- Download PDF
Describe how the 4 fundamental types of traditional crime (violent, theft, fraud, and illegal activities) can be committed using a computer ...?
Describe how the 4 fundamental types of traditional crime (violent, theft, fraud, and illegal activities) can be committed using a computer and/or the internet giving a suitable example in each case?
3 Answers | Add Yours
The 4 fundamental types of traditional crime (violent, theft, fraud, and illegal activities) can be done via the following:
A) Violent crime- Can be done by harrasment, starting threads about people, creating hate groups and planning agendas.
B) THEFT- Identity theft, hacking bank accounts, hacking social security information, and hacking personal databases.
C) FRAUD- By using the stolen identity to purchase things or make negotiations, by pretending to be someone else, or by hacking someone's social network account to contact others.
D) Illegal activities- Selling medicine prescribed to other people, child pornography, human slavery, and illicit gaming.
Violence of a sort can be done by computer. Of course, you cannot physically harm someone via computer. However, you can unleash a virus on someone else's computer or computer system. There is also cyberbullying.
Theft is simple -- the most obvious kind is identity theft accomplished by phishing or something similar.
Fraud can include email scams and the selling of fake merchandise on sites like eBay.
All of these already are illegal activities so I do not know what you mean by that phrase. However, I suppose you could mention things like prostitution. There have been many cases in the US of prostitution being offered over the internet. There is also child pornography which seems to be a big problem.
One of the violent crimes that has come out of the computer has been Cyber Bullying. Cyber bullying is when one person makes threats or set-up another and creates mental duress for the person. While it does not lay hand to a victim, it can result in a victim's death because of the level of intent to harm the victim emotionally.
Theft can occur when someone uses a credit number or taps into a person's bank account via the Internet. In addition, many people have had money stolen from them through fraudulent promises of riches to be obtained if they respond to certain e-mails.
Fraud can happen when a person uses a person's name and identity to apply for credit cards or other things. A friend of mine had her identity stolen by someone who used her name to get an online library card. It ended up allowing them to access her accounts and credit statements.
There are many crimes on the internet. It appears that when the internet became a regular operation of household business breeching security became a hobby turned criminal activity for those smart enough to engage in the act.
Students from a higher order university were able to tap into the college's records and change the final grades on their information. At a high school students accessed a final exam that a teacher was to give out. They distributed it to friends and when the class grades were extremely high suspicion arose.
We’ve answered 324,214 questions. We can answer yours, too.Ask a question