, police and FBI. They could use identity theft to catch a imposter causing a lot of harm. They could use it to take down another country that is doing ours harm. They could even make themselves look like a identity theft to see what other are planning. This could help stop it and save many people lives, money, homes, families and mainly their identities. Cyberstalking in the second biggest cause of internet crime. Cyberstalking is the use of internet or other electronic means to stalk or harass an individual, a group, or an organization(Wikipedia).

A number of key factors are in cyberstalking: False accusations, Attempts to gather information about victim, monitoring their targets online activities, encouraging others to harass the victim, false victimization, attacks on data and equipment, ordering goods and services, and arranging to meet. It is so easy to accomplish cyberstalking with all of the social media sites today like Facebook, Twitter, Myspace, etc. There are many types of cyberstalking. There is Stalking by strangers which means the cyberstalker could be a stranger or someone who has had a former/present relationship with the victim. There is Gender based stalking which is harassment and stalking based on the victims gender.

Essay Topics:

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own