Computer Security and Identifying Cybercrime – Research Paper Example

Download full paperFile format: .doc, available for editing

The paper “ Computer Security and Identifying Cybercrime”   is an actual example of a research paper on information technology. After entering into the twenty-first century, there have emerged a large number of new technological revolutions and inventions, which have impacted the ways of life to a great extent. It has created a lot of easiness and diverse ways to lead the lives. People are experiencing quite different methods of learning, how people are getting an education, doing shopping, seeking entertainment, and also most importantly doing the businesses. Due to the fast developments that happened in information technology as well as computer technology, human life has been totally advanced and revolutionized.

Such developments have made communication a second task, where a large amount of data and information can be collected and used for a number of purposes easily. However, these developments can be seen as positive for human beings, but these can also be seen as a negative phenomenon. It is usually called the “ double-edged sword” , where it has both bright and dark sides. Though computer and information technology has proved to be much useful for communication and business development, it has also created new ways of doing illegal or criminal activities (Smith & Spafford, 2004; Gordon, et al. , 2003).

Up till now a large number of security threats have emerged in the world of computing, however, identity theft is believed to be the most critical computer crime among all of them. This paper presents an overview of identity theft. This paper discusses the basics and impact of this computer crime in various entities. This paper presents a review of the literature on identity theft. Computer CrimeAccording to (Morley & Parker, 2014, p.

399), “ the exploitation of computers has given birth to a concept called ‘ computer crime” . Newman has defined the computer-crime as, def. “ the behavior in which computers or networks are a tool, a target, or a place of criminal activity” (Newman, 2009, p. 552). Cybercrime is such an evident kind of world-wide crime, where it has impacted the worldwide developments and advancements in information and communication technology. As per a research conducted by McConnell (2000), it is found that computer crimes can be distinguished from other crimes in four concerns: as “ they are easy to learn how to commit; they require fewer resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it, and they are often not clearly illegal. ” (Mcconnell, 2000, p.

60). In this regard, it can be said that such a new kind of crime needs to be detected and investigated form new perspectives and can be studied through different research methods. These computer crimes are posing new threats to legislators, law implementation organizations, and global institutes.

According to Morris (2004), such level of crime compels the presence of an active, international-based along with national appliances, which can control and explore the employment of ICTs in order to perform any criminal actions in the World Wide Web (Morris, 2004). Computer crimes are available in many forms and also bring numerous problems with respect to online working. In addition, online frauds are the modern form of the online criminal activities that involve information and data hacking and later on the use of that information to perform illegal activities, such as cash-based scandals.

Numerous modern and up-to-date technologies in the industrial period have given birth to innovative criminal activities. Information technology, especially the Internet is open for everyone which gives the opportunities to criminal people, steal, new ways to steal them, and new techniques to harm others. In most simple words computer crime can be defined as unlawful actions by using a computer or against a computer system. The Internet's user-friendliness and convenience have given birth to modern ways for computer crime and at present identity theft has emerged as the biggest computer crime (Laudon & Laudon, 1999, p.



Allison, S. F., Schuck, A. M. & Lersch, K. M., 2005. Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, p. 19–29.

Bosworth, S., Kabay, M. E. & Whyne, E., 2009. Computer Security Handbook. New York: Wiley Publishers.

Compomizzi, J., D’Aurora, S. & Rota, D. P., 2013. IDENTITY THEFT AND PREVENTIVE MEASURES: THE COST IS ALL YOUR’S. Issues in Information Systems, pp. 162-168.

Denning, D., 1999. Information Warfare and Security. Boston: Addison-Wesley.

Federal Trade Commission, 2012. Identity Theft and Assumption Deterrence Act. [Online]

Available at: [Accessed May 14, 2015].

Felson, M., 1998. Crime and Everyday Life. Thousand Oaks: Pine Forge Press.

Felson, M. & Clarke, R., 1998. Opportunity Makes the Thief. Police Research Series, p. 98.

Gordon, G. R., Hosmer, C. D., Siedsma, C. & Rebovich, D., 2003. Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime. New York: U.S. Department of Justice.

Kabay, M. E., 2013. Understanding Studies and Surveys of Computer Crimes, Northfield: Norwich University.

Laudon, K. C. & Laudon, J. P., 1999. Management Information Systems. 6th ed. New Jersey: Prentice-Hall.

Mcconnell, 2000. International, Cybercrime...and Punishment? , Global Information: Archaic Laws Threaten.

Morley, D. & Parker, C. S., 2014. Understanding Computers: Today and Tomorrow, Comprehensive. 12 ed. New York: Course Technology.

Morris, S., 2004. The future of net crime now: Part 1 threats and challenges, Online Report: Home Office.

Newman, G. R., 2009. Cybercrime. In: Handbook on Crime and Deviance. Online: Springer, pp. 551-584.

Newman, G. R. & McNally, M. M., 2007. Identity Theft Literature Review, New York: National Institute of Justice.

Smith, R. G., 2012. Cyber Crime Research, Sydney: Australian Institute of Criminology.

Smith, S. W. & Spafford, E. H., 2004. Grand Challenges in Information Security: Process and Output. IEEE Security and Privacy, 2(1), pp. 69-71.

Synovate, 2003. Federal Trade Commission—Identity Theft Survey Report, Report prepared for the Federal Trade Commission, McLean, VA: Federal Trade Commission.

Download full paperFile format: .doc, available for editing
Contact Us