Homework Help

Describe 'Computer Fraud' and give a simple example of what a student working with IT...

user profile pic

matthewb89 | Student, Undergraduate | eNotes Newbie

Posted March 14, 2010 at 3:07 AM via web

dislike 1 like

Describe 'Computer Fraud' and give a simple example of what a student working with IT in a school/college should look out for?

2 Answers | Add Yours

Top Answer

user profile pic

Michelle Ossa | College Teacher | (Level 3) Educator Emeritus

Posted March 14, 2010 at 5:20 AM (Answer #1)

dislike 2 like

Computer Fraud is the utilization of a computer as a way to access any form of intelligence that is meant to be privileged, private, controlled, limited and safeguarded via illegal and illicit ways.

These ways include scams, hacking, misrepresentation, stealing identities, breaking security codes, or accessing off limits areas using someone else's privileges. A very delicate type of fraud includes using someone else's computer to produce hoaxes, bullying e-mails, or even chain letters and money scams.

A student of IT has to realize that their computers and the technological privileges that they will obtain in the corporations that will hire them put them in a very critical and delicate position where their own professional integrity and etiquette will weigh in. As the protectors of the company's information backbone, they will need to trust no one and accept that they may become targets, and their information might be hacked by someone at some point.

Therefore, the IT professional literally holds the key to the personal, private, public, financial, legal, and ethical information of an entire business. It is important that students of IT understand their roles and how important their personal and professional integrity will be for the benefit of their corporations. They definitely are the most important elements of future fields.

High school students of IT have to protect their passwords and keep their private information away from the computers in which they work because anyone could steal this information by stealing their passwords, or by hacking their computer. Protection is key and what is private should remain private. Using the rights to access information properly saves a lot of time and work in the long run.

user profile pic

pricecomparison | Student , Undergraduate | Honors

Posted June 28, 2010 at 1:52 PM (Answer #2)

dislike 0 like

You don't have to be an expert in business marketing to know that E-commerce is here to stay.  Throughout the globe, more consumers have discovered the convenience of this system and now feel comfortable purchasing goods and services online.  As the internet continues to thrive with technology and millions in sales, the malicious crime of computer fraud has become an issue bigger than the experts ever could have predicted.

Join to answer this question

Join a community of thousands of dedicated teachers and students.

Join eNotes